All of lore.kernel.org
 help / color / mirror / Atom feed
* FYI SELinux/AppArmor press
@ 2006-02-24 21:01 Daniel J Walsh
  2006-02-25  5:39 ` Randal T. Rioux
  2006-02-28 15:02 ` Erich Schubert
  0 siblings, 2 replies; 12+ messages in thread
From: Daniel J Walsh @ 2006-02-24 21:01 UTC (permalink / raw)
  To: SE Linux

http://www.gcn.com/vol1_no1/daily-updates/38330-1.html


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-02-24 21:01 FYI SELinux/AppArmor press Daniel J Walsh
@ 2006-02-25  5:39 ` Randal T. Rioux
  2006-02-28 15:02 ` Erich Schubert
  1 sibling, 0 replies; 12+ messages in thread
From: Randal T. Rioux @ 2006-02-25  5:39 UTC (permalink / raw)
  To: Daniel J Walsh; +Cc: SE Linux

-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Daniel J Walsh wrote:
> http://www.gcn.com/vol1_no1/daily-updates/38330-1.html
> 

Thanks for the link, and for publicizing your position.

- From your blog: "Novell claims that AppArmor is easier to use for third
parties."

Didn't Bill Gates use the same logic? I shudder when I hear statements
like that. Yes, it takes more effort and time to implement better
security. Writing your password on a Post-It and slapping it on your
monitor is easy too, but wouldn't a little creativity and effort to
memorize your access codes be better?!

Uggh. Back to lurking.

- --
Randal T. Rioux | Procyon Labs
IT Security R&D and Consulting
Virtual: www.procyonlabs.com
Physical: DC / Baltimore
PGP: gpg --keyserver pgp.mit.edu --recv-keys 0xD08D1941


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFD/+2ERrGMQdCNGUERA0o+AJ45D12GvaTJ8N+1qpz5p6VC9XDHcQCeLPgJ
q64Q6Rk3MyUa0bEBgyQOO8w=
=9wbL
-----END PGP SIGNATURE-----

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-02-24 21:01 FYI SELinux/AppArmor press Daniel J Walsh
  2006-02-25  5:39 ` Randal T. Rioux
@ 2006-02-28 15:02 ` Erich Schubert
  2006-03-01  3:20   ` cwarner
  1 sibling, 1 reply; 12+ messages in thread
From: Erich Schubert @ 2006-02-28 15:02 UTC (permalink / raw)
  To: Daniel J Walsh; +Cc: SE Linux

Hello Daniel, Hello SELinux list,
I've posted a rather critical reply to the "AppArmor vs. SELinux"
discussion to my blog at http://blog.drinsama.de/erich/en/linux/selinux

In my opinion, AppArmor can indeed kill SELinux, even when it provides
much lesser security - by just incorporating the community better than
SELinux does.

best regards,
Erich Schubert
-- 
     erich@(vitavonni.de|debian.org)    --    GPG Key ID: 4B3A135C    (o_
 Nothing prevents happiness like the memory of happiness. --- A. Gide //\
     Unter Freunden ist guter Rat nicht teuer, aber wie alles, was    V_/_
         nichts kostet, nur wenig gefragt. --- Robert Muthmann


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-02-28 15:02 ` Erich Schubert
@ 2006-03-01  3:20   ` cwarner
  2006-03-01 14:12     ` Erich Schubert
  0 siblings, 1 reply; 12+ messages in thread
From: cwarner @ 2006-03-01  3:20 UTC (permalink / raw)
  To: Erich Schubert; +Cc: Daniel J Walsh, SE Linux

On Tue, 2006-02-28 at 16:02 +0100, Erich Schubert wrote:
> Hello Daniel, Hello SELinux list,
> I've posted a rather critical reply to the "AppArmor vs. SELinux"
> discussion to my blog at http://blog.drinsama.de/erich/en/linux/selinux
> 
> In my opinion, AppArmor can indeed kill SELinux, even when it provides
> much lesser security - by just incorporating the community better than
> SELinux does.
> 
> best regards,
> Erich Schubert

I think everyone is mostly aware of the documentation issue, that said.
Seeing as everyone keeps saying easier to use. Can you state an explicit
example please? From Crispin Corwan's slides and the constant "easier to
use" barrage I'd expect an example.

How is AppArmor easier to use? Negating the fact that I would have to
learn something new.

