All of lore.kernel.org
 help / color / mirror / Atom feed
From: Casey Schaufler <casey@schaufler-ca.com>
To: "Serge E. Hallyn" <serue@us.ibm.com>
Cc: selinux@tycho.nsa.gov, linux-security-module@vger.kernel.org
Subject: Re: Current/Future Plans to Support Stacking LSM Modules
Date: Thu, 18 Jan 2007 11:30:03 -0800 (PST)	[thread overview]
Message-ID: <629629.87353.qm@web36615.mail.mud.yahoo.com> (raw)
In-Reply-To: <20070118185030.GB10975@sergelap.austin.ibm.com>


--- "Serge E. Hallyn" <serue@us.ibm.com> wrote:


> > Funny thing is that I would agree with you 100%
> > if LSM implemented authoritative hooks. Since
> > LSM implements a scheme that is supposed to
> > provide strictly for additional restrictions
> > it should be simple to stack modules safely.
> 
> An example where that is not the case is if LSM 2
> needs to label
> a file as 'toptopsecret noone may touch this', but
> LSM 1 has
> marked claimed that the user may not write an xattr.
>  So now
> the user's info can be leaked.

This is only an issue if LSM 2 puts "toptop..."
data into the file prior to setting the label
on the file, which I would argue ought not
happen. If you're refering to the case where
someone discovers toptop... data in an existing
'sure go ahead everyone read this' file and
they want to relabel it I say that the described
behavior is, however unfortunate, correct. There
have been sucessful MLS systems on which users
were not allowed to relabel files.

If an LSM is correct within its own rules,
such as the MLS reality that the container
has to be labeled before the data goes in,
and that the creation would fail if it
couldn't live up to its rules, the situation
described will not be a security problem.
It will be a operational problem, and the
admin who decided that she wanted both
mechanisms may have a tough choice, just
as she does when she puts too many layers
of spam filtering in place and nothing from
lkml gets through anymore.

Reminds me of changing planes at Heathrow,
where half the people had too much luggage
to go through security, but had already
gone through once at the previous airport.


Casey Schaufler
casey@schaufler-ca.com

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2007-01-18 19:29 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-01-16 18:08 Current/Future Plans to Support Stacking LSM Modules Tom Fortmann
2007-01-16 18:27 ` Stephen Smalley
2007-01-16 18:46 ` Casey Schaufler
     [not found]   ` <45AF5539.2020608@novell.com>
2007-01-18 12:50     ` Stephen Smalley
     [not found]       ` <45AF7643.3080200@novell.com>
2007-01-18 13:53         ` Stephen Smalley
2007-01-18 16:36           ` Casey Schaufler
2007-01-18 16:53             ` Karl MacMillan
2007-01-18 18:12               ` Casey Schaufler
2007-01-18 18:50                 ` Serge E. Hallyn
2007-01-18 19:30                   ` Casey Schaufler [this message]
2007-01-18 20:29                 ` Stephen Smalley
2007-01-18 21:32                   ` Casey Schaufler
2007-01-23 23:24                     ` Russell Coker
2007-01-24 16:09                       ` Paul Moore
2007-01-18 17:28           ` Serge E. Hallyn

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=629629.87353.qm@web36615.mail.mud.yahoo.com \
    --to=casey@schaufler-ca.com \
    --cc=linux-security-module@vger.kernel.org \
    --cc=selinux@tycho.nsa.gov \
    --cc=serue@us.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.