All of lore.kernel.org
 help / color / mirror / Atom feed
From: Karl MacMillan <kmacmillan@mentalrootkit.com>
To: Joshua Brindle <jbrindle@tresys.com>
Cc: SE Linux <selinux@tycho.nsa.gov>, Stephen Smalley <sds@tycho.nsa.gov>
Subject: Re: [RFC] 0/4 - Hierarchal apache policy for reference policy
Date: Thu, 18 Jan 2007 13:40:24 -0500	[thread overview]
Message-ID: <45AFBF18.3080004@mentalrootkit.com> (raw)
In-Reply-To: <45AFB433.1010309@tresys.com>

Joshua Brindle wrote:
> Karl MacMillan wrote:
>> Joshua Brindle wrote:
>>> This is an RFC for policy allowing management delegation through 
>>> hierarchical types.
>>>
>>> Policy management often is handled by different administrators, based 
>>> on the application or applications that are being governed. As a 
>>> result, providing a means to delegate access to manage only certain 
>>> aspects of policy is desirable, and can be accomplished using 
>>> hierarchical types.
>>>
>>> The proof of concept apache policy module illustrates policy 
>>> management delegation through hierarchical types. This example apache 
>>> policy works together with an adds metapolicy to the apache module
>>
>> It's good to see progress on this and a real fleshed-out example. I 
>> look forward to seeing the prototype policy server.
>>
>> I think the biggest hurdle to this gaining widespread use is the 
>> length of the meta-policy, especially since it essentially repeats the 
>> policy for the sub-types. Any ideas about how to shorten this policy?
>>
> 
> nit: the meta-policy is short (5 lines). The policy itself is longer due 
> to the propagation of rules to children types.
> 

Fine - but that answer the question. Having to define container types 
with a superset of the rules results in a much longer policy. I think 
that it is going to be hard to convince people to add that policy.

>> The other large issue, of course, is that this demonstrates how 
>> invasive the policy changes are in order to support delegation. This 
>> makes it very difficult for a policy admin to create a separate policy 
>> module that a) places hierarchical restrictions on a set of types and 
>> b) delegates administrative privileges to an admin type to make 
>> changes to those types.
>>
> 
> I'm not sure how desirable ad-hoc delegation is.

It is not ad-hoc, it is just not done by the distribution or upstream.

  Just like normal policy
> meta policy needs to be well thought out in order to meet specific 
> security goals (and do so without allowing bypass, etc).
> 

Sure, but that doesn't mean that an administrator can't do this. The 
upstream refpolicy and / or distributions cannot meet all of the users 
needs - I'm just suggesting that we make it possible for people to do 
customization. It is their responsibility to do a good job at that point.

The alternative (take what is given or leave it) is not very attractive 
if it doesn't meet your needs.

>> My guess is that for real administrative roles to become viable in 
>> SELinux they are going to be largely site-defined in loadable modules 
>> (and the work at RH along those lines is using that as a starting 
>> assumption). So some way to support that seems necessary. At the very 
>> least I think that decoupling the hierarchical restrictions from the 
>> identifier names is needed. This also makes hierarchy work better with 
>> reference policy scoping.
>>
> 
> I don't know if I believe this, all of our experience with making 
> administrative roles is that it is difficult, we know, for example, that 
> the secadm and sysadm roles are hardly separate and there are trivial 
> bypasses that the sysadm role can use to gain secadm type access.
> 

I don't think that secadm and sysadm are representative because they 
both end up touching files / processes that could potentially allow 
bypass. Allowing an admin to only run adduser or write to web pages is 
much simpler.

Just because it is hard doesn't mean that it shouldn't be possible to be 
done by admins.

Also, this customization might be done with tools that help them get it 
right. In that case, the customization still to land in a module.

> Decoupling the hierarchy from the identifier seems like it would make 
> understanding the hierarchy and the resulting metapolicy very difficult.
> 

I'm not certain that determining the hierarchy tree is the limiting 
factor in terms of understandability.

Much more important to me is that it means that customization will 
almost always require changes to the original policy. I just don't think 
that is supportable.

Karl


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2007-01-18 18:40 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-01-18 16:30 [RFC] 0/4 - Hierarchal apache policy for reference policy Joshua Brindle
2007-01-18 17:18 ` Karl MacMillan
2007-01-18 17:53   ` Joshua Brindle
2007-01-18 18:40     ` Karl MacMillan [this message]
2007-01-18 19:40       ` Stephen Smalley
2007-01-18 19:55         ` Karl MacMillan
2007-01-18 20:00           ` Joshua Brindle
2007-01-18 20:24             ` Stephen Smalley
2007-01-18 20:31               ` Stephen Smalley
2007-01-18 21:16               ` Joshua Brindle
2007-01-18 21:24                 ` Karl MacMillan
2007-01-18 21:44                   ` Joshua Brindle
2007-01-19 16:55                     ` Karl MacMillan
2007-01-25 21:17                       ` Daniel J Walsh

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=45AFBF18.3080004@mentalrootkit.com \
    --to=kmacmillan@mentalrootkit.com \
    --cc=jbrindle@tresys.com \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.