--
Christopher Warner


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-03-01  3:20   ` cwarner
@ 2006-03-01 14:12     ` Erich Schubert
  2006-03-01 20:59       ` Benjy Grogan
  0 siblings, 1 reply; 12+ messages in thread
From: Erich Schubert @ 2006-03-01 14:12 UTC (permalink / raw)
  To: cwarner; +Cc: SE Linux

Hello Christopher,
Well, I'm still not running SELinux reference policy successfully.
So anything that actually works is easier to use...
E.g. if the reference policy would include a users_extra file that
labels /root
with sysadm prefix... and if that were documented anywhere and wouldn't
have required me to dive through the source of three packages.
Now if ssh login as sysadm_r would work, I'd be mostly done.

Albeit the documented interfaces of current RefPolicy are an
improvement, I don't think that policy writing has become much easier.
The M4 syntax is still very awkward (backticks, no semicolons), and
unless you've read all the policy thoroughly (e.g. because you've
written it), you'll have a hard time finding the right macros to call.
It's also very unintuitive when to use a macro/call an interface and
when not.
The current policy language is still very much "bottom up", i.e. "these
is our output, how can we generate it a bit easier", and not "top down",
i.e. "this is how we want to write the policy, how do we get a useful
output".

> How is AppArmor easier to use? Negating the fact that I would have to
> learn something new.

I've never looked at AppArmor, I've been using "old" strict SELinux for
some time, so I'd prefer to get the "new" modular SELinux work... I had
experimented with grctl1 ACL some time, which I guess are similar to
what AppArmor does. And I've seen the benefits of labeled processes and
transitions, so I'd like to stick with them.

best regards,
Erich Schubert
-- 
    erich@(vitavonni.de|debian.org)    --    GPG Key ID: 4B3A135C   (o_
   There was never a good war or a bad peace. - Benjamin Franklin   //\
           Ein schöner Moment leuchtet das Leben hindurch.          V_/_



--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-03-01 14:12     ` Erich Schubert
@ 2006-03-01 20:59       ` Benjy Grogan
  2006-03-01 22:00         ` Erich Schubert
  0 siblings, 1 reply; 12+ messages in thread
From: Benjy Grogan @ 2006-03-01 20:59 UTC (permalink / raw)
  To: Erich Schubert; +Cc: cwarner, SE Linux

[-- Attachment #1: Type: text/plain, Size: 1480 bytes --]

On 3/1/06, Erich Schubert <erich@debian.org> wrote:
>
> Hello Christopher,
> Well, I'm still not running SELinux reference policy successfully.
> So anything that actually works is easier to use...
> E.g. if the reference policy would include a users_extra file that
> labels /root
> with sysadm prefix... and if that were documented anywhere and wouldn't
> have required me to dive through the source of three packages.
> Now if ssh login as sysadm_r would work, I'd be mostly done.
>
> Albeit the documented interfaces of current RefPolicy are an
> improvement, I don't think that policy writing has become much easier.
> The M4 syntax is still very awkward (backticks, no semicolons), and
> unless you've read all the policy thoroughly (e.g. because you've
> written it), you'll have a hard time finding the right macros to call.
> It's also very unintuitive when to use a macro/call an interface and
> when not.
> The current policy language is still very much "bottom up", i.e. "these
> is our output, how can we generate it a bit easier", and not "top down",
> i.e. "this is how we want to write the policy, how do we get a useful
> output".


How do these new IDEs that Tresys put out in the last week or so fit into
the picture?  Haven't used them, but they appear to be the start of a
higher-level approach to developing policy and perhaps more intuitive.  I'm
talking about SLIDE (SELinux policy IDE) and the CDS framework IDE tool.

Benji

[-- Attachment #2: Type: text/html, Size: 1816 bytes --]

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-03-01 20:59       ` Benjy Grogan
@ 2006-03-01 22:00         ` Erich Schubert
  2006-03-02  2:47           ` Chad Sellers
  0 siblings, 1 reply; 12+ messages in thread
From: Erich Schubert @ 2006-03-01 22:00 UTC (permalink / raw)
  To: SE Linux

Hi Benjy,
> How do these new IDEs that Tresys put out in the last week or so fit
> into the picture?  Haven't used them, but they appear to be the start
> of a higher-level approach to developing policy and perhaps more
> intuitive.  I'm talking about SLIDE (SELinux policy IDE) and the CDS
> framework IDE tool. 

