All of lore.kernel.org
 help / color / mirror / Atom feed
* Cambridge Security Group talk
@ 2003-01-18  0:49 Russell Coker
  2003-01-18  3:45 ` Tom
  2003-01-18  6:06 ` Cambridge Security Group talk Brian May
  0 siblings, 2 replies; 13+ messages in thread
From: Russell Coker @ 2003-01-18  0:49 UTC (permalink / raw)
  To: selinux

The talk seemed to go quite well.

The lecture theater could hold 150+ people and was more than half full at the 
start, very few people left early, and I think that the main reason for 
people leaving early was the fact that I exceeded the alotted time.

The audience asked some really technical questions about issues such as the 
way crond determines the correct security context for a process it runs (I'm 
not certain that I managed to convey the details of that one well to the 
audience, it's difficult to explain without diagrams or code).  I think that 
perhaps I should start a frequently asked really technical questions to 
address such issues.

One issue that drew a number of comments from the audence was the length of 
security contexts and the amount of typing that it can involve.  One audience 
member said "space in an Xterm is precious", another audience member 
mentioned having three servers without X that were not administered remotely 
(IE everything is done at the console without even an X based cut/paste 
facility).

One suggestion from the audience was to remove "_t" and "_r" suffixes as the 
context has all the information necessary to differentiate domains from 
roles.  Another suggestion was to remove some parts of the context when they 
aren't needed (such as object_r).  I tried this once but Steve convinced me 
to revert it.  I am now thinking that perhaps we should review this matter.

In regard to the permissions on files, it was pointed out in a quite clear 
fashion that standard Unix has 10 characters in the "ls -l" output to specify 
the permissions.  Of course this is ignoring the user and group fields which 
combined make it into a text representation almost as long as a security 
context.  On my laptop the average length of security contexts I have in use 
at the moment is 30.5 characters including the two ':' characters.  For unix 
permissions it's 10, plus 5 for the group, plus <=8 for the user-name which 
is 25 characters if we include two separators.

The audience had no comments on the issues related to default contexts, 
however they have my email address and hope that at some future time someone 
will have some ideas and email them to me.

There was a suggestion that I should write a magazine article about what I did 
with my SE Linux play machine.  When I was doing it, it didn't seem THAT 
exciting to me.  But if people want to learn more then I'm happy to oblige.  
I'll hunt around and see if someone is interested in publishing such an 
article.

Also an audience member asked me if it would be possible to run a machine with 
all files and processes UID=0, which was a strange co-incidence as I have 
been planning to do that for play machine ][ (but I may have mentioned it on 
a mailing list or something and the word may have got around).  This idea 
seemed to get a lot of interest from the audience, who seemed to actually 
want to do it as a serious way of running a system (rather than as a fun 
demonstration of the power of SE Linux).  But I can oblige.  It wouldn't be 
THAT difficult to modify "ls -l" to display link-count, security-context, 
size, date, and name, and to make similar changes to ps etc to not bother 
displaying UID/GID.  Then cron etc could be modified to run all jobs under 
the same UID etc.  The passwd wrapper would also work if the UID checks were 
made a configuration option (could be made a PAM module).


Anyway, I highly recommend that any of you who are in the Cambridge area 
attend a meeting if possible, and give a presentation if you are working on 
something that intersts them.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page



--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 13+ messages in thread
* Re: Cambridge Security Group talk
@ 2003-01-21 17:42 Stephen D. Smalley
  2003-01-21 22:37 ` Russell Coker
  0 siblings, 1 reply; 13+ messages in thread
From: Stephen D. Smalley @ 2003-01-21 17:42 UTC (permalink / raw)
  To: selinux, russell


> One issue that drew a number of comments from the audence was the length of 
> security contexts and the amount of typing that it can involve.  One audience 
> member said "space in an Xterm is precious", another audience member 
> mentioned having three servers without X that were not administered remotely 
> (IE everything is done at the console without even an X based cut/paste 
> facility).

How often does a user need to type a context?  Typically, labeling of
processes and objects is handled transparently to the user.  newrole
only requires you to enter the new role name.  Editing the policy
configuration or file contexts configuration can be done offline,
and shouldn't be too frequent anyway.

> Another suggestion was to remove some parts of the context when they 
> aren't needed (such as object_r).  I tried this once but Steve convinced me 
> to revert it.  I am now thinking that perhaps we should review this matter.

libsecure provides some functions for manipulating security context
fields that are used by newrole and runas.  In general, you want to
encapsulate any logic that knows about the syntax and semantics of the
security context in a library and avoid policy-specific knowledge in the
application unless the application is fundamentally policy-specific.

> Also an audience member asked me if it would be possible to run a machine with 
> all files and processes UID=0, which was a strange co-incidence as I have 
> been planning to do that for play machine ][ (but I may have mentioned it on 
> a mailing list or something and the word may have got around).  This idea 
> seemed to get a lot of interest from the audience, who seemed to actually 
> want to do it as a serious way of running a system (rather than as a fun 
> demonstration of the power of SE Linux).  But I can oblige.

I can't recommend this.  You would need to audit your policy
configuration very carefully in light of the fact that SELinux would be
providing the sole authoritative decision for Linux capabilities
(similar to
http://marc.theaimsgroup.com/?l=selinux&m=102614635816689&w=2), and you
would need to audit any applications that make hardcoded assumptions
about uid 0.  Also, if your system is intended to be multi-user, you will
still want a DAC mechanism for user-defined restrictions.

--
Stephen Smalley, NSA
sds@epoch.ncsc.mil


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 13+ messages in thread
* Re: Cambridge Security Group talk
@ 2003-01-21 17:48 Stephen D. Smalley
  2003-01-21 18:57 ` Russell Coker
  0 siblings, 1 reply; 13+ messages in thread
From: Stephen D. Smalley @ 2003-01-21 17:48 UTC (permalink / raw)
  To: russell, bam; +Cc: selinux


> Which raises another interesting topic, that is 2.5.x supports attrs
> (EAs) on ext2 and ext3 (at the minimum; I don't know about reiserfs),
> maybe SE-Linux security contexts could be stored in attrs?

Yes, we're looking into the use of EAs for file security contexts.
We would still retain the persistent label mapping as a fallback if
the filesystem didn't support EAs.

--
Stephen Smalley, NSA
sds@epoch.ncsc.mil


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, other threads:[~2003-01-25 22:06 UTC | newest]

Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-01-18  0:49 Cambridge Security Group talk Russell Coker
2003-01-18  3:45 ` Tom
2003-01-18  5:57   ` Brian May
2003-01-21  0:31   ` Root-only systems forrest whitcher
2003-01-21  1:56     ` Russell Coker
2003-01-18  6:06 ` Cambridge Security Group talk Brian May
2003-01-19  6:13   ` Florian Hines
2003-01-19 16:57     ` Russell Coker
2003-01-25 22:06     ` selinux+Steven.Murdoch
  -- strict thread matches above, loose matches on Subject: below --
2003-01-21 17:42 Stephen D. Smalley
2003-01-21 22:37 ` Russell Coker
2003-01-21 17:48 Stephen D. Smalley
2003-01-21 18:57 ` Russell Coker

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.