From: KaiGai Kohei <kaigai@ak.jp.nec.com>
To: Stephen Smalley <sds@tycho.nsa.gov>
Cc: method@manicmethod.com, Jacques Thomas <jthomas@cs.purdue.edu>,
SE Linux <selinux@tycho.nsa.gov>,
KaiGai Kohei <kaigai@kaigai.gr.jp>
Subject: Re: [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback()
Date: Mon, 01 Mar 2010 11:43:16 +0900 [thread overview]
Message-ID: <4B8B29C4.4020708@ak.jp.nec.com> (raw)
In-Reply-To: <1266592834.32011.67.camel@moss-pluto.epoch.ncsc.mil>
(2010/02/20 0:20), Stephen Smalley wrote:
> On Fri, 2010-02-19 at 16:33 +0900, KaiGai Kohei wrote:
>> (2010/02/17 22:51), Stephen Smalley wrote:
>>> On Wed, 2010-02-17 at 08:49 +0900, KaiGai Kohei wrote:
>>>>> I'd say we revert the changeset and restore the prior behavior.
>>>>> I don't think we should impose the latter convention on policy writers.
>>>>
>>>> OK, fair enough for me.
>>>>
>>>> This patch revert the commit of 7d52a155e38d5a165759dbbee656455861bf7801
>>>> which removed a part of type_attribute_bounds_av as a dead code.
>>>> However, at that time, we didn't find out the target side boundary allows
>>>> to handle some of pseudo /proc/<pid>/* entries with its process's security
>>>> context well.
>>>
>>> Does Jacques' original concern about the code still hold true?
>>> http://marc.info/?l=selinux&m=125770868309928&w=2
>>> http://marc.info/?l=selinux&m=125851264424682&w=2
>>
>> This patch just tries to revert the changes by previous my patch,
>> and returns to the start point, so it also reverts the Jacques'
>> original concern.
>>
>> At that time, IIRC, Jacques concerned about the logic being unclear.
>> Then, I introduced two options. The one is rough; that removes boundary
>> checks in the target side. The other option tried to mask union bits of
>> both of violated permissions on subject and target side boundaries (*1).
>>
>> (*1) type_attribute_bounds_av(Sc,Tc, ...)
>> {
>> masked = 0;
>>
>> if (Sc has its bounds)
>> masked |= P(Sc,Tc)& ~P(Sp,Tc);
>>
>> if (Tc has its bounds)
>> masked |= P(Sc,Tc)& ~P(Sc,Tp);
>>
>> avd->allowed&= ~masked;
>> }
>>
>> However, the later option also requires policy writers special treatments
>> to handle pseudo file entries labeled with parent's domain.
>>
>> For example, when web server (httpd_t) launches a thread and assign an
>> individual bounded security context (webapp_t), we don't need to take
>> a special treatment to access pseudo files labeled as webapp_t in the
>> original logic.
>>
>> If we adopt the logic introduced at (*1), when we write webapp_t's policy,
>> we have to allow webapp_t domain to access files labeled as httpd_t, not
>> only webapp_t, because permissions between webapp_t and webapp_t will be
>> eventually masked by one's between httpd_t domain and webapp_t type or
>> webapp_t domain and httpd_t type.
>
> That seems wrong to me - we don't want webapp_t to be able to access
> the /proc/pid entries of other tasks running in httpd_t. We only want
> it to be able to access its own /proc/pid entries in webapp_t. Yes?
>
Sorry for the late replying, because I've been unavailable last week.
Yes, I also think it is unnatural to require webapp_t to have access
rights to /proc/pid entries labeled as httpd_t, if and when we adopt
the above logic.
However, it does not solve the matter that Jacques pointed out the
meaning of the original logic is unclear.
In addition, I pointed out the original logic can allow webapp_t
domain some permissions on the webapp_t type without permissions
of httpd_t which bounds webapp_t.
Example)
allow httpd_t httpd_t : file { read };
allow webapp_t webapp_t : file { read };
In this case, webapp_t can read from files labeled as webapp_t, and
it is not masked because httpd_t also has same permissions on itself.
