Michael Stone
2008-06-25 06:07:43 UTC
We have an activity that wants superuser privilege in order to poke
kernel memory.
The real questions we should be attempting to address here include:
* Who is granting privilege to this activity?
* How are they doing so?
* How should we record the decision?
- My tentative answer is that we should store activities with
different security properties in well-known directory chains
with appropriately restricted write access.
* What kinds of abuse are these mechanisms vulnerable to?
* Whose responsibility is it to handle the error condition that the
human operator does not, him-or-herself posess superuser privilege,
e.g. for theft-deterrence reasons?
Comments?
Michael
kernel memory.
The real questions we should be attempting to address here include:
* Who is granting privilege to this activity?
* How are they doing so?
* How should we record the decision?
- My tentative answer is that we should store activities with
different security properties in well-known directory chains
with appropriately restricted write access.
* What kinds of abuse are these mechanisms vulnerable to?
* Whose responsibility is it to handle the error condition that the
human operator does not, him-or-herself posess superuser privilege,
e.g. for theft-deterrence reasons?
Comments?
Michael