From: Joshua Brindle <brindle@quarksecurity.com>
To: Paul Moore <paul@paul-moore.com>
Cc: James Morris <james.l.morris@oracle.com>,
linux-security-module@vger.kernel.org,
"selinux@tycho.nsa.gov" <selinux@tycho.nsa.gov>,
Stephen Smalley <sds@tycho.nsa.gov>
Subject: Re: [PATCH 0/2] selinux: add targeted whitelisting of ioctl commands.
Date: Thu, 21 May 2015 10:41:57 -0400 [thread overview]
Message-ID: <555DEEB5.9060602@quarksecurity.com> (raw)
In-Reply-To: <CAHC9VhRBD7W+oA3nZ3WDAQUYFg88n1WzrshRJGE_+XMKkMYUtw@mail.gmail.com>
Paul Moore wrote:
> On Thu, May 21, 2015 at 10:23 AM, Joshua Brindle
> <brindle@quarksecurity.com> wrote:
>> Paul Moore wrote:
>>> You've got the ioctl numbers in the binary policy, which are the same
>>> numbers used in the policy representation, which are also the same
>>> numbers used by applications actually making use of the ioctl()
>>> syscall. Other than the fact that these things are numbers and not a
>>> more conventional label string, I don't understand the problem.
>> That is precisely the problem. I'd like any extra symbolic information
>> (e.g., calling this range of ioctls gpu_op) preserved and not thrown away by
>> m4.
>>
>> Some of us work on binary only systems where we don't get to see the source
>> code of the applications or the policy.
>
> Sorry, I keep forgetting you are special. Thanks for the multiple reminders.
>
> I suggest talking with James and the CIL folks to arrive at some
> solution that works well with CIL, whatever that might be. As for the
> checkpolicy based policy, I think m4 is just fine if folks want to use
> it; there is no requirement that m4 must be used for this.
>
> Further, if we do need to introduce some attribute like construct for
> these operations/ranges/permissions/whatever-we-call-them, I'm okay
> adding that in a future patchset, I see no reason to hold up this
> initial work for that.
It seems like some adjustments are being made anyway. I wish I'd brought
this up when the patches were first posted so it is definitely my fault
if it doesn't happen.
I doubt you'd want to be on the hook to analyze a policy that just dumps
a wall of hex values instead of descriptive symbols though. This is the
exact reason that attribute names are now preserved in the kernel
binary, despite the kernel not needing them.
next prev parent reply other threads:[~2015-05-21 14:41 UTC|newest]
Thread overview: 36+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-04-09 21:48 [PATCH 0/2] selinux: add targeted whitelisting of ioctl commands Jeff Vander Stoep
2015-04-09 23:03 ` Jeffrey Vander Stoep
2015-04-22 22:18 ` Jeffrey Vander Stoep
2015-04-23 22:28 ` Paul Moore
2015-04-24 15:02 ` Jeffrey Vander Stoep
2015-05-20 20:04 ` Paul Moore
2015-05-20 21:56 ` Jeffrey Vander Stoep
2015-05-21 0:39 ` William Roberts
2015-05-21 2:08 ` Joshua Brindle
2015-05-21 4:17 ` Jeffrey Vander Stoep
2015-05-21 11:21 ` Paul Moore
2015-05-21 13:35 ` Joshua Brindle
2015-05-21 14:10 ` Paul Moore
2015-05-21 14:16 ` Joshua Brindle
2015-05-21 14:19 ` Paul Moore
2015-05-21 14:23 ` Joshua Brindle
2015-05-21 14:37 ` Paul Moore
2015-05-21 14:41 ` Joshua Brindle [this message]
2015-05-21 14:44 ` William Roberts
2015-05-21 14:53 ` Joshua Brindle
2015-05-21 14:56 ` William Roberts
2015-05-21 14:57 ` Joshua Brindle
2015-05-21 15:09 ` Stephen Smalley
2015-05-21 15:27 ` Joshua Brindle
2015-05-21 18:05 ` Jeffrey Vander Stoep
2015-05-22 18:12 ` Paul Moore
2015-05-21 12:37 ` Stephen Smalley
2015-05-21 12:34 ` Stephen Smalley
2015-05-21 13:43 ` James Carter
2015-05-21 13:50 ` Stephen Smalley
2015-05-21 13:54 ` Stephen Smalley
2015-05-21 14:04 ` Paul Moore
2015-05-21 14:10 ` James Carter
2015-05-21 14:11 ` Stephen Smalley
2015-05-21 14:13 ` Paul Moore
2015-05-21 14:14 ` Joshua Brindle
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=555DEEB5.9060602@quarksecurity.com \
--to=brindle@quarksecurity.com \
--cc=james.l.morris@oracle.com \
--cc=linux-security-module@vger.kernel.org \
--cc=paul@paul-moore.com \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.