From: Paul Moore <paul.moore@hp.com>
To: Joshua Brindle <method@manicmethod.com>
Cc: Joe Nall <joe@nall.com>, Darrel Goeddel <sedgoeddel@gmail.com>,
Venkat Yekkirala <vyekkirala@TrustedCS.com>,
selinux@tycho.nsa.gov, James Morris <jmorris@namei.org>,
Darrel Goeddel <DGoeddel@TrustedCS.com>,
Stephen Smalley <sds@tycho.nsa.gov>,
kaigai@ak.jp.nec.com, Eric Paris <eparis@parisplace.org>
Subject: Re: [RFC 0/5] Static/fallback external labels for NetLabel
Date: Wed, 29 Aug 2007 10:56:26 -0400 [thread overview]
Message-ID: <200708291056.26561.paul.moore@hp.com> (raw)
In-Reply-To: <46D5822F.3010804@manicmethod.com>
On Wednesday, August 29 2007 10:26:55 am Joshua Brindle wrote:
> Paul Moore wrote:
> > On Wednesday, August 29 2007 12:11:14 am Joshua Brindle wrote:
> >> Because of
> >> what I said above I think we should 1) not do node based fallbacks and
> >> 2) not do nic alias-level fallbacks. This is the safe option (as already
> >> pointed out) and minimizes trust in untrustworthy things (eg., addresses
> >> coming from the network).
> >>
> >> OTOH it may make some peoples lives easier to allow this. It is a false
> >> sense of security though so I vote for doing nic level fallbacks only
> >> and if someone *really* wants to do this they can just plug several nics
> >> into the same network (hopefully they'd recognize the horrible things
> >> they are doing if it is explicit like that).
> >>
> >> It sounds like the decision is still up in the air though, does anyone
> >> inherently disagree with me here?
> >
> > I guess every decision is technically up in the air until the
> > changes/patches are included in a released kernel, however, I'm pretty
> > confident that host level granularity of both fallback labels and flow
> > control peer label filtering is "the right thing".
> >
> > I understand your point about not extending trust beyond the level of the
> > physical wire, that is very easy to rationalize/understand. However,
> > from a practical real-world scenario (see my home network behind a NAT
> > box example, as well as others) I think there is real value in extending
> > the labeling beyond the wire to the host/network level. SELinux has
> > always made some allowances to facilitate adoption and ease of use, i.e.
> > unconfined_t, but has been careful to make sure that these concessions
> > were always at the discretion of the system administrator. Fallback
> > labeling and peer flow controls are configuration options which are only
> > available to the system administrator and providing host level
> > granularity can be a significant benefit to a lot of people.
>
> concessions are fine when the ramifications are understood, unconfined_t
> is pretty obvious.
I tend to think host level fallback labels are pretty obvious too, at least as
obvious as unconfined_t if not more so. The only way to truly understand the
ramifications of unconfined_t are to actually look at the policy and examine
all of the interactions between unconfined_t and all of the types/attributes
defined in policy. Short circuiting this by making an assumption based on
the connotative meaning of the name "unconfined" is just as dangerous, if not
more so in my opinion, then host level fallbacks. Explaining the
ramifications of host level fallback labels are pretty simple, here is my
quick take:
"Choosing to enable multiple fallback labels per interface, i.e.
network or host level fallbacks, can be dangerous as it is possible
for malicious computers to masquerade as other computers with a
different fallback label. Only use network or host level fallback
labels when you can guarantee the security of the network."
> But when there are security people that believe host
> based labeling buys anything then it may be an inappropriate concession.
I think the key difference between the two sides here is the acceptable level
or risk, or the level of assurance. From what I gather, Joe and the TCS guys
are deploying systems in installations where they are able to put a fair
amount of trust in the network such that host level fallback labels do not
introduce an unacceptable amount of risk. Your argument assumes a network
with no trust where host level fallback labels present a very unacceptable
risk.
Both arguments are correct, the question is what level of functionality do we
want to provide?
> I mean, if I can get on your network and in a matter of seconds take
> over both your IP and MAC address it isn't good. Worse, I could use
> something like ettercap and MiM you without you even knowing (and even
> inject data into the stream).
Yep, I think we're all familiar with ARP cache poisoning and all the other
wonderful things you can do the network.
> The last email from Joe shows that even security centric people are fine
> with this situation in a 'medium assurance' environment, if medium
> assurance means trivially bypassable please count me out. A single
> shared network is in no way medium assurance IMO, there is no inherent
> security when you are on a single network (save for fancy switches that
> do mac filtering and ip locking per port, how many people actually use
> those features though).
I'm making this argument up a bit as I go, so bear with me ...
You essentially define a network by the machines connected to it, which means
that if you can control the machines on that network then you effectively
control the network. Joe is arguing the case for installations where he does
control all of the machines on the network.
> One interesting thing that just occurred to me is vlans. I'm not sure
> how vlans are implemented on Linux (do they get their own interface
> names?) but they are much better than the alternative which lets anyone
> do anything on a single network.
Like everything else I think this depends on the configuration. If you have
multiple vlans on a single wire and unknown machines on that wire than vlan
separation is no different from IP address separation.
