2017-05-13 19:51:47 +08:00
|
|
|
====
|
|
|
|
Yama
|
|
|
|
====
|
|
|
|
|
2015-07-24 09:02:48 +08:00
|
|
|
Yama is a Linux Security Module that collects system-wide DAC security
|
|
|
|
protections that are not handled by the core kernel itself. This is
|
2017-05-13 19:51:47 +08:00
|
|
|
selectable at build-time with ``CONFIG_SECURITY_YAMA``, and can be controlled
|
|
|
|
at run-time through sysctls in ``/proc/sys/kernel/yama``:
|
2011-12-22 04:17:04 +08:00
|
|
|
|
2017-05-13 19:51:47 +08:00
|
|
|
ptrace_scope
|
|
|
|
============
|
2011-12-22 04:17:04 +08:00
|
|
|
|
|
|
|
As Linux grows in popularity, it will become a larger target for
|
|
|
|
malware. One particularly troubling weakness of the Linux process
|
|
|
|
interfaces is that a single user is able to examine the memory and
|
|
|
|
running state of any of their processes. For example, if one application
|
|
|
|
(e.g. Pidgin) was compromised, it would be possible for an attacker to
|
|
|
|
attach to other running processes (e.g. Firefox, SSH sessions, GPG agent,
|
|
|
|
etc) to extract additional credentials and continue to expand the scope
|
|
|
|
of their attack without resorting to user-assisted phishing.
|
|
|
|
|
2020-07-10 02:51:35 +08:00
|
|
|
This is not a theoretical problem. `SSH session hijacking
|
|
|
|
<https://www.blackhat.com/presentations/bh-usa-05/bh-us-05-boileau.pdf>`_
|
|
|
|
and `arbitrary code injection
|
|
|
|
<https://c-skills.blogspot.com/2007/05/injectso.html>`_ attacks already
|
2011-12-22 04:17:04 +08:00
|
|
|
exist and remain possible if ptrace is allowed to operate as before.
|
|
|
|
Since ptrace is not commonly used by non-developers and non-admins, system
|
|
|
|
builders should be allowed the option to disable this debugging system.
|
|
|
|
|
2017-05-13 19:51:47 +08:00
|
|
|
For a solution, some applications use ``prctl(PR_SET_DUMPABLE, ...)`` to
|
2011-12-22 04:17:04 +08:00
|
|
|
specifically disallow such ptrace attachment (e.g. ssh-agent), but many
|
|
|
|
do not. A more general solution is to only allow ptrace directly from a
|
|
|
|
parent to a child process (i.e. direct "gdb EXE" and "strace EXE" still
|
2017-05-13 19:51:47 +08:00
|
|
|
work), or with ``CAP_SYS_PTRACE`` (i.e. "gdb --pid=PID", and "strace -p PID"
|
2011-12-22 04:17:04 +08:00
|
|
|
still work as root).
|
|
|
|
|
2012-04-17 02:56:45 +08:00
|
|
|
In mode 1, software that has defined application-specific relationships
|
2011-12-22 04:17:04 +08:00
|
|
|
between a debugging process and its inferior (crash handlers, etc),
|
2017-05-13 19:51:47 +08:00
|
|
|
``prctl(PR_SET_PTRACER, pid, ...)`` can be used. An inferior can declare which
|
|
|
|
other process (and its descendants) are allowed to call ``PTRACE_ATTACH``
|
2011-12-22 04:17:04 +08:00
|
|
|
against it. Only one such declared debugging process can exists for
|
|
|
|
each inferior at a time. For example, this is used by KDE, Chromium, and
|
|
|
|
Firefox's crash handlers, and by Wine for allowing only Wine processes
|
2012-02-15 08:48:09 +08:00
|
|
|
to ptrace each other. If a process wishes to entirely disable these ptrace
|
2017-05-13 19:51:47 +08:00
|
|
|
restrictions, it can call ``prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, ...)``
|
2012-02-15 08:48:09 +08:00
|
|
|
so that any otherwise allowed process (even those in external pid namespaces)
|
|
|
|
may attach.
|
|
|
|
|
2017-05-13 19:51:47 +08:00
|
|
|
The sysctl settings (writable only with ``CAP_SYS_PTRACE``) are:
|
2011-12-22 04:17:04 +08:00
|
|
|
|
2017-05-13 19:51:47 +08:00
|
|
|
0 - classic ptrace permissions:
|
|
|
|
a process can ``PTRACE_ATTACH`` to any other
|
2011-12-22 04:17:04 +08:00
|
|
|
process running under the same uid, as long as it is dumpable (i.e.
|
|
|
|
did not transition uids, start privileged, or have called
|
2017-05-13 19:51:47 +08:00
|
|
|
``prctl(PR_SET_DUMPABLE...)`` already). Similarly, ``PTRACE_TRACEME`` is
|
2012-08-10 10:01:26 +08:00
|
|
|
unchanged.
|
2011-12-22 04:17:04 +08:00
|
|
|
|
2017-05-13 19:51:47 +08:00
|
|
|
1 - restricted ptrace:
|
|
|
|
a process must have a predefined relationship
|
|
|
|
with the inferior it wants to call ``PTRACE_ATTACH`` on. By default,
|
2011-12-22 04:17:04 +08:00
|
|
|
this relationship is that of only its descendants when the above
|
|
|
|
classic criteria is also met. To change the relationship, an
|
2017-05-13 19:51:47 +08:00
|
|
|
inferior can call ``prctl(PR_SET_PTRACER, debugger, ...)`` to declare
|
|
|
|
an allowed debugger PID to call ``PTRACE_ATTACH`` on the inferior.
|
|
|
|
Using ``PTRACE_TRACEME`` is unchanged.
|
2011-12-22 04:17:04 +08:00
|
|
|
|
2017-05-13 19:51:47 +08:00
|
|
|
2 - admin-only attach:
|
2018-10-03 04:47:23 +08:00
|
|
|
only processes with ``CAP_SYS_PTRACE`` may use ptrace, either with
|
|
|
|
``PTRACE_ATTACH`` or through children calling ``PTRACE_TRACEME``.
|
2012-04-17 02:56:45 +08:00
|
|
|
|
2017-05-13 19:51:47 +08:00
|
|
|
3 - no attach:
|
|
|
|
no processes may use ptrace with ``PTRACE_ATTACH`` nor via
|
|
|
|
``PTRACE_TRACEME``. Once set, this sysctl value cannot be changed.
|
2012-04-17 02:56:45 +08:00
|
|
|
|
2011-12-22 04:17:04 +08:00
|
|
|
The original children-only logic was based on the restrictions in grsecurity.
|