They replace vim, if you are developing your policy on a system with
eclipse installed...

SLIDE IMHO does not address the issues with the policy language, but it
just tries to make it a little bit less painful, by basically giving you
tab completion, reference (like the website did) and a couple of
templates (like policygentool did). So it likely is a nice tool for
people who _already_ know how to write policy by heart.

Have a look for example at
http://selinux-ide.sourceforge.net/images/screenshots/completion.png
well, it's nice syntax highlighting, and you have a dropdown to select
the macros. But that doesn't really help you finding the appropriate
macros, or explain what ever "generic files in library directories"
might be. Or help you finding out whether you might need it.
There are approximately 1600 interfaces, not counting the generated
network port and interface macros. Even given the hierarchy represented
by {admin,services,...} and convetions like files_ etc. names this is
probably more than most people can handle.

I can't say much about CDS: the website gives so few details, you can
barely tell what it is _meant_ to be, not to say what it's capable of. I
just don't have the time to download the sourcecode and try it. The
screenshot appears pretty at first sight, but there is nothing on it how
this interfaces with other parts of the system and other services -
which is exactly where it gets messy and complicated... Stuff like
allowing DNS usage, access to locales. Using the perl interpreter, or
python. Reading /etc/resolv.conf. Some of this has matching interfaces
already, some has not.
I guess you could even autodetect some of these things. A smart
policygen tool should be able to detect whether it needs
perl/python/java/mono, maybe locales, maybe you could just grep for
"ifconfig" in the binary, too...

best regards,
Erich Schubert
-- 
   erich@(vitavonni.de|debian.org)    --    GPG Key ID: 4B3A135C    (o_
      To be trusted is a greater complement than to be loved.       //\
   Mathematik: Das Alphabet, mit dessen Hilfe Gott das Universum    V_/_
                beschrieben hat. --- Galileo Galilei


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-03-01 22:00         ` Erich Schubert
@ 2006-03-02  2:47           ` Chad Sellers
  2006-03-02 10:43             ` Erich Schubert
  0 siblings, 1 reply; 12+ messages in thread
From: Chad Sellers @ 2006-03-02  2:47 UTC (permalink / raw)
  To: Erich Schubert; +Cc: SE Linux, Kevin Carr, selinux-dev

Erich Schubert wrote:
> Hi Benjy,
> 
>>How do these new IDEs that Tresys put out in the last week or so fit
>>into the picture?  Haven't used them, but they appear to be the start
>>of a higher-level approach to developing policy and perhaps more
>>intuitive.  I'm talking about SLIDE (SELinux policy IDE) and the CDS
>>framework IDE tool. 
> 
> 
Erich,

I'm sorry you're having trouble with reference policy and libsemanage.
They're still a work in progress, and will continue to improve in the
near future. We definitely appreciate your efforts to get this working
on Debian, as we want to see this used in as many distributions as
possible. Fedora and Gentoo are a good start, but we'd like to see it
keep spreading.

> They replace vim, if you are developing your policy on a system with
> eclipse installed...
> 
> SLIDE IMHO does not address the issues with the policy language, but it
> just tries to make it a little bit less painful, by basically giving you
> tab completion, reference (like the website did) and a couple of
> templates (like policygentool did). So it likely is a nice tool for
> people who _already_ know how to write policy by heart.
> 
> Have a look for example at
> http://selinux-ide.sourceforge.net/images/screenshots/completion.png
> well, it's nice syntax highlighting, and you have a dropdown to select
> the macros. But that doesn't really help you finding the appropriate
> macros, or explain what ever "generic files in library directories"
> might be. Or help you finding out whether you might need it.
> There are approximately 1600 interfaces, not counting the generated
> network port and interface macros. Even given the hierarchy represented
> by {admin,services,...} and convetions like files_ etc. names this is
> probably more than most people can handle.
> 
Reference policy is less painful, but the mechanisms it provides are the
real power that will allow us to make things easier. We've been trying
to make policy development easier for some time, and we eventually
realized that we couldn't do it without better structure in the policy.
Now that we're starting to have that structure, we can use that to build
higher-level abstractions. These can be as simple as more abstract
interfaces or as complex as higher-level languages and tools. The CDS
Framework is one early example of this which is fairly specific to a
given environment.

SLIDE is a very early version of a reference policy IDE (that's why it's
version 0.1). We're hoping to make it much easier to use over time, but
we wanted to develop it in the open-source so that we could at least get
continuous feedback on it. Even at 0.1, we've gotten some very positive
feedback regarding the features that it does provide.

