[PATCH] Install customization packages left for us by a USB key.

Michael Stone michael at laptop.org
Fri Mar 7 15:57:16 EST 2008


On Fri, Mar 07, 2008 at 03:32:14PM -0500, Benjamin M. Schwartz wrote:

First, thanks very much for the constructive criticism. 

> This discussion is ultimately about Bitfrost's P_SF_RUN, 

We should certainly design a solution compatible with P_SF_RUN. I submit
that the tactical part of the discussion contains material that extends
beyond the scope of Bitfrost, but it's certainly good to revist the
theoretical underpinnings of the enterprise.

> According to the Bitfrost spec, the P_SF_RUN permission is required
> for the user to modify the running system files.  Installing an RPM
> clearly constitutes a modification of the system files.  Moreover, any
> user who can install an RPM can make arbitrary modifications to the
> system, using setuid binaries or other techniques.

Certainly true.

> Once P_SF_RUN is implemented, this RPM installation feature will be
> incompatible with P_SF_RUN.  There are then two options:

> 1. RPM customization from USB sticks will not work if P_SF_RUN is disabled.

Agreed.

> 2. RPM customization from USB sticks will constitute a security hole,
> rendering P_SF_RUN ineffectual.

I would have suggested, instead, that 'once P_SF_RUN is implemented,
this RPM installation feature will operate by exercising P_SF_RUN.' In
other words, isn't rebooting with a specially formatted USB key (perhaps
with fancy signed instructions; perhaps not) a [1] perfectly good way to
determine that the human operator of the XO actually intends to modify
the system software contained on it?

  [1]: Clearly, some alternate mechanism is also needed in order to
  support users who do not possess spare USB keys.

Revertibility still needs some work: something like a CoW linking
primitive, union mounts, etc. are still needed in order to put a
writable layer on top of the read-only base layer.

Comments?

Michael




More information about the Devel mailing list