All of lore.kernel.org
 help / color / mirror / Atom feed
From: Casey Schaufler <casey@schaufler-ca.com>
To: Stephen Smalley <sds@tycho.nsa.gov>, casey@schaufler-ca.com
Cc: selinux@tycho.nsa.gov, James Morris <jmorris@namei.org>,
	Eric Paris <eparis@parisplace.org>,
	"Serge E. Hallyn" <serue@us.ibm.com>
Subject: Re: [RFC][PATCH] selinux:  enable authoritative granting of capabilities
Date: Tue, 12 Jun 2007 09:38:19 -0700 (PDT)	[thread overview]
Message-ID: <616061.57558.qm@web36609.mail.mud.yahoo.com> (raw)
In-Reply-To: <1181662393.17547.203.camel@moss-spartans.epoch.ncsc.mil>


--- Stephen Smalley <sds@tycho.nsa.gov> wrote:

> On Tue, 2007-06-12 at 08:08 -0700, Casey Schaufler wrote:
> ...
> > 
> > The file capabilty mechanism has been through two CC evaluations
> > for which I have the certificates, so I think that you may have
> > trouble substantiating your claim that it lacks an analyzable policy.
> 
> I'll clarify:  The file capability mechanism encodes policy in the
> filesystem state on a per-file basis,

Uh, yeah. They are stored in extended attributes. This provides
superior locality of reference. Extended attributes are a good
thing for security mechanisms, just have a read through the threads
about AA on the LSM list.

> so to analyze the effective policy
> of the system, you have to snapshot the current per-file capability
> bitmaps scattered throughout your filesystem,

You need to know where you've put them. It's not a matter of going
out and finding them, it's a matter of being careful where you
put them in the first place. You make it sound hard. It isn't,
and it has been done successfully.

> and even then, your
> ability to analyze reachability is limited by the lack of explicit
> transition controls.  Versus being able to analyze a TE policy where the
> capability state is directly encoded based on equivalence classes
> (types), and you can directly check reachability all without looking at
> the filesystem state.

It's true. Capabilities don't implement TE. They aren't intended
to, and the arguement that they are flawwed because they don't is
distracting.
   
> ...
> > 
> > Well, I don't like it, but I do appreciate the fact that the
> > disintegration is explicit.
> > 
> > Do y'all plan to let the rest of the world know what you're up
> > to, or do you plan to present this as a feit accompli?
> 
> I'm not sure what that means.  It is just a patch to selinux (it touches
> no other code, and has no side effects in the absence of new policy),
> and it would go in via the usual route, which ultimately should include
> posting to linux-kernel.  No different than a patch to any other kernel
> subsystem.

Always be wary when Stephen says "just"!

You're right, you are "just" changing the way SELinux uses existing
interfaces. You are "just" abandoning the notion of LSM stacking.
You are "just" taking the first step toward replacing the Linux
security model with the SELinux security model.

And you are correct, it's all being done within framework, policy,
and procedures. Groan Grumble Snort Complain. Well, carry on then.


Casey Schaufler
casey@schaufler-ca.com

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2007-06-12 16:38 UTC|newest]

Thread overview: 60+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-06-11 19:55 [RFC][PATCH] selinux: enable authoritative granting of capabilities Stephen Smalley
2007-06-11 20:39 ` James Morris
2007-06-11 20:43 ` Serge E. Hallyn
2007-06-11 21:43   ` Casey Schaufler
2007-06-11 22:20     ` James Morris
2007-06-12  0:00       ` Casey Schaufler
2007-06-12 11:46         ` Stephen Smalley
2007-06-11 22:24     ` Serge E. Hallyn
2007-06-12  9:20       ` Russell Coker
2007-06-12 15:44         ` Serge E. Hallyn
2007-06-12 15:57           ` Stephen Smalley
2007-06-13 11:16             ` Russell Coker
2007-06-13 12:31               ` Stephen Smalley
2007-06-14  9:44                 ` Russell Coker
2007-06-14 11:03                   ` Stephen Smalley
2007-06-14 14:50                     ` Stephen Smalley
2007-06-14 14:54                       ` Joshua Brindle
2007-06-14 13:54                   ` Casey Schaufler
2007-06-14 14:50                     ` Joshua Brindle
2007-06-14 15:05                       ` Stephen Smalley
2007-06-12 11:43       ` Stephen Smalley
2007-06-12 11:31     ` Stephen Smalley
2007-06-12  9:27   ` Russell Coker
2007-06-12 12:09     ` Stephen Smalley
2007-06-12 12:50 ` Stephen Smalley
2007-06-12 15:08   ` Casey Schaufler
2007-06-12 15:33     ` Stephen Smalley
2007-06-12 16:38       ` Casey Schaufler [this message]
2007-06-12 17:49         ` James Morris
2007-06-12 19:56           ` Casey Schaufler
2007-06-12 16:03   ` Serge E. Hallyn
2007-06-12 13:24 ` Stephen Smalley
2007-06-12 20:50   ` Stephen Smalley
2007-06-12 21:12     ` Stephen Smalley
2007-06-13 14:31       ` Stephen Smalley
2007-06-13 15:06         ` Christopher J. PeBenito
2007-06-13 15:28           ` Stephen Smalley
2007-06-13 18:46             ` Christopher J. PeBenito
2007-06-13 19:20               ` Stephen Smalley
2007-06-14 19:19                 ` Christopher J. PeBenito
2007-06-15 11:50                   ` Stephen Smalley
2007-06-13 19:10             ` Eric Paris
2007-06-13 19:22               ` Stephen Smalley
2007-06-13 19:50                 ` Daniel J Walsh
2007-06-13 20:00                   ` Stephen Smalley
2007-06-13 20:22                     ` Daniel J Walsh
2007-06-12 13:32 ` Stephen Smalley
2007-06-14 15:40   ` Chad Sellers
2007-06-14 15:55     ` Stephen Smalley
2007-06-14 16:03       ` Stephen Smalley
2007-06-14 16:13         ` Karl MacMillan
2007-06-14 16:52         ` James Morris
2007-06-14 17:28           ` Chad Sellers
2007-06-14 17:35             ` James Morris
2007-06-14 17:43               ` Chad Sellers
2007-06-14 17:47               ` Stephen Smalley
2007-06-14 20:02                 ` Casey Schaufler
2007-06-14 17:46           ` Stephen Smalley
2007-06-14 18:18             ` James Morris
2007-06-14 15:55     ` Karl MacMillan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=616061.57558.qm@web36609.mail.mud.yahoo.com \
    --to=casey@schaufler-ca.com \
    --cc=eparis@parisplace.org \
    --cc=jmorris@namei.org \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    --cc=serue@us.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.