* Current/Future Plans to Support Stacking LSM Modules @ 2007-01-16 18:08 Tom Fortmann 2007-01-16 18:27 ` Stephen Smalley 2007-01-16 18:46 ` Casey Schaufler 0 siblings, 2 replies; 15+ messages in thread From: Tom Fortmann @ 2007-01-16 18:08 UTC (permalink / raw) To: selinux [-- Attachment #1: Type: text/plain, Size: 512 bytes --] Are their any current or future plans to support stacking additional security modules on the LSM interface? Alternatively, are there any current or future plans to allow the SELinux framework to be expanded with third party loadable modules? We are working on some enhanced security solutions that require access to the LSM interface, but we do not want to preclude the use of SELinux by our customers. Thank you in advance for your insight into these plans. Tom Fortmann Xcape Solutions, Inc. [-- Attachment #2: Type: text/html, Size: 2457 bytes --] ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-16 18:08 Current/Future Plans to Support Stacking LSM Modules Tom Fortmann @ 2007-01-16 18:27 ` Stephen Smalley 2007-01-16 18:46 ` Casey Schaufler 1 sibling, 0 replies; 15+ messages in thread From: Stephen Smalley @ 2007-01-16 18:27 UTC (permalink / raw) To: Tom Fortmann; +Cc: selinux On Tue, 2007-01-16 at 12:08 -0600, Tom Fortmann wrote: > Are their any current or future plans to support stacking additional > security modules on the LSM interface? That's more of a question for linux-security-module rather than this list. We don't have any plans to introduce such support to LSM, as we think it is a bad idea. Last time it came up (at 2006 kernel summit), that seemed to be the consensus view. > Alternatively, are there any current or future plans to allow the > SELinux framework to be expanded with third party loadable modules? Not loadable modules, no. But adding further security models to the SELinux security server or extending the ones that are already there is certainly open to discussion, if a case can be made for it. However, you may find that the existing models are sufficient to support the right set of goals at the kernel level, and then you can build additional infrastructure in userspace without needing to modify the kernel's model. > We are working on some enhanced security solutions that require access > to the LSM interface, but we do not want to preclude the use of > SELinux by our customers. What do you need that you can't obtain from SELinux or other kernel subsystems (e.g. audit) today? -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-16 18:08 Current/Future Plans to Support Stacking LSM Modules Tom Fortmann 2007-01-16 18:27 ` Stephen Smalley @ 2007-01-16 18:46 ` Casey Schaufler [not found] ` <45AF5539.2020608@novell.com> 1 sibling, 1 reply; 15+ messages in thread From: Casey Schaufler @ 2007-01-16 18:46 UTC (permalink / raw) To: Tom Fortmann, selinux; +Cc: linux-security-module --- Tom Fortmann <tfortmann@xcapesolutions.net> wrote: > Are their any current or future plans to support > stacking additional > security modules on the LSM interface? It has certainly been considered from time to time. David Wheeler's early work came pretty close. > Alternatively, are there any current or future plans > to allow the SELinux > framework to be expanded with third party loadable > modules? SELinux does currently, although somewhat begrudgingly, allow limited stacking in support of a particular set of modules. It wasn't but a year ago that the SELinux community was arguing that LSM ought to be dispensed with, as they argued that: - No one else was using LSM - SELinux does everything that a rational being might want done anyway. > We are working on some enhanced security solutions > that require access to > the LSM interface, but we do not want to preclude > the use of SELinux by our > customers. You might take this onto the LSM list (I've added it to the CC here) as there are a (very) few people who follow LSM that do not subscribe here. Just out of curiosity, what's your module going to do? Casey Schaufler casey@schaufler-ca.com -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
[parent not found: <45AF5539.2020608@novell.com>]
