All of lore.kernel.org
 help / color / mirror / Atom feed
From: Casey Schaufler <casey@schaufler-ca.com>
To: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Cc: jmorris@namei.org, linux-security-module@vger.kernel.org,
	selinux@tycho.nsa.gov, john.johansen@canonical.com,
	eparis@redhat.com, keescook@chromium.org,
	Casey Schaufler <casey@schaufler-ca.com>
Subject: Re: [PATCH v10] LSM: Multiple concurrent LSMs
Date: Wed, 12 Dec 2012 07:48:39 -0800	[thread overview]
Message-ID: <50C8A757.3050907@schaufler-ca.com> (raw)
In-Reply-To: <201212122159.CEC09839.HMOFtQFLJSVFOO@I-love.SAKURA.ne.jp>

On 12/12/2012 4:59 AM, Tetsuo Handa wrote:
> Casey Schaufler wrote:
>> On 12/11/2012 4:28 AM, Tetsuo Handa wrote:
>>> CONFIG_SECURITY_PRESENT must be always PRESENT_FIRST and only one LSM module
>>> which provides ops->getprocattr and/or ops->setprocattr is allowed to register.
>> No.
>> Absolutely not.
>>
>> That restriction would make composing security modules completely
>> useless. At least for me. Sorry, but Smack + AppArmor is one of my
>> success criteria. I have introduced a smackfs/current interface
>> in this patch, but I plan to abandon that in favor of the enhanced
>> proc/.../attr entries we've been discussing.
> My suggestion was
>
>   Step 1: Start LSM stacking without supporting "SELinux + AppArmor" or
>           "SMACK + AppArmor".

I will repeat myself.

No.
Absolutely not.

>   Step 2: Wait for a year or so for migrating from conflicting /proc/pid/attr/
>           interface to non-conflicting interfaces.

No. I don't have another year to wait. Were I willing to wait
I'd have let someone else try to wrestle this elephant.

>   Step 3: Kill conflicting /proc/pid/attr/ interface and support
>           "SELinux + AppArmor" or "SMACK + AppArmor" so that not-yet-migrated
>           userspace tools no longer recognize that "LSM is enabled" rather than
>           recognize that "LSM is enabled" but cannot work correctly.

The problem here is that I can't kill the old interfaces. Ever.
Some 2nd Lieutenant in Gaithersburg is busy installing a RHEL system
right now for which he spent the past two years getting approval.
It has classified programs on it. It will run until he makes Colonel.
The "security interfaces" will not change, and that means no updates
once the old attr interfaces go away. 

>
> but your will is
>
>   Step 1: Start LSM stacking with supporting "SELinux + AppArmor" or
>           "SMACK + AppArmor" with tolerating malfunctioningly working userspace
>           tools.

You're suggesting that we don't change the kernel until the
applications are fixed. No one is going to change the applications
until the kernel is fixed.

>
> isn't it?
>
> I suggested you to *eventually* break not-yet-migrated userspace tools in order
> to *eventually* make it possible to stack "SELinux + AppArmor" or
> "SMACK + AppArmor". 
>
> You purposely *immediately* break non-present LSM module's userspace tools in
> order to *immediately* make it possible to stack "SELinux + AppArmor" or
> "SMACK + AppArmor".
>
> But I'm fine with your will provided that SELinux/SMACK/AppArmor developers and
> their users can agree with your will.

I'm also making development of tools for the multiple LSM case
possible. Someone has to lead.

>> I have not given up hope on secid using LSM combinations, either.
>> I really would prefer that there be no limitations.
>>
>>
>>> This is a mandatory requirement for not to break userspace tools for
>>> non-present LSM modules by supplying /proc/pid/attr/ interface that is
>>> malfunction for non-present LSM modules.
> --
> To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  parent reply	other threads:[~2012-12-12 15:48 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <50C65DE2.5090909@schaufler-ca.com>
     [not found] ` <201212112128.ADI26010.OQJVLOFSOFtHMF@I-love.SAKURA.ne.jp>
2012-12-11 15:31   ` [PATCH v10] LSM: Multiple concurrent LSMs Casey Schaufler
     [not found]     ` <201212122159.CEC09839.HMOFtQFLJSVFOO@I-love.SAKURA.ne.jp>
2012-12-12 15:48       ` Casey Schaufler [this message]
2012-12-12 15:55         ` Eric Paris
2012-12-12 16:24           ` Casey Schaufler
2012-12-12 16:33             ` Eric Paris
2012-12-12 17:04               ` Casey Schaufler
2012-12-12 17:11                 ` Eric Paris
     [not found]                   ` <CAGXu5jLf+apZK5poD6GKzLkC+p6+mAqKhU3neoOZjr2JumvmpA@mail.gmail.com>
2012-12-12 17:22                     ` Eric Paris
2012-12-12 17:31                   ` Casey Schaufler
2012-12-12 17:47                     ` Eric Paris
2012-12-12 18:25                       ` Casey Schaufler
2012-12-12 18:47                         ` Eric Paris
2012-12-12 20:46                           ` Casey Schaufler
2012-12-12 20:51                             ` Eric Paris
2012-12-12 22:01                               ` Casey Schaufler
     [not found]                 ` <201212132106.AFI82338.QMFHFLSJOtOOFV@I-love.SAKURA.ne.jp>
2012-12-13 16:12                   ` Eric Paris
2012-12-13 16:31                     ` Casey Schaufler
     [not found]                       ` <CAGXu5jJf4NEvs6TjVCBxgd9e8cGwag_-viEntgTBUq85fULr8w@mail.gmail.com>
2012-12-16  3:06                         ` Casey Schaufler
     [not found]                     ` <201212142326.DDG90674.SFHFMOOVLFJtQO@I-love.SAKURA.ne.jp>
2012-12-14 15:07                       ` Eric Paris
2012-12-13 16:38                   ` Casey Schaufler

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=50C8A757.3050907@schaufler-ca.com \
    --to=casey@schaufler-ca.com \
    --cc=eparis@redhat.com \
    --cc=jmorris@namei.org \
    --cc=john.johansen@canonical.com \
    --cc=keescook@chromium.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=penguin-kernel@I-love.SAKURA.ne.jp \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.