* Re: Security issue - storing NTACL's in non-NT-security-namespace
[not found] ` <20131213105314.GA2117@infradead.org>
@ 2013-12-13 21:32 ` L.A. Walsh
2013-12-13 22:08 ` Jeremy Allison
2013-12-15 14:21 ` BTW - to xfs folk, 'security attr' doesn't seem very useful w/current copy policies L.A. Walsh
0 siblings, 2 replies; 9+ messages in thread
From: L.A. Walsh @ 2013-12-13 21:32 UTC (permalink / raw)
To: Christoph Hellwig; +Cc: Samba Technical, Jeremy Allison, xfs-oss
On 12/13/2013 2:53 AM, Christoph Hellwig wrote:
> On Fri, Dec 13, 2013 at 12:39:40AM -0800, L.A. Walsh wrote:
>
>> Does it have to be under a "namespace" that gets *stripped*
>> as soon as the file is copied or "mv'd to another
>> samba share (i.e. the partition it was moved to is shared with the
>> same permissions as the first one.
>>
>
> Attributes never get "stripped", they simple don't get copied unless
> explicit action is taken to do so. Setting trusted attributes up on a
> new file will of course rely privilegues, exactly for the reasons
> Jeremy pointed out.
>
----
Stripping is the default action when copying or moving unless you
take some *non-default* (and unspecified) action, AND providing you
even know they are there..
The same is NOT true for the *real* xfs-ACLS -- which are
copied w/o issue.
Example,
testfile.txt (saved via win7 as a normal user in my Doc dir:
(letter on left is my abbrieviation
Ishtar:law/Documents> attr -l testfile.txt
U Attribute "DOSATTRIB" has a 56 byte value for testfile.txt
R Attribute "SGI_ACL_FILE" has a 64 byte value for testfile.txt
U Attribute "SAMBA_PAI" has a 31 byte value for testfile.txt
S Attribute "NTACL" has a 328 byte value for testfile.txt
Then copy using "explicit action" (-a) to save extended attributes:
Ishtar:law/Documents> cp -a testfile.txt testcopy.txt
Ishtar:law/Documents> attr -l testcopy.txt
Attribute "DOSATTRIB" has a 56 byte value for testcopy.txt
Attribute "SGI_ACL_FILE" has a 64 byte value for testcopy.txt
Attribute "SAMBA_PAI" has a 31 byte value for testcopy.txt
Now NOTE: if I don't use "explicit action" (-a) in my copy:
Ishtar:law/Documents> /usr/bin/cp testfile.txt testcopy.txt
Ishtar:law/Documents> attr -l testcopy.txt
Attribute "SGI_ACL_FILE" has a 76 byte value for testcopy.txt
ONLY the root-namespace ACL is save -- the user and security
attributes are striped.
If I try "mv"ing the -- on the same volume, I am "fine" (attributes
don't get dropped).
But if I cross a file boundary (to another XFS partition):
Ishtar:law/Documents> mv testfile.txt /Share/CPAN/
mv: setting attribute ‘security.NTACL’ for ‘security.NTACL’:
Operation not permitted
Ishtar:law/Documents> attr -l /Share/CPAN/testfile.txt
Attribute "DOSATTRIB" has a 56 byte value for /Share/CPAN/testfile.txt
Attribute "SGI_ACL_FILE" has a 64 byte value for
/Share/CPAN/testfile.txt
Attribute "SAMBA_PAI" has a 31 byte value for /Share/CPAN/testfile.txt
Only the Security attribute is stripped. the root namespace is copyable
by a user
Note. I saw this message for the 1st time, last week (the permission
message on the move). Do you have any idea what might have caused
such a change?
Did Samba changed namespaces, or is some library refusing to copy this
or maybe a kernel change?
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Security issue - storing NTACL's in non-NT-security-namespace
2013-12-13 21:32 ` Security issue - storing NTACL's in non-NT-security-namespace L.A. Walsh
@ 2013-12-13 22:08 ` Jeremy Allison
2013-12-13 22:14 ` L.A. Walsh
2013-12-13 23:20 ` Dave Chinner
2013-12-15 14:21 ` BTW - to xfs folk, 'security attr' doesn't seem very useful w/current copy policies L.A. Walsh
1 sibling, 2 replies; 9+ messages in thread
From: Jeremy Allison @ 2013-12-13 22:08 UTC (permalink / raw)
To: L.A. Walsh; +Cc: Christoph Hellwig, Samba Technical, Jeremy Allison, xfs-oss
On Fri, Dec 13, 2013 at 01:32:12PM -0800, L.A. Walsh wrote:
> Now NOTE: if I don't use "explicit action" (-a) in my copy:
>
> Ishtar:law/Documents> /usr/bin/cp testfile.txt testcopy.txt
> Ishtar:law/Documents> attr -l testcopy.txt
> Attribute "SGI_ACL_FILE" has a 76 byte value for testcopy.txt
>
> ONLY the root-namespace ACL is save -- the user and security
> attributes are striped.
