From: Nicolas Williams <Nicolas.Williams@sun.com>
To: Paul Moore <paul.moore@hp.com>
Cc: Jarrett Lu <Jarrett.Lu@sun.com>,
labeled-nfs@linux-nfs.org, selinux@tycho.nsa.gov,
nfs-discuss@opensolaris.org, nfsv4@ietf.org
Subject: Re: [nfsv4] [Labeled-nfs] New MAC label support Internet Draft posted to IETF website
Date: Thu, 2 Apr 2009 10:24:24 -0500 [thread overview]
Message-ID: <20090402152423.GL1500@Sun.COM> (raw)
In-Reply-To: <200904011246.33436.paul.moore@hp.com>
On Wed, Apr 01, 2009 at 12:46:33PM -0400, Paul Moore wrote:
> My only comment was that figuring out how to transfer information over the
> network isn't really that important yet. Reading through the thread I don't
> think there is general agreement on what we even need to send to enable proper
> label translation/encoding/etc.
I think we all agree that a client and server have to agree on the
meaning of any given DOI number so that they can properly encode labels.
In order to interop this means we need a common label encoding for any
given DOI.
I think we agree on that, no?
That leaves this problem: how to ensure that the client and server do
actually agree as to a given DOI's label encodings?
That's a big problem that to date has been solved by out-of-band
mechanisms. That solution leaves interoperability in a lurch: it's up
to vendors to cooperate to obtain a common security policy for use on
the wire.
I think Jarret's quite right to ask that we do better than that.
Doing better means: a) coming up with a common labeled security policy
language for MLS and DTE, b) ensuring that clients and servers agree on
a DOI's policy.
(a) is hard because we'd have to harmonize the differences between
exiting operating systems' labeled security policies, but I doubt it's
infeasible. (b) is easy: exchange name+version of a DOI's security
policy and you're done (this can be a URL, a hash of the policy
document, whatever).
> > True. The first question is whether we should try to solve, or at least
> > ease, the label interpretation / translation problem in the context of
> > NFSv4 protocol. I don't know if we can solve it, but it seems worthwhile
> > to explore further, to gain more understanding if nothing else.
>
> I've been trying to look at this problem in a more generic sense and not just
> from a labeled NFS point of view. While the current pain point is labeled NFS
> the idea of label translation/encoding/etc is not exclusive to NFS or network
> filesystems in general; I'm sure we can all agree on this. While we may need
> to solve (as best we can) the label translation issues on a per-application
> basis I really hope that we might be able to develop a solution which can be
> used across multiple applications and not just NFS.
+1
> > The challenge of interpreting and translating labels is that one system
> > needs to know a lot of info about its peer. And there is no good way to
> > describe the (sometimes subtle) difference. I think this problem may be
> > harder on DTE systems than on MLS systems, I believe.
>
> I'm not sure we will ever be able to arrive at a solution that requires a
> system to be able to understand the security policy/labels of another; things
> change to much and I don't think anyone's crystal ball is that good.
> Personally I think the best we can do is hope for a solution that allows a
> system to understand a security policy/label system defined by a pre-existing
> DOI definition. If we can do that then we can at least allow two different
> systems to communicate via an agreed upon DOI regardless of their internal
> security policies/labels. I'll admit it isn't perfect, but I think the
> problem space is much smaller and likely to have less churn over time.
+1
> > Assuming we can assemble all the information required to do
> > label translation correctly into a package, passing that around the
> > systems seem inefficient, non-scalable ...
There's no need to refer to labeled security policies by value at the
application protocol layer -- just by name/reference. The common policy
can be referenced by URL so that it can be downloaded only when it's
changed.
> > ... and probably outside the scope of labeled NFSv4 enhancement.
>
> Perhaps. Keep in mind I'm trying to think a bit more generically; if that
> isn't the goal I'll be happy to go back to my corner and sit quietly :)
Parts of the solution will be outside the scope of the NFSv4 WG. That
doesn't mean we can't undertake a solution. Assuming (a) (see above) we
need only specify (b) (see above) for NFSv4 -- we can leave (a) to
another WG.
