From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTP id 5E38D947 for ; Fri, 9 May 2014 22:50:51 +0000 (UTC) Received: from relay4-d.mail.gandi.net (relay4-d.mail.gandi.net [217.70.183.196]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id CAD302022E for ; Fri, 9 May 2014 22:50:50 +0000 (UTC) Date: Fri, 9 May 2014 15:50:40 -0700 From: Josh Triplett To: Andy Lutomirski Message-ID: <20140509225040.GD5725@thin> References: <20140502204141.GB24108@thunk.org> <20140502210123.GA13536@redhat.com> <1399066024.2202.72.camel@dabdike> <20140506171807.GA20776@cloud> <536D1CCE.3060708@zytor.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Cc: Josh Boyer , Sarah Sharp , "ksummit-discuss@lists.linuxfoundation.org" , Greg KH , Julia Lawall , Darren Hart , Dan Carpenter Subject: Re: [Ksummit-discuss] [CORE TOPIC] Kernel tinification: shrinking the kernel and avoiding size regressions List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Fri, May 09, 2014 at 01:37:22PM -0700, Andy Lutomirski wrote: > The best arguments I've heard so far for why the kernel needs to try > to protect itself against root are: > > 1. MS/Verisign demand it. > > 2. It's annoying to fool a user into thinking that they just booted > Some Other OS when they're really running Linux without kernel help. > NB: no one has claimed that it's impossible AFAIK, just that it's > annoyingly complicated. > > I like neither of these arguments. #1 is politics, not security, and > #2 seems like security by annoying the attacker. #1 is useful if you care about supporting users booting Linux on modern systems without changing BIOS configuration. As for #2, I agree that it's just "annoying the attacker", and I don't want to quibble over the value of that in this particular case, but keep in mind that a *lot* of security is "annoying the attacker"; you can rather precisely quantify how secure a system is by how much it costs to purchase exploited systems or similar. (See "An Agenda for Empirical Cyber Crime Research", USENIX ATC 2011.) And in very much the same spirit as "I don't have to run faster than the bear", a lot of security (against broad-scale exploits rather than targeted threats) is about making it more painful to exploit a system than to do a social-engineering attack or a physical security breach. - Josh Triplett