* Re: Current/Future Plans to Support Stacking LSM Modules [not found] ` <45AF5539.2020608@novell.com> @ 2007-01-18 12:50 ` Stephen Smalley [not found] ` <45AF7643.3080200@novell.com> 0 siblings, 1 reply; 15+ messages in thread From: Stephen Smalley @ 2007-01-18 12:50 UTC (permalink / raw) To: Crispin Cowan; +Cc: casey, Tom Fortmann, selinux, linux-security-module On Thu, 2007-01-18 at 22:08 +1100, Crispin Cowan wrote: > Casey Schaufler wrote: > > --- Tom Fortmann <tfortmann@xcapesolutions.net> wrote: > > > >> Are their any current or future plans to support > >> stacking additional > >> security modules on the LSM interface? > >> > > It has certainly been considered from > > time to time. David Wheeler's early work > > came pretty close. > > > There is a module waiting in the wings called Stacker > <http://sourceforge.net/projects/lsm-stacker> that is designed to > automatically stack multiple modules. Considerable design, > implementation, and measurement has gone into Stacker. The main thing > stalling the upstreaming of Stacker is for some modules other than > SELinux to be accepted upstream. With the number of modules vying for > that, it seems just a matter of time. Except that at the last kernel summit, the topic came up during the LSM panel, and everyone on the panel, including the AppArmor person, agreed that stacking wasn't necessary or desirable. -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
[parent not found: <45AF7643.3080200@novell.com>]
* Re: Current/Future Plans to Support Stacking LSM Modules [not found] ` <45AF7643.3080200@novell.com> @ 2007-01-18 13:53 ` Stephen Smalley 2007-01-18 16:36 ` Casey Schaufler 2007-01-18 17:28 ` Serge E. Hallyn 0 siblings, 2 replies; 15+ messages in thread From: Stephen Smalley @ 2007-01-18 13:53 UTC (permalink / raw) To: Crispin Cowan; +Cc: casey, Tom Fortmann, selinux, linux-security-module On Fri, 2007-01-19 at 00:29 +1100, Crispin Cowan wrote: > Stephen Smalley wrote: > > On Thu, 2007-01-18 at 22:08 +1100, Crispin Cowan wrote: > > > >> There is a module waiting in the wings called Stacker > >> <http://sourceforge.net/projects/lsm-stacker> that is designed to > >> automatically stack multiple modules. Considerable design, > >> implementation, and measurement has gone into Stacker. The main thing > >> stalling the upstreaming of Stacker is for some modules other than > >> SELinux to be accepted upstream. With the number of modules vying for > >> that, it seems just a matter of time. > >> > > Except that at the last kernel summit, the topic came up during the LSM > > panel, and everyone on the panel, including the AppArmor person, agreed > > that stacking wasn't necessary or desirable. > > > Hmmm, that is surprising. I have to assume you meant " ... at this > time." That wasn't my impression - the question raised was along the lines of "even if we can't settle the LSM issue once for all, can we at least settle the issue of LSM stacking." And the consensus view seemed to be that generic stacking of security modules is not the way to go; security modules need to be aware of the composition and its implications, as in the existing manual stacking of SELinux with capabilities or AppArmor with capabilities. > With relatively few modules around, a full blown stacking > architecture is excessive. But as the number and variety of modules > grows, the need for Stacker will increase. That stacking was given such > limited support in the LSM design was precisely because I saw it as a > "later" kind of thing, and we could avoid the initial complexity. I only know of one other security module that is under consideration for upstream, slim. > Clearly stacking AppArmor and SELinux together is pointless, but if > Stacker was upstream, then perhaps the LSPP work going on could be done > as a pure LSM module that can stack with something else, so it could > compose with SELinux, AppArmor, LIDS, etc. instead of just with SELinux. > By now, of course, all sorts of SELinux-specific assumptions are built > into the work, but I doubt that they are fundamental. To the contrary, the LSPP work significantly leverages the work already done to integrate SELinux and makes use of the SELinux interfaces for applications. It also leverages SELinux TE to address aspects such as MLS overrides. By doing it within the context of SELinux, it gained the benefit of a unified security model and interface. Which one doesn't get from LSM. -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-18 13:53 ` Stephen Smalley @ 2007-01-18 16:36 ` Casey Schaufler 2007-01-18 16:53 ` Karl MacMillan 2007-01-18 17:28 ` Serge E. Hallyn 1 sibling, 1 reply; 15+ messages in thread From: Casey Schaufler @ 2007-01-18 16:36 UTC (permalink / raw) To: Stephen Smalley, Crispin Cowan; +Cc: selinux, linux-security-module --- Stephen Smalley <sds@tycho.nsa.gov> wrote: > To the contrary, the LSPP work significantly > leverages the work already > done to integrate SELinux and makes use of the > SELinux interfaces for > applications. It also leverages SELinux TE to > address aspects such as > MLS overrides. By doing it within the context of > SELinux, it gained the > benefit of a unified security model and interface. > Which one doesn't get from LSM. There are others who would argue that SELinux has abandoned the Linux privilege model and thus disrupted the unity of the existing security model. I don't understand why the SELinux crew seems so intent on making it difficult to implement alternatives. Last year it was "let's ditch LSM". Now it's "Everyone hates stacking". Give