From: Steve Grubb <sgrubb@redhat.com>
To: Neil Horman <nhorman@redhat.com>
Cc: Neil Horman <nhorman@tuxdriver.com>,
Miloslav Trmac <mitr@redhat.com>,
Herbert Xu <herbert@gondor.hengli.com.au>,
Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>,
linux-crypto@vger.kernel.org, Linda Wang <lwang@redhat.com>
Subject: Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
Date: Tue, 10 Aug 2010 16:08:55 -0400 [thread overview]
Message-ID: <201008101608.56349.sgrubb@redhat.com> (raw)
In-Reply-To: <20100810191757.GD9789@hmsreliant.think-freely.org>
On Tuesday, August 10, 2010 03:17:57 pm Neil Horman wrote:
> > There really is no comparison between what can be recorded synchronously
> > vs async.
>
> Ok, so the $64 dollar question then: Do FIPS or Common Criteria require
> that you log more than whats in the netlink packet?
The TSF shall be able to include or exclude auditable events from the set
of audited events based on the following attributes:
a) object identity,
b) user identity,
c) host identity,
d) event type,
e) success of auditable security events, and
f) failure of auditable security events.
We need the ability to selectively audit based on uid for example. The netlink
credentials doesn't have that. In many cases its the same as the loginuid, but
its not in the skb.
There is also a table of additional requirements. Take the case of logging in.
It says:
Origin of the attempt (e.g., terminal identifier, source IP address).
So, when someone changes their password and a hash function is called, we need
the origin information.
> > > It sounds from previous emails that, generally speaking, you're worried
> > > that you want the task struct that current points to in the recvmsg
> > > call be guaranteeed to be the same as the task struct that current
> > > points to in the sendmsg call (i.e. no children (re)using the same
> > > socket descriptor, etc).
> >
> > Not really, we are _hoping_ that the pid in the netlink credentials is
> > the same pid that sent the packet in the first place. From the time we
> > reference the pid out of the skb until we go hunting and locate the pid
> > in the list of tasks, it could have died and been replaced with another
> > task with different credentials. We can't take that risk.
> >
> > > Can this be handled by using the fact that netlink is actually
> > > syncronous under the covers?
> >
> > But its not or all the credentials would not be riding in the skb.
>
> Not true. It not guaranteed to, as you can do anything you want when you
> receive a netlink msg in the kernel. But thats not to say that you can't
> enforce synchronization, and in so doing obtain more information.
Racy.
> > > Can you ennumerate here what FIPS and Common Criteria mandate be
> > > presented in the audit logs?
> >
> > Who did what to whom at what time and what was the outcome. In the case
> > of configuration changes we need the new and old values. However, we
> > need extra information to make the selective audit work right.
>
> Somehow I doubt that FIPS mandates that audit messages include "who did
> what to whoom and what the result was" :). Seriously, what do FIPS and
> common criteria require in an audit message? I assume this is a partial
> list:
The TSF shall record within each audit record at least the following
information:
a) Date and time of the event, type of event, subject identity (if
applicable), and the outcome (success or failure) of the event; and
additional data as required. (Usually the object)
There are other implicit requirement such as selective audit that causes more
information to be needed as well as the additional requirements clause.
-Steve
next prev parent reply other threads:[~2010-08-10 20:09 UTC|newest]
Thread overview: 39+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <1036252728.135401281454634072.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2010-08-10 15:40 ` [PATCH 0/4] RFC: "New" /dev/crypto user-space interface Miloslav Trmac
2010-08-10 16:40 ` Neil Horman
2010-08-10 16:57 ` Miloslav Trmac
2010-08-10 17:57 ` Neil Horman
2010-08-10 18:14 ` Steve Grubb
2010-08-10 18:45 ` Neil Horman
2010-08-10 19:10 ` Steve Grubb
2010-08-10 19:17 ` Neil Horman
2010-08-10 20:08 ` Steve Grubb [this message]
2010-08-10 18:19 ` Miloslav Trmac
2010-08-10 18:34 ` Herbert Xu
2010-08-10 18:36 ` Miloslav Trmac
2010-08-10 19:10 ` Neil Horman
2010-08-10 19:37 ` Miloslav Trmac
2010-08-10 18:12 ` Loc Ho
[not found] <1488103333.203081281527737237.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2010-08-11 12:09 ` Miloslav Trmac
[not found] <2115846701.201281281525518833.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2010-08-11 11:31 ` Miloslav Trmac
[not found] <227903841.184591281491835434.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2010-08-11 2:06 ` Miloslav Trmac
2010-08-11 11:46 ` Neil Horman
[not found] <897762024.164521281469254847.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2010-08-10 19:44 ` Miloslav Trmac
[not found] <1649376471.162481281467800176.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2010-08-10 19:18 ` Miloslav Trmac
[not found] <1250838696.160111281466456373.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2010-08-10 18:58 ` Miloslav Trmac
2010-08-10 19:37 ` Neil Horman
[not found] <15765372.157161281465237985.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2010-08-10 18:34 ` Miloslav Trmac
2010-08-10 18:39 ` Loc Ho
[not found] <801204854.134521281454377550.JavaMail.root@zmail07.collab.prod.int.phx2.redhat.com>
2010-08-10 15:36 ` Miloslav Trmac
2010-08-10 16:17 ` Neil Horman
2010-08-05 20:17 Miloslav Trmač
2010-08-06 0:25 ` Neil Horman
2010-08-07 0:54 ` Miloslav Trmac
2010-08-09 14:39 ` Herbert Xu
2010-08-10 0:00 ` Miloslav Trmac
2010-08-10 12:46 ` Neil Horman
2010-08-10 13:24 ` Steve Grubb
2010-08-10 14:37 ` Neil Horman
2010-08-10 14:47 ` Miloslav Trmac
2010-08-10 14:51 ` Neil Horman
2010-08-11 6:50 ` Linus Walleij
2010-08-11 23:10 ` Nikos Mavrogiannopoulos
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=201008101608.56349.sgrubb@redhat.com \
--to=sgrubb@redhat.com \
--cc=herbert@gondor.hengli.com.au \
--cc=linux-crypto@vger.kernel.org \
--cc=lwang@redhat.com \
--cc=mitr@redhat.com \
--cc=n.mavrogiannopoulos@gmail.com \
--cc=nhorman@redhat.com \
--cc=nhorman@tuxdriver.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.