What is the namespace for SGI_ACL_FILE ?
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Security issue - storing NTACL's in non-NT-security-namespace
2013-12-13 22:08 ` Jeremy Allison
@ 2013-12-13 22:14 ` L.A. Walsh
2013-12-13 23:20 ` Dave Chinner
1 sibling, 0 replies; 9+ messages in thread
From: L.A. Walsh @ 2013-12-13 22:14 UTC (permalink / raw)
To: Jeremy Allison; +Cc: Christoph Hellwig, Samba Technical, xfs-oss
On 12/13/2013 2:08 PM, Jeremy Allison wrote:
> On Fri, Dec 13, 2013 at 01:32:12PM -0800, L.A. Walsh wrote:
>
>> Now NOTE: if I don't use "explicit action" (-a) in my copy:
>>
>> Ishtar:law/Documents> /usr/bin/cp testfile.txt testcopy.txt
>> Ishtar:law/Documents> attr -l testcopy.txt
>> Attribute "SGI_ACL_FILE" has a 76 byte value for testcopy.txt
>>
>> ONLY the root-namespace ACL is save -- the user and security
>> attributes are striped.
>>
>
> What is the namespace for SGI_ACL_FILE ?
>
root
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Security issue - storing NTACL's in non-NT-security-namespace
2013-12-13 22:08 ` Jeremy Allison
2013-12-13 22:14 ` L.A. Walsh
@ 2013-12-13 23:20 ` Dave Chinner
1 sibling, 0 replies; 9+ messages in thread
From: Dave Chinner @ 2013-12-13 23:20 UTC (permalink / raw)
To: Jeremy Allison; +Cc: Christoph Hellwig, Samba Technical, L.A. Walsh, xfs-oss
On Fri, Dec 13, 2013 at 02:08:48PM -0800, Jeremy Allison wrote:
> On Fri, Dec 13, 2013 at 01:32:12PM -0800, L.A. Walsh wrote:
> > Now NOTE: if I don't use "explicit action" (-a) in my copy:
> >
> > Ishtar:law/Documents> /usr/bin/cp testfile.txt testcopy.txt
> > Ishtar:law/Documents> attr -l testcopy.txt
> > Attribute "SGI_ACL_FILE" has a 76 byte value for testcopy.txt
> >
> > ONLY the root-namespace ACL is save -- the user and security
> > attributes are striped.
>
> What is the namespace for SGI_ACL_FILE ?
That's XFS's on-disk name for a posix ACL, which are kept the root
namespace. It's a file ACL, not a default ACL (which are named
SGI_ACL_DEFAULT), so it was placed there by the user after VFS
allowed it to be created.
Cheers,
Dave.
--
Dave Chinner
david@fromorbit.com
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: BTW - to xfs folk, 'security attr' doesn't seem very useful w/current copy policies
2013-12-13 21:32 ` Security issue - storing NTACL's in non-NT-security-namespace L.A. Walsh
2013-12-13 22:08 ` Jeremy Allison
@ 2013-12-15 14:21 ` L.A. Walsh
2013-12-15 23:54 ` Dave Chinner
1 sibling, 1 reply; 9+ messages in thread
From: L.A. Walsh @ 2013-12-15 14:21 UTC (permalink / raw)
To: xfs-oss
On 12/13/2013 1:32 PM, L.A. Walsh wrote:
> On 12/13/2013 2:53 AM, Christoph Hellwig wrote:
> > On Fri, Dec 13, 2013 at 12:39:40AM -0800, L.A. Walsh wrote:
> >
> >> Does it have to be under a "namespace" that gets *stripped*
> >> as soon as the file is copied or "mv'd to another
> >> samba share (i.e. the partition it was moved to is shared with the
> >> same permissions as the first one.
> >
> > Attributes never get "stripped", they simple don't get copied unless
> > explicit action is taken to do so. Setting trusted attributes up on a
> > new file will of course rely privilegues, exactly for the reasons
> > Jeremy pointed out.
-----
For what purpose? As it stands the security namespace doesn't seem
very useful -- i.e. the 'root' attrs get copied and/or moved on a file
copy/rename which carries the access along with the file contents.
But I fail to see the usefulness in having a security namespace that
is dropped by default on copies or inter-partition moves.
Shouldn't it follow along and be copied much as are the root namespace
entries?
It gets really confusing if a "proxy service" (ex. file server)
for the user, stores attributes in that namespace thinking they will
somehow be useful when the user accesses the file w/o the proxy service --
i.e. as a normal file.
Was there a specific use-case for being able to tag files with security
attrs that can't be copied, moved or renamed except by root that wouldn't
better be served by signed or 'sealed' (encrypted) content? For most
cases, it would seem that signing to detect tampering would be enough,
though I can think of cases where sealing to prevent knowledge of
who has what access would also be useful.
Something to think about before others try to use the security field to
store attrs they want kept with the content and not the inode.
