linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Daniel J Walsh <dwalsh@redhat.com>
To: Stephen Smalley <sds@tycho.nsa.gov>
Cc: Casey Schaufler <casey@schaufler-ca.com>,
	"Serge E. Hallyn" <serue@us.ibm.com>,
	Eric Paris <eparis@redhat.com>,
	selinux@tycho.nsa.gov, linux-fsdevel@vger.kernel.org,
	linux-security-module@vger.kernel.org, viro@ZenIV.linux.org.uk
Subject: Re: SELinux and access(2), we want to know.
Date: Fri, 08 May 2009 08:46:31 -0400	[thread overview]
Message-ID: <4A0429A7.7060507@redhat.com> (raw)
In-Reply-To: <1241785627.6452.193.camel@localhost.localdomain>

On 05/08/2009 08:27 AM, Stephen Smalley wrote:
> On Thu, 2009-05-07 at 20:51 -0700, Casey Schaufler wrote:
>> Serge E. Hallyn wrote:
>>> Quoting Eric Paris (eparis@redhat.com):
>>>
>>>> 3) I've also heard it hinted that we could do this with audit by just
>>>> having audit drop the denials that include the access(2) syscall and the
>>>> scontext and tcontext for the slew of things the SELinux policy writers
>>>> know we are not interested in.  And while it seems good, now we have
>>>>
>>> What is the difference whether an attacker does access(2) to check for
>>> /etc/shadow rights, or does a failed open()?
>>>
>> I have been studiously ignoring the discussions on the SELinux list because
>> in the end it really doesn't matter, as Serge (appears to) point out here.
>> The access() system call was a major thorn in the side of the POSIX security
>> working group because its behavior is not really very rational. By design
>> it does not take into account read-only file systems, ACLs, MAC labels,
>> TOMOYO policy, or anything other than the mode bits. A successful return
>> from access() gives you no assurance whatever that if you actually try the
>> operation it will succeed. My recollection is that every version of
>> "trusted unix" written treats the system call the same way it would a
>> call to lstat(), because that's really all it is doing.
>
> Casey, please go read the access(2) / faccessat(2) code in Linux and
> then come back to the discussion.  It does in fact take into account all
> of those things presently (and notes in a comment that SuS v2 requires
> that it report a read-only fs).
>
Reality check.

The biggest reason for this is Nautilus and other GUI tools that open a 
directory and look at all of the files in the directory checking their 
access.  So running as staff_t and using nautilus on the /etc directory 
or /bin/directory generates hundreds of AVC indicating that staff_t 
tried to read/write/execute every program it is not allowed to execute.

Totally useless and gives the SELinux SUCKS crowd more ammunition. If 
the MLS people want to treat ACCESS==OPEN then we are going to have a 
big boolean/tunable flag for their paranoia.  For everyone else.  Lets 
try to figure out when an application is actually doing something evil.

Currently pam libraries and kerberos libraries run access checks that 
cause us to DONTAUDIT reads of /etc/shadow and WRITES of /etc/krb5.conf
To pretty critical Security files.  So any app that uses kerberos 
(getpw) call and every app that uses PAM Authentication can try to read 
/etc/shadow and write /etc/krb5.conf without us knowing.



  reply	other threads:[~2009-05-08 12:46 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2009-05-07 19:18 SELinux and access(2), we want to know Eric Paris
2009-05-07 19:57 ` Serge E. Hallyn
2009-05-07 20:57   ` Eric Paris
2009-05-07 21:28     ` Serge E. Hallyn
2009-05-08  3:51   ` Casey Schaufler
2009-05-08  5:16     ` Eamon Walsh
2009-05-08 12:27     ` Stephen Smalley
2009-05-08 12:46       ` Daniel J Walsh [this message]
2009-05-08 14:17         ` Serge E. Hallyn
2009-05-08 14:53         ` Casey Schaufler
2009-05-08 13:05       ` Stephen Smalley
2009-05-08 13:14 ` Jamie Lokier
2009-05-08 13:29 ` Stephen Smalley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4A0429A7.7060507@redhat.com \
    --to=dwalsh@redhat.com \
    --cc=casey@schaufler-ca.com \
    --cc=eparis@redhat.com \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    --cc=serue@us.ibm.com \
    --cc=viro@ZenIV.linux.org.uk \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).