> I can't say much about CDS: the website gives so few details, you can
> barely tell what it is _meant_ to be, not to say what it's capable of. I
> just don't have the time to download the sourcecode and try it. The
> screenshot appears pretty at first sight, but there is nothing on it how
> this interfaces with other parts of the system and other services -
> which is exactly where it gets messy and complicated... Stuff like
> allowing DNS usage, access to locales. Using the perl interpreter, or
> python. Reading /etc/resolv.conf. Some of this has matching interfaces
> already, some has not.
> 
Just to fill in some of the details here, CDS Framework does have
provisions for linking to the base system. I'm sorry that it is
currently not very well documented. There is actually a paper being
presented at the SELinux Symposium tomorrow on our experiences
implementing the CDS Framework language, including the difficulties with
linking to a base system. I'll make sure at least the presentation makes
it to the web.

Thanks,
Chad

-- 

----------------------
Chad Sellers
Tresys Technology, LLC
http://www.tresys.com


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-03-02  2:47           ` Chad Sellers
@ 2006-03-02 10:43             ` Erich Schubert
  2006-03-03  1:19               ` Joshua Brindle
  0 siblings, 1 reply; 12+ messages in thread
From: Erich Schubert @ 2006-03-02 10:43 UTC (permalink / raw)
  To: Chad Sellers; +Cc: SE Linux, Kevin Carr, selinux-dev

Hello Chad,
In my opinion, the SELinux security policy should be done using a real
OOP paradigma, not this "imperative" like set of rules we have right now
(M4 is imperative...)
In an ideal case, people could write SELinux policies using UML
modelers.
I'm not a big fan of Java and UML, but I think it helps people a lot.

We had some OOP-like elements alaredy - "sysadmfile" and similar type
flags we had in the old nsa policy.

I'd imagine a good policy language to be like this:
---
type system_logfile : public system_file {
	public interface read { ... }
	public interface write { ... }
	public interface append { ... }
	public interface manage { ... }
}

type amavis_logfile : public system_logfile {
	match "/var/log/amavis.*"
	/* will inherit interfaces by system_logfile */
}

type amavisd_exec : public system_executable_file {
	match "/usr/sbin/amavisd.*"

	interface execTransition { ... }
}

type amavisd : public network_daemon {
	interface sendTo { ... }
}

rules amavisd {
	allow appendTo amavis_logfile
}

rules initrc {
	allow execTransition amavisd_exec
}
---

I'm no language designer, and no usability expert... but I think the
policy language should avoid unnecessary repetition as far as possible
and follow modelling paradigmas people already know such as inheritance.

best regards,
Erich Schubert
-- 
     erich@(vitavonni.de|debian.org)    --    GPG Key ID: 4B3A135C    (o_
 Why waste time learning, when ignorance is instantaneous? --- Calvin //\
              Es lohnt sich nicht, die Augen aufzumachen,             V_/_
                     wenn der Kopf im Sand steckt.


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-03-02 10:43             ` Erich Schubert
@ 2006-03-03  1:19               ` Joshua Brindle
  2006-03-03 13:21                 ` Erich Schubert
  0 siblings, 1 reply; 12+ messages in thread
From: Joshua Brindle @ 2006-03-03  1:19 UTC (permalink / raw)
  To: Erich Schubert; +Cc: Chad Sellers, SE Linux, Kevin Carr, selinux-dev

Erich Schubert wrote:
> Hello Chad,
> In my opinion, the SELinux security policy should be done using a real
> OOP paradigma, not this "imperative" like set of rules we have right now
> (M4 is imperative...)
> In an ideal case, people could write SELinux policies using UML
> modelers.
> I'm not a big fan of Java and UML, but I think it helps people a lot.
>

I'll start by saying I've been spending alot of time thinking about 
language enhancements lately and will be sending an RFC to the list 
sometime soon. With that in mind I have some comments on these suggestions.

> We had some OOP-like elements alaredy - "sysadmfile" and similar type
> flags we had in the old nsa policy.
> 
> I'd imagine a good policy language to be like this:
> ---
> type system_logfile : public system_file {
> 	public interface read { ... }
> 	public interface write { ... }
> 	public interface append { ... }
> 	public interface manage { ... }
> }

the reference policy is designed so that modules don't know about types 
(or any symbol) from other modules. Instead the reference policy tries 
to abstract them into actions relevant to that module such as 
apache_read_log. The webalizer module knows it needs to read apache 
logs, but doesn't need to know how that is implemented. This kind of 
encapsulation is one of the best benefits of refpolicy IMHO.