it a rest already. Casey Schaufler casey@schaufler-ca.com -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-18 16:36 ` Casey Schaufler @ 2007-01-18 16:53 ` Karl MacMillan 2007-01-18 18:12 ` Casey Schaufler 0 siblings, 1 reply; 15+ messages in thread From: Karl MacMillan @ 2007-01-18 16:53 UTC (permalink / raw) To: casey; +Cc: Stephen Smalley, Crispin Cowan, selinux, linux-security-module Casey Schaufler wrote: > --- Stephen Smalley <sds@tycho.nsa.gov> wrote: > > >> To the contrary, the LSPP work significantly >> leverages the work already >> done to integrate SELinux and makes use of the >> SELinux interfaces for >> applications. It also leverages SELinux TE to >> address aspects such as >> MLS overrides. By doing it within the context of >> SELinux, it gained the >> benefit of a unified security model and interface. >> Which one doesn't get from LSM. > > There are others who would argue that SELinux > has abandoned the Linux privilege model and > thus disrupted the unity of the existing > security model. > No clue what this means. > I don't understand why the SELinux crew seems > so intent on making it difficult to implement > alternatives. Last year it was "let's ditch LSM". > Now it's "Everyone hates stacking". Give it a > rest already. > 1) Stacking is possible now, just not arbitrary stacking by an admin. 2) Not having arbitrary stacking in no way limits alternatives. It just forces the use of a single alternative at a time or explicit development to make alternatives work together. 3) The objections, if you read them, are about whether the correctness of arbitrarily stacked modules can be reasonably expected or verified. It is not an effort to limit alternatives. There are real disagreements here, but please stop overstating the differences and misconstruing (willfully?) peoples positions. Karl -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-18 16:53 ` Karl MacMillan @ 2007-01-18 18:12 ` Casey Schaufler 2007-01-18 18:50 ` Serge E. Hallyn 2007-01-18 20:29 ` Stephen Smalley 0 siblings, 2 replies; 15+ messages in thread From: Casey Schaufler @ 2007-01-18 18:12 UTC (permalink / raw) To: Karl MacMillan; +Cc: selinux, linux-security-module --- Karl MacMillan <kmacmill@redhat.com> wrote: > > There are others who would argue that SELinux > > has abandoned the Linux privilege model and > > thus disrupted the unity of the existing > > security model. > > > > No clue what this means. Pre-SE Linux has a rational and well established security model that includes DAC and Privilege. The capability scheme is designed to fit that model, adding the logical extention from the POSIX statements of "appropruate privilege" to defining what those privileges would be. SELinux does not use capabilities to identify where "policy" is excepted, rather it defines policy in such a way as to make the notion of exception unnecessary. Many people think this is good. I personally like the traditional scheme, and would be happier with SELinux if it held to it. > > I don't understand why the SELinux crew seems > > so intent on making it difficult to implement > > alternatives. Last year it was "let's ditch LSM". > > Now it's "Everyone hates stacking". Give it a > > rest already. > > > > 1) Stacking is possible now, just not arbitrary > stacking by an admin. True enough, although I have to say that it isn't a pleasant exercise. > 2) Not having arbitrary stacking in no way limits > alternatives. It just > forces the use of a single alternative at a time or > explicit development > to make alternatives work together. Funny thing is that I would agree with you 100% if LSM implemented authoritative hooks. Since LSM implements a scheme that is supposed to provide strictly for additional restrictions it should be simple to stack modules safely. > 3) The objections, if you read them, are about > whether the correctness > of arbitrarily stacked modules can be reasonably > expected or verified. > It is not an effort to limit alternatives. Restictive LSM modules ought to be completely stackable if they are in fact strictly restrictive. That there are issues says that the scheme may not be being used correctly. I honestly don't know if that's worth the trouble of fixing. > There are real disagreements here, but please stop > overstating the > differences and misconstruing (willfully?) peoples > positions. SELinux is a Good Thing for any number of reasons. There are also other schemes that have merit. Just as I encouraged the NSA to adopt Linux and do their own security work back in the late 20th century I hope to encourage newcomers to LSM to follow through with their ideas and come up with the next great thing. Assimilation into SELinux can come later if it's of value. Maybe you can do a bunch of this stuff using SELinux as a framework instead of LSM, but I think that if someone