CONFIG_SECURITY_DMESG_RESTRICT
David Henningsson
david.henningsson at canonical.com
Wed Nov 17 09:59:48 UTC 2010
On 2010-11-16 15:49, Kees Cook wrote:
> On Tue, Nov 16, 2010 at 01:22:19PM +0000, Andy Whitcroft wrote:
>> FYI this new security option just dropped into the kernel, for now I
>> have left it turned off. I suspect you are in the best position to know
>> if this is something we should be working towards turning on:
>>
>> # CONFIG_SECURITY_DMESG_RESTRICT is not set
>
> I'd like to turn this on, but it will take some education since using
> "dmesg" will suddenly turn into "sudo dmesg" in instructions everywhere.
> (Most notably apport, actually.)
For a significant amount of audio bugs, reading dmesg is crucial to be
able to solve the bug. My guess is that the ratio is the same for other
types of kernel bugs.
Even if we can ask the user for password (which apport sometimes does
already), we'll still lose the ability for non-sudo users to report bugs
with good enough information.
The counterquestion is - how security sensitive information do we have
in dmesg? Why is it a security problem to have it turned on?
--
David Henningsson, Canonical Ltd.
http://launchpad.net/~diwic
More information about the kernel-team
mailing list