From: Pavel Machek <pavel@ucw.cz>
To: Kees Cook <keescook@chromium.org>
Cc: Timur Tabi <timur@kernel.org>,
Steven Rostedt <rostedt@goodmis.org>,
Petr Mladek <pmladek@suse.com>,
Sergey Senozhatsky <sergey.senozhatsky@gmail.com>,
linux-kernel@vger.kernel.org, linux-mm@kvack.org,
willy@infradead.org, akpm@linux-foundation.org,
torvalds@linux-foundation.org, roman.fietze@magna.com,
john.ogness@linutronix.de, akinobu.mita@gmail.com
Subject: Re: [PATCH] lib/vsprintf: make-printk-non-secret printks all addresses as unhashed
Date: Thu, 4 Feb 2021 23:51:36 +0100 [thread overview]
Message-ID: <20210204225136.GC13103@amd> (raw)
In-Reply-To: <202102041415.D9093ED6@keescook>
[-- Attachment #1: Type: text/plain, Size: 1609 bytes --]
On Thu 2021-02-04 14:17:13, Kees Cook wrote:
> On Thu, Feb 04, 2021 at 11:11:43PM +0100, Pavel Machek wrote:
> > On Thu 2021-02-04 15:59:21, Timur Tabi wrote:
> > > On 2/4/21 3:49 PM, Pavel Machek wrote:
> > > >This machine is insecure. Yet I don't see ascii-art *** all around..
> > > >
> > > >"Kernel memory addresses are exposed, which is bad for security."
> > >
> > > I'll use whatever wording everyone can agree on, but I really don't see much
> > > difference between "which may compromise security on your system" and "which
> > > is bad for security". "may compromise" doesn't see any more alarmist than
> > > "bad". Frankly, "bad" is a very generic term.
> >
> > Well, I agree that "bad" is vague.... but original wording is simply
> > untrue, as printing addresses decreases robustness but can't introduce
> > security problem on its own.
> >
> > Being alarmist is not my complaint; being untrue is.
>
> It's just semantics. Printing addresses DOES weaken the security of a
> system, especially when we know attackers have and do use stuff from dmesg
> to tune their attacks. How about "reduces the security of your system"?
"reduces" sounds okay to me.
You should not have attackers on your system. That reduces your security.
You should not have users reading dmesg. Again that reduces your
security.
You should not have bugs in your kernel. That reduces your security.
But you really can't have attackers patching your kernel. That
compromises your security completely.
Best regards,
Pavel
--
http://www.livejournal.com/~pavelmachek
[-- Attachment #2: Digital signature --]
[-- Type: application/pgp-signature, Size: 181 bytes --]
next prev parent reply other threads:[~2021-02-04 22:51 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-02-02 20:18 Timur Tabi
2021-02-02 21:52 ` Kees Cook
2021-02-02 22:19 ` Timur Tabi
2021-02-02 22:34 ` Steven Rostedt
2021-02-02 22:51 ` Linus Torvalds
2021-02-03 18:53 ` Kees Cook
2021-02-04 20:48 ` Pavel Machek
2021-02-04 20:54 ` Steven Rostedt
2021-02-04 21:49 ` Pavel Machek
2021-02-04 21:59 ` Timur Tabi
2021-02-04 22:06 ` Steven Rostedt
2021-02-04 22:11 ` Pavel Machek
2021-02-04 22:17 ` Kees Cook
2021-02-04 22:20 ` Timur Tabi
2021-02-04 22:51 ` Pavel Machek [this message]
2021-02-04 22:57 ` Pavel Machek
2021-02-04 22:05 ` Steven Rostedt
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210204225136.GC13103@amd \
--to=pavel@ucw.cz \
--cc=akinobu.mita@gmail.com \
--cc=akpm@linux-foundation.org \
--cc=john.ogness@linutronix.de \
--cc=keescook@chromium.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=pmladek@suse.com \
--cc=roman.fietze@magna.com \
--cc=rostedt@goodmis.org \
--cc=sergey.senozhatsky@gmail.com \
--cc=timur@kernel.org \
--cc=torvalds@linux-foundation.org \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox