All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jesse Pollard <pollard@admin.navo.hpc.mil>
To: Russell Coker <russell@coker.com.au>
Cc: SELinux@tycho.nsa.gov
Subject: Re: Domain transition -- enabling user_r in eklogin
Date: Fri, 20 Dec 2002 14:07:42 -0600	[thread overview]
Message-ID: <200212201407.42467.pollard@admin.navo.hpc.mil> (raw)
In-Reply-To: <200212201940.32007.russell@coker.com.au>

On Friday 20 December 2002 12:40 pm, Russell Coker wrote:
> On Fri, 20 Dec 2002 17:25, Jesse Pollard wrote:>
> > > The problem is that if you can run GPG currently you can encrypt the
> > > secret key to yourself with a password (IE not encrypting to a public
> > > key) and then decrypt the result to get the key.  A future version of
> > > GPG will address this.  I don't know how PGP performs in this regard.
> >
> > Yup. That is one of the things the application must be able to evaluate.
> > The output media/medium is the determining factor here. To do this
> > requires reading data with a high level label by a trusted process which
> > must NOT write that data to a media/medum with a low level label. That
> > trusted process SHOULD be able to read low labeled data, munch it using
> > high labled data, and write it to a low labeled media/medum since this is
> > WHY it is a trusted process.
>
> Are you sure that it's a good idea to make gpg a trusted program that can
> over-ride MLS boundaries rather than have it merely be trusted to perform
> the actions that the user requests of it?

Not all boundaries - only the one protecting the gpg secret key. You have to 
trust some program somewhere, and this one would seem to be the minimum.

> Currently we only have to trust that gpg will do what we tell it to.  The
> GPG developers plan to make some small changes to make it easier for me to
> ensure that gpg isn't executed in the wrong way by the wrong program.
>
> If gpg has to become a trusted part of system security (as it is on default
> Linux systems due to being SUID root) then the requirements on gpg are much
> greater.  The counter arguement of course is that this level of trust in
> gpg apparently works OK on default Linux setups...

And the one I suggested provides less trust than setuid.

The only modifications I can think of are that it would NOT allow the key to
be extracted IF it is providing output for a lower security level. I think it
would be desirable to allow it to USE the key (for encryption, decrypton, and
signing), but not allow the key itself to get out of the application, nor
allow the key to be replaced.

> > Personally, I dislike the idea of privileged applications. For a secure
> > environment, I would prever all secret keys to be maintained by a
> > security server process, and all queries/updates for access to this data
> > to be carried out by that security server. This would turn at least half
> > of GPG/Kerberos functions over to the security server (which should pass
> > the actions on the keys to sub processes. That includes
> > encryption/decryption services, though the security server may just pass
> > a socket connection back to the requesting application to allow that
> > application to push data into the encryption engine and either recieve
> > the results, or the output could already be connected to another socket
> > for outgoing data.
> >
> > Complicated perhaps, but no trusted application need exist other than the
> > security server. And the users would have no need to access the secret
> > keys directly.
>
> Interesting idea.  Sounds like kerberos on steroids.  ;)

yes - My original idea was to allow IPSec to handle the encryption, and the 
security server handle the keys, identfication, authentication, and initial
security labels. It makes most of the Kerberos utilities devolve into user 
interface, file/shell interface, and security server interaction. A much
simpler security environment when compaired to the amount of code
currently used in Kerberos.

-- 
-------------------------------------------------------------------------
Jesse I Pollard, II
Email: pollard@navo.hpc.mil

Any opinions expressed are solely my own.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2002-12-20 20:07 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2002-12-17 17:25 Domain transition -- enabling user_r in eklogin Stephen D. Smalley
2002-12-18  0:28 ` forrest whitcher
2002-12-18  1:28   ` Brian May
2002-12-18  7:45     ` Russell Coker
2002-12-18 22:27       ` Brian May
2002-12-19  9:51         ` Russell Coker
2002-12-19 14:02           ` Jesse Pollard
2002-12-19 22:33             ` Russell Coker
2002-12-20 16:25               ` Jesse Pollard
2002-12-20 18:40                 ` Russell Coker
2002-12-20 20:07                   ` Jesse Pollard [this message]
2002-12-21 22:34                     ` Russell Coker
  -- strict thread matches above, loose matches on Subject: below --
2002-12-17 16:14 Stephen D. Smalley
2002-12-17 17:10 ` forrest whitcher
2002-12-16 21:25 Domain transition Stephen D. Smalley
2002-12-17  9:19 ` Russell Coker
2002-12-17 11:42   ` Brian May
2002-12-17 13:31     ` Russell Coker
2002-12-17 15:48       ` Domain transition -- enabling user_r in eklogin forrest whitcher

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=200212201407.42467.pollard@admin.navo.hpc.mil \
    --to=pollard@admin.navo.hpc.mil \
    --cc=SELinux@tycho.nsa.gov \
    --cc=russell@coker.com.au \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.