[OLPC Security] SuperUser permission for the Driver??
Carl-Daniel Hailfinger
c-d.hailfinger.devel.2006 at gmx.net
Wed Jun 25 08:01:38 EDT 2008
On 25.06.2008 08:07, Michael Stone wrote:
> We have an activity that wants superuser privilege in order to poke
> kernel memory.
>
Hello? Please take the poor activity out back and shoot it. No activity
has any business poking kernel memory.
> The real questions we should be attempting to address here include:
>
> * Who is granting privilege to this activity?
>
Everybody who wants to ridicule the security model.
> * How are they doing so?
>
> * How should we record the decision?
>
> - My tentative answer is that we should store activities with
> different security properties in well-known directory chains
> with appropriately restricted write access.
>
> * What kinds of abuse are these mechanisms vulnerable to?
>
> * Whose responsibility is it to handle the error condition that the
> human operator does not, him-or-herself posess superuser privilege,
> e.g. for theft-deterrence reasons?
>
Just say no.
Having an activity poke kernel memory is a really strong sign that the
interface is totally broken.
Regards,
Carl-Daniel
More information about the Security
mailing list