wants to use LSM as a base that is their call, and I personally would like to see what they do because I don't believe for a minute that the "problem" of system security is solved. Casey Schaufler casey@schaufler-ca.com -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-18 18:12 ` Casey Schaufler @ 2007-01-18 18:50 ` Serge E. Hallyn 2007-01-18 19:30 ` Casey Schaufler 2007-01-18 20:29 ` Stephen Smalley 1 sibling, 1 reply; 15+ messages in thread From: Serge E. Hallyn @ 2007-01-18 18:50 UTC (permalink / raw) To: Casey Schaufler; +Cc: Karl MacMillan, selinux, linux-security-module Quoting Casey Schaufler (casey@schaufler-ca.com): > > --- Karl MacMillan <kmacmill@redhat.com> wrote: > > > > There are others who would argue that SELinux > > > has abandoned the Linux privilege model and > > > thus disrupted the unity of the existing > > > security model. > > > > > > > No clue what this means. > > Pre-SE Linux has a rational and well > established security model that includes > DAC and Privilege. The capability scheme > is designed to fit that model, adding the > logical extention from the POSIX statements > of "appropruate privilege" to defining what > those privileges would be. > > SELinux does not use capabilities to identify > where "policy" is excepted, rather it defines > policy in such a way as to make the notion of > exception unnecessary. Many people think this > is good. I personally like the traditional > scheme, and would be happier with SELinux if > it held to it. > > > > I don't understand why the SELinux crew seems > > > so intent on making it difficult to implement > > > alternatives. Last year it was "let's ditch LSM". > > > Now it's "Everyone hates stacking". Give it a > > > rest already. > > > > > > > 1) Stacking is possible now, just not arbitrary > > stacking by an admin. > > True enough, although I have to say that it > isn't a pleasant exercise. > > > 2) Not having arbitrary stacking in no way limits > > alternatives. It just > > forces the use of a single alternative at a time or > > explicit development > > to make alternatives work together. > > Funny thing is that I would agree with you 100% > if LSM implemented authoritative hooks. Since > LSM implements a scheme that is supposed to > provide strictly for additional restrictions > it should be simple to stack modules safely. An example where that is not the case is if LSM 2 needs to label a file as 'toptopsecret noone may touch this', but LSM 1 has marked claimed that the user may not write an xattr. So now the user's info can be leaked. -serge -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-18 18:50 ` Serge E. Hallyn @ 2007-01-18 19:30 ` Casey Schaufler 0 siblings, 0 replies; 15+ messages in thread From: Casey Schaufler @ 2007-01-18 19:30 UTC (permalink / raw) To: Serge E. Hallyn; +Cc: selinux, linux-security-module --- "Serge E. Hallyn" <serue@us.ibm.com> wrote: > > Funny thing is that I would agree with you 100% > > if LSM implemented authoritative hooks. Since > > LSM implements a scheme that is supposed to > > provide strictly for additional restrictions > > it should be simple to stack modules safely. > > An example where that is not the case is if LSM 2 > needs to label > a file as 'toptopsecret noone may touch this', but > LSM 1 has > marked claimed that the user may not write an xattr. > So now > the user's info can be leaked. This is only an issue if LSM 2 puts "toptop..." data into the file prior to setting the label on the file, which I would argue ought not happen. If you're refering to the case where someone discovers toptop... data in an existing 'sure go ahead everyone read this' file and they want to relabel it I say that the described behavior is, however unfortunate, correct. There have been sucessful MLS systems on which users were not allowed to relabel files. If an LSM is correct within its own rules, such as the MLS reality that the container has to be labeled before the data goes in, and that the creation would fail if it couldn't live up to its rules, the situation described will not be a security problem. It will be a operational problem, and the admin who decided that she wanted both mechanisms may have a tough choice, just as she does when she puts too many layers of spam filtering in place and nothing from lkml gets through anymore. Reminds me of changing planes at Heathrow, where half the people had too much luggage to go through security, but had already gone through once at the previous airport. Casey Schaufler casey@schaufler-ca.com -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-18 18:12 ` Casey Schaufler 2007-01-18 18:50 ` Serge E. Hallyn @ 2007-01-18 20:29 ` Stephen Smalley 2007-01-18 21:32 ` Casey Schaufler 1 sibling, 1 reply; 15+ messages in thread From: Stephen Smalley @ 2007-01-18 20:29 UTC (permalink / raw) To: casey; +Cc: Karl