> 
> type amavis_logfile : public system_logfile {
> 	match "/var/log/amavis.*"
> 	/* will inherit interfaces by system_logfile */
> }
> 
putting labeling with the policy is bad for a few reasons. First the 
file context files are suppose to be for system initialization only, 
though they aren't necessarily used that way. Further, different distros 
(and even different OS's) are going to have different file paths which 
would require that information to be encoded into the policy instead of 
letting the enforcement policy be separate from labeling.

> type amavisd_exec : public system_executable_file {
> 	match "/usr/sbin/amavisd.*"
> 
> 	interface execTransition { ... }
> }
> 
> type amavisd : public network_daemon {
> 	interface sendTo { ... }
> }
> 
> rules amavisd {
> 	allow appendTo amavis_logfile
> }
>
Not sure things like this fix anything. You would still have to know 
about something called "amavis_logfile", how is that different from 
looking at http://serefpolicy.sourceforge.net/api-docs/ and going to the 
amavis module and seeing the available interfaces (or using SLIDE with 
autocomplete)

> rules initrc {
> 	allow execTransition amavisd_exec
> }

It seems like this would be more verbose, lots of rules are handled by 
way of attributes which this seems to ignore.

> ---
> 
> I'm no language designer, and no usability expert... but I think the
> policy language should avoid unnecessary repetition as far as possible
> and follow modelling paradigmas people already know such as inheritance.
> 

inheritance is great while programming when you can apply repetitive 
procedures to similar classes. Inheritance with security is not good, 
however. In an ideal world children would be reducing policy, not 
applying the same.

Other than those I agree that OOP principles could do wonders for policy 
development and I'm collecting ideas like these for the language 
discussion at the developers summit tomorrow, stay tuned for published 
notes from there.

We also had a couple papers in the symposium proceedings regarding 
language abstractions and I think there are lots of good ideas being 
bounced around and now we need to take those and figure out which ones 
are truly helpful and implement them.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-03-03  1:19               ` Joshua Brindle
@ 2006-03-03 13:21                 ` Erich Schubert
  2006-03-03 16:50                   ` coderman
  0 siblings, 1 reply; 12+ messages in thread
From: Erich Schubert @ 2006-03-03 13:21 UTC (permalink / raw)
  To: Joshua Brindle; +Cc: SE Linux, selinux-dev

Hello Joshua, Chad, Hello SELinux list,

What I'd really appreciate would be a security modelling approach which
can be visualized like this:
http://www.mucl.de/~erich/selinux-oop-example.png
It's debatable whether you want e.g. any webserver to write any httpd
logfile.
But this is a true preference question - it's simpler if you have only
one domain for httpd logfiles (and that is fine as long as you have only
one web server running); you could also do a "generic httpd logfile"
which is writeable by all web servers and specialized "disjoint"
logfiles when needed. Or you can require httpd servers to define their
own domain and grant access rights only on that level (labeled "variant
2" in the diagram above).
A language can't solve this question, but it can make it easier to see.

> the reference policy is designed so that modules don't know about types 
> (or any symbol) from other modules. Instead the reference policy tries 
> to abstract them into actions relevant to that module such as 
> apache_read_log. The webalizer module knows it needs to read apache 
> logs, but doesn't need to know how that is implemented. This kind of 
> encapsulation is one of the best benefits of refpolicy IMHO.

I agree that this is a good approach. However, this can still be solved
by inheritance. For example, you could grant webalizer access to
apache_logfiles, which is actually an "abstract" type, realized by two
other types "apache_access_logs" and "apache_error_logs".

> putting labeling with the policy is bad for a few reasons. First the 
> file context files are suppose to be for system initialization only, 

They also are an important reference and documentation thing. In order
to understand policy, it's very useful to see which parts of the system
are supposed to be labeled this way.
On my systems, I basically want all files except (partially) /home
and /tmp
to be labele exactly as given by this "initial" labelling.
Right now, the separation achieved is pretty minimal (well, same file
name except for two letters) but it requires me to work with two files,
even when I'm actually working on one thing (e.g. the apache logfiles)

I definitely prefer having all apache logfile related stuff in one
place, instead of having all the apache domain stuff in apache.te and
apache.if and the files in apache.fc
And this was worse with the old policy, where they were even in separate
directories...