--
paul moore
linux security @ hp
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2007-08-29 14:56 UTC|newest]
Thread overview: 100+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-08-27 22:09 [RFC 0/5] Static/fallback external labels for NetLabel Venkat Yekkirala
2007-08-28 14:51 ` Paul Moore
2007-08-28 14:58 ` Darrel Goeddel
2007-08-28 15:12 ` Darrel Goeddel
2007-08-28 15:51 ` Paul Moore
2007-08-28 16:18 ` Joe Nall
2007-08-28 18:51 ` Paul Moore
2007-08-28 19:10 ` Joe Nall
2007-08-28 19:08 ` Stephen Smalley
2007-08-28 19:48 ` Joshua Brindle
2007-08-28 22:26 ` Joe Nall
2007-08-29 0:16 ` Joshua Brindle
2007-08-29 3:45 ` Joshua Brindle
2007-08-29 4:11 ` Joshua Brindle
2007-08-29 4:49 ` Joe Nall
2007-08-29 14:04 ` Joshua Brindle
2007-08-29 15:50 ` Joe Nall
2007-08-29 16:31 ` Joshua Brindle
2007-08-29 12:21 ` Paul Moore
2007-08-29 14:26 ` Joshua Brindle
2007-08-29 14:56 ` Paul Moore [this message]
2007-08-29 15:08 ` Joshua Brindle
2007-08-29 16:55 ` Paul Moore
2007-08-28 17:23 ` Darrel Goeddel
2007-08-28 19:07 ` Paul Moore
-- strict thread matches above, loose matches on Subject: below --
2007-08-29 16:15 Venkat Yekkirala
2007-08-29 16:41 ` Paul Moore
2007-08-29 15:29 Venkat Yekkirala
2007-08-29 15:45 ` Stephen Smalley
2007-08-29 15:07 Venkat Yekkirala
2007-08-28 18:02 Venkat Yekkirala
2007-08-28 19:47 ` Paul Moore
2007-08-28 16:30 Venkat Yekkirala
2007-08-28 17:39 ` Darrel Goeddel
2007-08-28 19:36 ` Paul Moore
2007-08-28 19:26 ` Paul Moore
2007-08-28 16:13 Venkat Yekkirala
2007-08-28 16:32 ` Joe Nall
2007-08-28 19:08 ` Paul Moore
2007-08-27 13:02 Venkat Yekkirala
2007-08-27 13:48 ` Paul Moore
2007-08-27 12:59 Venkat Yekkirala
2007-08-27 12:57 Venkat Yekkirala
2007-08-27 12:44 Venkat Yekkirala
2007-08-27 14:37 ` Paul Moore
2007-08-24 18:11 Venkat Yekkirala
2007-08-24 17:37 Venkat Yekkirala
2007-08-25 21:01 ` Paul Moore
2007-08-07 14:14 Paul Moore
2007-08-09 10:57 ` KaiGai Kohei
2007-08-09 11:48 ` Paul Moore
2007-08-09 12:42 ` Stephen Smalley
2007-08-09 13:29 ` Paul Moore
2007-08-09 13:54 ` Stephen Smalley
2007-08-09 14:48 ` Paul Moore
2007-08-09 15:49 ` James Morris
2007-08-09 16:01 ` Stephen Smalley
2007-08-09 22:35 ` Paul Moore
2007-08-09 13:59 ` James Morris
2007-08-09 14:50 ` Paul Moore
2007-08-09 15:13 ` Stephen Smalley
2007-08-09 14:41 ` Darrel Goeddel
2007-08-09 14:57 ` Paul Moore
2007-08-09 15:07 ` Darrel Goeddel
2007-08-09 15:32 ` Casey Schaufler
2007-08-09 15:39 ` Stephen Smalley
2007-08-09 16:16 ` Casey Schaufler
2007-08-09 14:09 ` Darrel Goeddel
2007-08-09 14:24 ` James Morris
2007-08-09 16:42 ` Darrel Goeddel
2007-08-09 19:20 ` Joe Nall
2007-08-09 19:47 ` Darrel Goeddel
2007-08-09 20:12 ` Joe Nall
2007-08-09 21:15 ` Stephen Smalley
2007-08-09 21:18 ` Darrel Goeddel
2007-08-09 22:48 ` Paul Moore
2007-08-09 20:17 ` Paul Moore
2007-08-09 14:53 ` Paul Moore
2007-08-09 16:08 ` Darrel Goeddel
2007-08-09 22:55 ` Darrel Goeddel
2007-08-10 16:49 ` James Morris
2007-08-14 14:47 ` Darrel Goeddel
2007-08-15 4:24 ` James Morris
2007-08-15 22:35 ` Darrel Goeddel
2007-08-16 15:04 ` James Morris
2007-08-24 16:31 ` Paul Moore
2007-08-24 18:34 ` James Morris
2007-08-24 19:02 ` Casey Schaufler
2007-08-24 19:49 ` Paul Moore
2007-08-24 20:17 ` James Morris
2007-08-24 20:24 ` Paul Moore
2007-08-24 20:47 ` Joshua Brindle
2007-08-24 20:42 ` Casey Schaufler
2007-08-24 21:10 ` Paul Moore
2007-08-24 21:37 ` Casey Schaufler
2007-08-24 20:29 ` Joshua Brindle
2007-08-28 14:03 ` Darrel Goeddel
2007-08-28 15:16 ` Paul Moore
2007-08-09 15:48 ` Casey Schaufler
2007-08-09 19:38 ` Paul Moore
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200708291056.26561.paul.moore@hp.com \
--to=paul.moore@hp.com \
--cc=DGoeddel@TrustedCS.com \
--cc=eparis@parisplace.org \
--cc=jmorris@namei.org \
--cc=joe@nall.com \
--cc=kaigai@ak.jp.nec.com \
--cc=method@manicmethod.com \
--cc=sds@tycho.nsa.gov \
--cc=sedgoeddel@gmail.com \
--cc=selinux@tycho.nsa.gov \
--cc=vyekkirala@TrustedCS.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.