MacMillan, selinux, linux-security-module On Thu, 2007-01-18 at 10:12 -0800, Casey Schaufler wrote: > --- Karl MacMillan <kmacmill@redhat.com> wrote: > > > > There are others who would argue that SELinux > > > has abandoned the Linux privilege model and > > > thus disrupted the unity of the existing > > > security model. > > > > > > > No clue what this means. > > Pre-SE Linux has a rational and well > established security model that includes > DAC and Privilege. The capability scheme > is designed to fit that model, adding the > logical extention from the POSIX statements > of "appropruate privilege" to defining what > those privileges would be. > > SELinux does not use capabilities to identify > where "policy" is excepted, rather it defines > policy in such a way as to make the notion of > exception unnecessary. Many people think this > is good. I personally like the traditional > scheme, and would be happier with SELinux if > it held to it. If the argument is that we should favor the traditional over the good, then I think you've lost your case. Besides, Type Enforcement has quite a bit of history behind it, coming from at least the LOCK work in the early 80s, with the underlying origins traceable to the Lampson ('71) and Linden ('76) papers, so let's compare traditions, shall we? > Restictive LSM modules ought to be completely > stackable if they are in fact strictly > restrictive. Strictly restrictive relative to base Linux DAC, but not necessarily to one another. See the issues noted in the next-to-last para of: http://www.nsa.gov/selinux/papers/module/x341.html Also, getting the stacker module correct even for the "simple" combination of capabilities and SELinux was surprisingly difficult - see the lsm list archives for the history of that. Serge made a valiant effort of fixing each issue as I discovered them, but the history shows that it isn't as trivial as one might think. -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-18 20:29 ` Stephen Smalley @ 2007-01-18 21:32 ` Casey Schaufler 2007-01-23 23:24 ` Russell Coker 0 siblings, 1 reply; 15+ messages in thread From: Casey Schaufler @ 2007-01-18 21:32 UTC (permalink / raw) To: Stephen Smalley, casey; +Cc: Karl MacMillan, selinux, linux-security-module --- Stephen Smalley <sds@tycho.nsa.gov> wrote: > If the argument is that we should favor the > traditional over the good, > then I think you've lost your case. Ah, but you see, the fact that something is traditional does not necessarily make it bad! Call me an old fuddy duddy, but I actually prefer MAC+Cap to TE. I understand that many people prefer TE and that's OK with me. > Besides, Type Enforcement has quite > a bit of history behind it, coming from > at least the LOCK work in the > early 80s, with the underlying origins traceable to > the Lampson ('71) > and Linden ('76) papers, so let's compare > traditions, shall we? If you like, although we really should have a couple beers and an audience for that. > > Restictive LSM modules ought to be completely > > stackable if they are in fact strictly > > restrictive. > > Strictly restrictive relative to base Linux DAC, but > not necessarily to > one another. See the issues noted in the > next-to-last para of: > http://www.nsa.gov/selinux/papers/module/x341.html Yup, the shared blob is the trick to stacking. > Also, getting the stacker module correct even for > the "simple" > combination of capabilities and SELinux was > surprisingly difficult - see > the lsm list archives for the history of that. > Serge made a valiant > effort of fixing each issue as I discovered them, > but the history shows > that it isn't as trivial as one might think. It's true that the Capabilities stacking in SELinux points out some important issues. Given the mixture of privilege models its tough to see a better approach. Casey Schaufler casey@schaufler-ca.com -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-18 21:32 ` Casey Schaufler @ 2007-01-23 23:24 ` Russell Coker 2007-01-24 16:09 ` Paul Moore 0 siblings, 1 reply; 15+ messages in thread From: Russell Coker @ 2007-01-23 23:24 UTC (permalink / raw) To: casey; +Cc: Stephen Smalley, selinux On Friday 19 January 2007 08:32, Casey Schaufler <casey@schaufler-ca.com> wrote: > > and Linden ('76) papers, so let's compare > > traditions, shall we? > > If you like, although we really should have > a couple beers and an audience for that. Casey vs sds at the next SE Linux Symposium dinner? Should be more exciting than Casey vs Joshua at the first SE Linux Symposium dinner! -- russell@coker.com.au http://etbe.blogspot.com/ My Blog http://www.coker.com.au/sponsorship.html Sponsoring Free Software development -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-23 23:24 ` Russell Coker @ 2007-01-24 16:09 ` Paul Moore 0 siblings, 0 replies; 15+ messages in thread From: Paul Moore @ 