It seems to me httpd_t should have permissions on webapp_t types from
the perspective of the definition of type boundary, even if we need to
modify existing security policy a bit.
(BTW, existing refpolicy does not use boundary right now.)
I think we want webapp_t to have access rights (except for ones allowed
explicitly) on the httpd_t, but it is not unnatural that httpd_t have
access rights on webapp_t types. It performs boundary of the webapp_t's
permissions as literal.
>> However, it also seems to me it is right manner to allow them explicitly
>> in the security policy, although I sent a patch to revert the changes.
>>
>> In the original logic, when httpd_t domain is allowed to access httpd_t
>> type, webapp_t domain is also allowed to access webapp_t type, although
>> httpd_t domain is not allowed to access webapp_t type.
>> It seems to me it is a case when child domain has permissions which are
>> not allowed to the parent domain.
>>
>> I reconsidered that it is a case when we should write security policy
>> explicitly. What do you think about it?
>
--
KaiGai Kohei <kaigai@ak.jp.nec.com>
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2010-03-01 2:43 UTC|newest]
Thread overview: 39+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-11-08 19:24 Type boundaries: questions on the semantics / is the enforcement correct ? Jacques Thomas
2009-11-18 2:44 ` KaiGai Kohei
2009-11-19 16:07 ` Jacques Thomas
2009-11-30 18:40 ` Jacques Thomas
2009-12-01 1:02 ` KaiGai Kohei
2009-12-01 3:53 ` Jacques Thomas
2009-12-08 19:46 ` Joshua Brindle
2010-01-15 15:51 ` Stephen Smalley
2010-01-18 10:10 ` KaiGai Kohei
2010-01-20 4:25 ` [PATCH 1/2] selinux: remove dead code in type_attribute_bounds_av() KaiGai Kohei
2010-01-20 13:33 ` Stephen Smalley
2010-01-20 16:29 ` contents of /etc/selinux/<type>/contexts/users/* Hasan Rezaul-CHR010
2010-01-20 17:33 ` Stephen Smalley
2010-01-21 6:00 ` [PATCH 1/2] selinux: remove dead code in type_attribute_bounds_av() KaiGai Kohei
2010-01-21 14:08 ` Stephen Smalley
2010-01-24 22:24 ` James Morris
2010-01-20 4:26 ` [PATCH 2/2] libsepol: remove dead code in check_avtab_hierarchy_callback() KaiGai Kohei
2010-02-05 5:42 ` KaiGai Kohei
2010-02-05 14:50 ` Stephen Smalley
2010-02-09 6:46 ` KaiGai Kohei
2010-02-16 2:36 ` KaiGai Kohei
2010-02-16 15:25 ` Stephen Smalley
2010-02-16 23:49 ` KaiGai Kohei
2010-02-17 13:51 ` Stephen Smalley
2010-02-19 7:33 ` KaiGai Kohei
2010-02-19 15:20 ` Stephen Smalley
2010-03-01 2:43 ` KaiGai Kohei [this message]
2010-03-01 14:34 ` Stephen Smalley
2010-03-03 8:09 ` KaiGai Kohei
2010-03-04 16:01 ` Joshua Brindle
2010-03-04 16:24 ` Joshua Brindle
2010-03-05 0:39 ` KaiGai Kohei
2010-03-05 14:19 ` Joshua Brindle
2010-03-05 14:25 ` Stephen Smalley
2010-03-05 14:31 ` Joshua Brindle
2010-03-08 6:56 ` KaiGai Kohei
2010-03-08 15:27 ` Joshua Brindle
2010-02-19 17:31 ` Stephen Smalley
2010-02-21 22:09 ` James Morris
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4B8B29C4.4020708@ak.jp.nec.com \
--to=kaigai@ak.jp.nec.com \
--cc=jthomas@cs.purdue.edu \
--cc=kaigai@kaigai.gr.jp \
--cc=method@manicmethod.com \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.