Nico
--
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2009-04-02 16:03 UTC|newest]
Thread overview: 60+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-01-22 19:16 New MAC label support Internet Draft posted to IETF website David P. Quigley
[not found] ` <54E18340-3542-4AB4-843E-E92A67B709A7@storspeed.com>
2009-01-23 17:47 ` [nfsv4] " Peter Staubach
2009-01-23 21:59 ` Glenn Faden
2009-01-23 19:07 ` [Labeled-nfs] " Kevin L. Smith
[not found] ` <33B70CB9-5260-419A-98CF-94847F829570@nokia.com>
2009-01-28 1:17 ` Jarrett Lu
2009-02-09 22:24 ` Peter Staubach
2009-02-11 23:47 ` David P. Quigley
2009-02-12 1:07 ` [Labeled-nfs] " James Morris
2009-02-12 15:36 ` [nfsv4] " Nicolas Williams
2009-02-12 20:00 ` David P. Quigley
2009-02-12 20:11 ` Nicolas Williams
2009-02-17 16:50 ` David P. Quigley
2009-02-17 17:00 ` Nicolas Williams
2009-02-12 19:45 ` David P. Quigley
2009-02-12 15:22 ` [nfsv4] " Nicolas Williams
2009-03-12 16:08 ` David P. Quigley
2009-03-12 17:20 ` Peter Staubach
2009-03-25 8:52 ` Jarrett Lu
2009-03-25 16:33 ` [nfsv4] " Nicolas Williams
2009-03-26 9:25 ` Jarrett Lu
2009-03-26 15:09 ` Nicolas Williams
2009-03-26 22:03 ` Jarrett Lu
2009-03-27 0:11 ` Nicolas Williams
2009-03-27 12:55 ` [Labeled-nfs] " Stephen Smalley
2009-03-27 13:22 ` Stephen Smalley
2009-03-27 17:03 ` Jarrett Lu
2009-03-27 17:26 ` [nfsv4] [Labeled-nfs] " Nicolas Williams
2009-03-27 18:56 ` Jarrett Lu
2009-03-27 22:04 ` Nicolas Williams
2009-03-30 17:37 ` Stephen Smalley
2009-03-30 18:30 ` Jarrett Lu
2009-03-30 20:01 ` Nicolas Williams
2009-03-30 20:03 ` Nicolas Williams
2009-03-30 21:14 ` Stephen Smalley
2009-03-31 5:59 ` Jarrett Lu
2009-03-31 18:28 ` Nicolas Williams
2009-04-01 3:33 ` Jarrett Lu
2009-04-01 6:58 ` [Labeled-nfs] [nfsv4] " James Morris
2009-04-01 8:09 ` Jarrett Lu
2009-04-01 9:49 ` James Morris
2009-04-01 17:50 ` [nfsv4] [Labeled-nfs] " Nicolas Williams
2009-04-02 23:43 ` Jarrett Lu
2009-03-31 3:07 ` Casey Schaufler
2009-03-31 14:47 ` Paul Moore
2009-04-01 7:46 ` Jarrett Lu
2009-04-01 16:46 ` Paul Moore
2009-04-02 15:24 ` Nicolas Williams [this message]
2009-04-02 22:35 ` Paul Moore
2009-04-03 4:42 ` Nicolas Williams
2009-04-03 18:08 ` Joy Latten
2009-04-03 1:21 ` Jarrett Lu
2009-04-07 21:30 ` Paul Moore
2009-03-31 18:34 ` Nicolas Williams
2009-04-01 3:42 ` Casey Schaufler
2009-03-28 3:33 ` [Labeled-nfs] [nfsv4] " Casey Schaufler
2009-03-28 5:16 ` Glenn Faden
2009-03-28 5:52 ` Casey Schaufler
2009-03-27 22:09 ` Nicolas Williams
2009-03-30 16:51 ` Stephen Smalley
2009-03-30 20:05 ` Nicolas Williams
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20090402152423.GL1500@Sun.COM \
--to=nicolas.williams@sun.com \
--cc=Jarrett.Lu@sun.com \
--cc=labeled-nfs@linux-nfs.org \
--cc=nfs-discuss@opensolaris.org \
--cc=nfsv4@ietf.org \
--cc=paul.moore@hp.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.