2007-01-24 16:09 UTC (permalink / raw) To: selinux On Tuesday, January 23 2007 6:24 pm, Russell Coker wrote: > Casey vs sds at the next SE Linux Symposium dinner? Should be more > exciting than Casey vs Joshua at the first SE Linux Symposium dinner! Where is Don King when you need him ;) -- paul moore linux security @ hp -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Current/Future Plans to Support Stacking LSM Modules 2007-01-18 13:53 ` Stephen Smalley 2007-01-18 16:36 ` Casey Schaufler @ 2007-01-18 17:28 ` Serge E. Hallyn 1 sibling, 0 replies; 15+ messages in thread From: Serge E. Hallyn @ 2007-01-18 17:28 UTC (permalink / raw) To: Stephen Smalley Cc: Crispin Cowan, casey, Tom Fortmann, selinux, linux-security-module Quoting Stephen Smalley (sds@tycho.nsa.gov): > On Fri, 2007-01-19 at 00:29 +1100, Crispin Cowan wrote: > > Stephen Smalley wrote: > > > On Thu, 2007-01-18 at 22:08 +1100, Crispin Cowan wrote: > > > > > >> There is a module waiting in the wings called Stacker > > >> <http://sourceforge.net/projects/lsm-stacker> that is designed to > > >> automatically stack multiple modules. Considerable design, > > >> implementation, and measurement has gone into Stacker. The main thing > > >> stalling the upstreaming of Stacker is for some modules other than > > >> SELinux to be accepted upstream. With the number of modules vying for > > >> that, it seems just a matter of time. > > >> > > > Except that at the last kernel summit, the topic came up during the LSM > > > panel, and everyone on the panel, including the AppArmor person, agreed > > > that stacking wasn't necessary or desirable. > > > > > Hmmm, that is surprising. I have to assume you meant " ... at this > > time." > > That wasn't my impression - the question raised was along the lines of > "even if we can't settle the LSM issue once for all, can we at least > settle the issue of LSM stacking." And the consensus view seemed to be > that generic stacking of security modules is not the way to go; security Yup, that was the conclusion at kernel summit. > modules need to be aware of the composition and its implications, as in > the existing manual stacking of SELinux with capabilities or AppArmor > with capabilities. That's always been one of the cons to stacker, but I think at kernel summit the main reason for the decision was simply the lack of users. Now it's possible that if we end up with legitimate users, the issue will be revisited, but even I understand the meaning of the word 'futility' and have stopped maintaining stacker. > > With relatively few modules around, a full blown stacking > > architecture is excessive. But as the number and variety of modules > > grows, the need for Stacker will increase. That stacking was given such > > limited support in the LSM design was precisely because I saw it as a > > "later" kind of thing, and we could avoid the initial complexity. > > I only know of one other security module that is under consideration for > upstream, slim. > > > Clearly stacking AppArmor and SELinux together is pointless, but if > > Stacker was upstream, then perhaps the LSPP work going on could be done > > as a pure LSM module that can stack with something else, so it could > > compose with SELinux, AppArmor, LIDS, etc. instead of just with SELinux. > > By now, of course, all sorts of SELinux-specific assumptions are built > > into the work, but I doubt that they are fundamental. > > To the contrary, the LSPP work significantly leverages the work already > done to integrate SELinux and makes use of the SELinux interfaces for > applications. It also leverages SELinux TE to address aspects such as > MLS overrides. By doing it within the context of SELinux, it gained the > benefit of a unified security model and interface. Which one doesn't > get from LSM. Yup, and in addition to pre-existing userspace and kernel pieces, the selinux community was very helpful in development during the lspp work. -serge -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message. ^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2007-01-24 16:08 UTC | newest]
Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-01-16 18:08 Current/Future Plans to Support Stacking LSM Modules Tom Fortmann
2007-01-16 18:27 ` Stephen Smalley
2007-01-16 18:46 ` Casey Schaufler
[not found] ` <45AF5539.2020608@novell.com>
2007-01-18 12:50 ` Stephen Smalley
[not found] ` <45AF7643.3080200@novell.com>
2007-01-18 13:53 ` Stephen Smalley
2007-01-18 16:36 ` Casey Schaufler
2007-01-18 16:53 ` Karl MacMillan
2007-01-18 18:12 ` Casey Schaufler
2007-01-18 18:50 ` Serge E. Hallyn
2007-01-18 19:30 ` Casey Schaufler
2007-01-18 20:29 ` Stephen Smalley
2007-01-18 21:32 ` Casey Schaufler
2007-01-23 23:24 ` Russell Coker
2007-01-24 16:09 ` Paul Moore
2007-01-18 17:28 ` Serge E. Hallyn
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.