All of lore.kernel.org
 help / color / mirror / Atom feed
* have you seen spfx2.c?
@ 2001-12-02  2:03 0x
  2001-12-02  3:14 ` Grant Bayley
  0 siblings, 1 reply; 5+ messages in thread
From: 0x @ 2001-12-02  2:03 UTC (permalink / raw)
  To: SELinux


have you seen the security module
http://packetstorm.decepticons.org/linux/security/spfx2.c ?


--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: have you seen spfx2.c?
  2001-12-02  2:03 have you seen spfx2.c? 0x
@ 2001-12-02  3:14 ` Grant Bayley
  2001-12-03 15:07   ` Stephen Smalley
  2001-12-03 15:16   ` Dale Amon
  0 siblings, 2 replies; 5+ messages in thread
From: Grant Bayley @ 2001-12-02  3:14 UTC (permalink / raw)
  To: 0x; +Cc: SELinux


What I don't understand with Linux users is the endless desire to
prevent broken things by patching around them in the kernel.

Why not concentrate on cleaning up the userland apps in Linux in such a
way that they're not overflowable in the first place?

No broken [suid | sgid | priviliged uid daemon ] userland apps means you
have a substantially better chance of keeping a system secure without all
the sleight of hand that lkms typically pull to prevent something bad from
happening.

Think about this logic for a second, then check out:

	http://www.openwall.com/Owl/

Grant

On Sun, 2 Dec 2001 0x@bk.ru wrote:

>
> have you seen the security module
> http://packetstorm.decepticons.org/linux/security/spfx2.c ?


--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: have you seen spfx2.c?
  2001-12-02  3:14 ` Grant Bayley
@ 2001-12-03 15:07   ` Stephen Smalley
  2001-12-03 15:16   ` Dale Amon
  1 sibling, 0 replies; 5+ messages in thread
From: Stephen Smalley @ 2001-12-03 15:07 UTC (permalink / raw)
  To: Grant Bayley; +Cc: SELinux


On Sun, 2 Dec 2001, Grant Bayley wrote:

> What I don't understand with Linux users is the endless desire to
> prevent broken things by patching around them in the kernel.
>
> Why not concentrate on cleaning up the userland apps in Linux in such a
> way that they're not overflowable in the first place?
>
> No broken [suid | sgid | priviliged uid daemon ] userland apps means you
> have a substantially better chance of keeping a system secure without all
> the sleight of hand that lkms typically pull to prevent something bad from
> happening.

It sounds like you are also arguing against the approach of SELinux, which
adds mandatory access controls to the kernel that can confine user
programs and system servers to the minimum amount of privilege they
require to do their jobs.  While it is certainly good to work on
eliminating flaws from privileged applications, you're unlikely to
eliminate all of the flaws in all of the privileged applications for all
time.  Without mandatory access controls in the kernel, flawed
applications will still be able to easily cause failures in system
security.  Additionally, eliminating flaws from privileged applications
doesn't help with other problems solved by mandatory access controls,
e.g. confining malicious code, providing strong separation of processes
and data based on confidentiality and integrity requirements, protecting
applications against bypass or tampering.

The need for MAC is discussed further in the published papers about
SELinux and the background papers, all available on the web site.

--
Stephen D. Smalley, NAI Labs
ssmalley@nai.com




--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: have you seen spfx2.c?
  2001-12-02  3:14 ` Grant Bayley
  2001-12-03 15:07   ` Stephen Smalley
@ 2001-12-03 15:16   ` Dale Amon
  2001-12-05 11:44     ` Russell Coker
  1 sibling, 1 reply; 5+ messages in thread
From: Dale Amon @ 2001-12-03 15:16 UTC (permalink / raw)
  To: Grant Bayley; +Cc: 0x, SELinux

On Sun, Dec 02, 2001 at 02:14:35PM +1100, Grant Bayley wrote:
> 
> What I don't understand with Linux users is the endless desire to
> prevent broken things by patching around them in the kernel.
> 
> Why not concentrate on cleaning up the userland apps in Linux in such a
> way that they're not overflowable in the first place?
> 
> No broken [suid | sgid | priviliged uid daemon ] userland apps means you
> have a substantially better chance of keeping a system secure without all
> the sleight of hand that lkms typically pull to prevent something bad from
> happening.
> 
> Think about this logic for a second, then check out:
> 
> 	http://www.openwall.com/Owl/
> 

The logic fails in real life. There is one kernel,
written by experts. There are tens if not hundreds of 
thousands of apps, written by novices, experts, people
who listen, people who don't listen, supported, 
unsupported...

An environment that defends against userland lameness
is the only solution.

-- 
------------------------------------------------------
    Nuke bin Laden:           Dale Amon, CEO/MD
  improve the global          Islandone Society
     gene pool.               www.islandone.org
------------------------------------------------------

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: have you seen spfx2.c?
  2001-12-03 15:16   ` Dale Amon
@ 2001-12-05 11:44     ` Russell Coker
  0 siblings, 0 replies; 5+ messages in thread
From: Russell Coker @ 2001-12-05 11:44 UTC (permalink / raw)
  To: Dale Amon; +Cc: SELinux

On Mon, 3 Dec 2001 16:16, Dale Amon wrote:
> The logic fails in real life. There is one kernel,
> written by experts. There are tens if not hundreds of
> thousands of apps, written by novices, experts, people
> who listen, people who don't listen, supported,
> unsupported...

This thread shouldn't be dragging on, but I feel that there are a couple of 
crucial points that are being missed.

Firstly there is the issue of multiple levels of protection.  I have three 
locked doors leading to my apartment which I believe gives me significant 
benefits over having only a single locked door.  When I setup co-located 
servers I run packet filters on the servers and also get the ISP to put a 
firewall in place.  Similarly I expect that having two sub-systems trying to 
achieve the same security result by different methods (daemons that don't 
have security holes and a kernel to limit the access the daemons get) is 
worth-while.

The next issue is that even good programmers make mistakes occasionally.  I 
consider the author of Postfix to be one of the best programmers in the 
world, he really knows how to code and really knows security.  In spite of 
this I plan to limit the access Postfix gets to my system, even the best 
programmers can make mistakes occasionally, and besides the person who 
compiled it could have done something wrong.

-- 
http://www.coker.com.au/bonnie++/     Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/       Postal SMTP/POP benchmark
http://www.coker.com.au/projects.html Projects I am working on
http://www.coker.com.au/~russell/     My home page


--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2001-12-05 11:44 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2001-12-02  2:03 have you seen spfx2.c? 0x
2001-12-02  3:14 ` Grant Bayley
2001-12-03 15:07   ` Stephen Smalley
2001-12-03 15:16   ` Dale Amon
2001-12-05 11:44     ` Russell Coker

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.