> though they aren't necessarily used that way. Further, different distros 
> (and even different OS's) are going to have different file paths which 
> would require that information to be encoded into the policy instead of 
> letting the enforcement policy be separate from labeling.

Right now I think we'll even have to patch the policy for specific
distros. Patching initial file labeling is not that much more work.
Especially "additional" labels - and that is a common case - can be
treated specially anyway. And we'll probably have some case construct in
there, too.
So from my "debian packaging" standpoint I don't see issues here.

> Not sure things like this fix anything. You would still have to know 
> about something called "amavis_logfile", how is that different from 
> looking at http://serefpolicy.sourceforge.net/api-docs/ and going to the 
> amavis module and seeing the available interfaces (or using SLIDE with 
> autocomplete)

I think the syntax is compacter, which is good. Less to read means
easier to write and to verify. And OOP is targeting this, too, by being
able to define rights on "higher" types and inheriting them here.

> inheritance is great while programming when you can apply repetitive 
> procedures to similar classes. Inheritance with security is not good, 
> however. In an ideal world children would be reducing policy, not 
> applying the same.

SELinux policy writing is _very_ repetitive. Which is bad.
Inheritance in security is good, because you can just write down the
_differences_ between two domains, and that makes them easier to check.
And if you want a complete description of what a domain can do, you can
still flatten them. All you need is a tool that "concatenates" the
access rights. They'll probably even remain nicely grouped "inherited
from class xyz: a,b,c"
so you'll even know where to fix it.

> We also had a couple papers in the symposium proceedings regarding 
> language abstractions and I think there are lots of good ideas being 
> bounced around and now we need to take those and figure out which ones 
> are truly helpful and implement them.

Thats something I don't like too much about the symposium - it looks
like a lot of stuff is/was basically "held back" to present it at the
symposium.

best regards,
Erich Schubert
-- 
    erich@(vitavonni.de|debian.org)    --    GPG Key ID: 4B3A135C    (o_
   It's not denial. I'm just selective about the reality I accept.   //\
    Die Freunde nennen sich aufrichtig. Die Feinde sind es: Daher    V_/_
      man ihren Tadel zur Selbsterkenntnis benutzen sollte, als
            eine bittere Arznei.  --- Arthur Schopenhauer


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: FYI SELinux/AppArmor press
  2006-03-03 13:21                 ` Erich Schubert
@ 2006-03-03 16:50                   ` coderman
  0 siblings, 0 replies; 12+ messages in thread
From: coderman @ 2006-03-03 16:50 UTC (permalink / raw)
  To: Erich Schubert; +Cc: Joshua Brindle, SE Linux, selinux-dev

On 3/3/06, Erich Schubert <erich@debian.org> wrote:
> ...
> I agree that this is a good approach. However, this can still be solved
> by inheritance. For example, you could grant webalizer access to
> apache_logfiles, which is actually an "abstract" type, realized by two
> other types "apache_access_logs" and "apache_error_logs".

inheritance and least privilege is difficult; this might be something
to discuss in more detail with a constraint model applied to ensure
that an inheritance hierarchy does not leak excessive and unnecessary
privileges.  has this been discussed before on the devel list?

"Integrated constraints and inheritance in DTAC"
http://portal.acm.org/citation.cfm?id=344307

"The Role-Based Access Control System of a European Bank: A Case Study
and Discussion"
http://www-users.cs.york.ac.uk/~jeremy/papers/SACMAT2001.pdf


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

end of thread, other threads:[~2006-03-03 16:50 UTC | newest]

Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-02-24 21:01 FYI SELinux/AppArmor press Daniel J Walsh
2006-02-25  5:39 ` Randal T. Rioux
2006-02-28 15:02 ` Erich Schubert
2006-03-01  3:20   ` cwarner
2006-03-01 14:12     ` Erich Schubert
2006-03-01 20:59       ` Benjy Grogan
2006-03-01 22:00         ` Erich Schubert
2006-03-02  2:47           ` Chad Sellers
2006-03-02 10:43             ` Erich Schubert
2006-03-03  1:19               ` Joshua Brindle
2006-03-03 13:21                 ` Erich Schubert
2006-03-03 16:50                   ` coderman

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.