linux-audit.redhat.com archive mirror
 help / color / mirror / Atom feed
* Differentiating audit rules in an LSM stack
@ 2017-12-22 20:01 Casey Schaufler
  2017-12-22 21:02 ` Paul Moore
  2018-01-02 15:35 ` Steve Grubb
  0 siblings, 2 replies; 6+ messages in thread
From: Casey Schaufler @ 2017-12-22 20:01 UTC (permalink / raw)
  To: Linux Audit, LSM; +Cc: Steve Grubb, Paul Moore, Eric Paris

The audit rule field types AUDIT_SUBJ_* and AUDIT_OBJ_* are
defined generically and used by both SELinux and Smack to identify
fields that are interesting to them. If SELinux and Smack are running
concurrently both modules will identify audit rules as theirs if
either has requested the field. Before I go off and create a clever
solution I think it wise to ask if anyone has thought about or has
strong opinions on how best to address this unfortunate situation.

We know that SELinux and Smack together is not an especially
interesting configuration. It is, however, a grand test case for
generality of the solution. Any module that wanted to audit fields
that are defined generically will have this sort of problem.

Thanks


^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2018-01-02 17:20 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-12-22 20:01 Differentiating audit rules in an LSM stack Casey Schaufler
2017-12-22 21:02 ` Paul Moore
2018-01-02 15:48   ` Steve Grubb
2018-01-02 17:05     ` Casey Schaufler
2018-01-02 17:20     ` Casey Schaufler
2018-01-02 15:35 ` Steve Grubb

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).