[nycbug-talk] security advisory

Charles Sprickman spork
Thu Jan 19 16:40:44 EST 2006


On Thu, 19 Jan 2006, Ray Lai wrote:

> On Thu, Jan 19, 2006 at 03:46:44PM -0500, Charles Sprickman wrote:
>> On Thu, 19 Jan 2006, Isaac Levy wrote:
>>> On Jan 19, 2006, at 3:10 PM, Charles Sprickman wrote:
>>>> I'm logging into all my jail boxes and running "chflags -R noschg /",
>>>> since securelevels are now officially useless.
>>>>
>>>> Onion, shmonion!
>>
>> I'm just having fun with Theo's "securelevels are useless" response.  They
>> may not be a perfect solution, but to just discard the whole idea (flaws
>> and all), you lose a layer of security.  Layers are good.
>
> Securelevels are not file flags.

But file flags aren't much fun if you can change a file from "schg" to 
"noschg", and without securelevels, you can do that.

An example:

root at jailhost[/jails/jail1/etc]# chflags schg login.conf.db

root at jail1[/etc]# id
uid=0(root) gid=0(wheel) groups=0(wheel), 5(operator)

root at jail1[/etc]# cp /tmp/login.conf.db login.conf.db
cp: login.conf.db: Operation not permitted

root at jail1[/etc]# chflags noschg login.conf.db
chflags: login.conf.db: Operation not permitted

While this is some jail trickery that's emulating securelevel file flag 
behaviour in the jail, it illustrates a use that I feel at least helps 
make the barrier to entry for an attacker a little higher.

Additionally, setting the schg on a directory seems to stop someone from 
layering something on top of it:

root at jailhost[/jails/jail1/etc/pam.d]# chflags schg .

root at jail1[/etc]# mkdir /tmp/pam.d
root at jail1[/etc]# touch /tmp/pam.d/sshd 
root at jail1[/etc]# mount_nullfs /tmp/pam.d pam.d
mount_nullfs: Operation not permitted

Charles


> -Ray-
>




More information about the talk mailing list