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: BTW - to xfs folk, 'security attr' doesn't seem very useful w/current copy policies
2013-12-15 14:21 ` BTW - to xfs folk, 'security attr' doesn't seem very useful w/current copy policies L.A. Walsh
@ 2013-12-15 23:54 ` Dave Chinner
2013-12-16 2:20 ` usefulness of 'security attr' being non-copiable on discretionary access linux LA Walsh
0 siblings, 1 reply; 9+ messages in thread
From: Dave Chinner @ 2013-12-15 23:54 UTC (permalink / raw)
To: L.A. Walsh; +Cc: xfs-oss
On Sun, Dec 15, 2013 at 06:21:52AM -0800, L.A. Walsh wrote:
>
>
> On 12/13/2013 1:32 PM, L.A. Walsh wrote:
> >On 12/13/2013 2:53 AM, Christoph Hellwig wrote:
> >> On Fri, Dec 13, 2013 at 12:39:40AM -0800, L.A. Walsh wrote:
> >> >> Does it have to be under a "namespace" that gets
> >*stripped*
> >>> as soon as the file is copied or "mv'd to another
> >>> samba share (i.e. the partition it was moved to is shared with the
> >>> same permissions as the first one.
> >>
> >> Attributes never get "stripped", they simple don't get copied unless
> >> explicit action is taken to do so. Setting trusted attributes up on a
> >> new file will of course rely privilegues, exactly for the reasons
> >> Jeremy pointed out.
> -----
> For what purpose? As it stands the security namespace doesn't seem
> very useful -- i.e. the 'root' attrs get copied and/or moved on a file
> copy/rename which carries the access along with the file contents.
>
> But I fail to see the usefulness in having a security namespace that
> is dropped by default on copies or inter-partition moves.
So you want users with no privileges to be able to create and
modify security context imformation, such as selinux labels,
integrity hashes, etc? Really?
> Shouldn't it follow along and be copied much as are the root namespace
> entries?
There is no "root" attribute namespace that users can manipulate -
there is a "trusted" namespace for root users, but that's not what
you are talking about. The VFS defined name spaces are:
- user
- security
- trusted (requires CAP_SYS_ADMIN)
- system
All of the other xattrs fall into these groups. e.g. posix acls:
- system.posix_acl_access
- system.posix_acl_default
What you are doing is conflating how XFS stores xattrs on disk with
user visible xattr namespaces. The two are not the same thing. The
VFS enforces access to the "trusted" namespace and posix ACLs,
security modules enforce access to their own attributes and
potentially restrict access to the entire security namespace.
Whatever remains is left up to the filesystem to decide access
rules.
Hence, cp as a user cannot copy trusted xattrs and certain security
attributes as a matter of principle, and some security modules only
allow security xattr write permission to CAP_SYS_ADMIN (e.g.
selinux), and hence cp as a user cannot read and/or write these
xattrs to put them on the newly copied file.
IOWs, how XFS stores them on disk is irrelevant to access
permissions that are enforced by layers above it...
> It gets really confusing if a "proxy service" (ex. file server)
> for the user, stores attributes in that namespace thinking they will
> somehow be useful when the user accesses the file w/o the proxy service --
> i.e. as a normal file.
That's never worked. xattrs are only meaningful to the application
that created them. Trying to manipulate those xattrs as a user
outside the context of the application is almost always going to
fail when special permissions are required by the application to
manipulate those xattrs.
> Was there a specific use-case for being able to tag files with security
> attrs that can't be copied, moved or renamed except by root that wouldn't
> better be served by signed or 'sealed' (encrypted) content? For most
> cases, it would seem that signing to detect tampering would be enough,
> though I can think of cases where sealing to prevent knowledge of
> who has what access would also be useful.
>
> Something to think about before others try to use the security field to
> store attrs they want kept with the content and not the inode.
Access to the security xattr namespace is entirely controlled by the
kernel security modules. If you want to use that namespace, you have
to follow whatever rules your currently loaded security module
enforces. That, in general, means that the only thing you can
guarantee is that the security xattr namespace requires
CAP_SYS_ADMIN for write access.
Cheers,
Dave.
--
Dave Chinner
david@fromorbit.com
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: usefulness of 'security attr' being non-copiable on discretionary access linux.
2013-12-15 23:54 ` Dave Chinner
@ 2013-12-16 2:20 ` LA Walsh
2013-12-16 3:02 ` Dave Chinner
0 siblings, 1 reply; 9+ messages in thread
From: LA Walsh @ 2013-12-16 2:20 UTC (permalink / raw)
To: Dave Chinner; +Cc: xfs-oss
On 12/15/2013 3:54 PM, Dave Chinner wrote:
> default on copies or inter-partition moves.
>
> So you want users with no privileges to be able to create and
> modify security context imformation, such as selinux labels,
> integrity hashes, etc? Really?
----
If they are running under a non-SElinux system where only
*discretionary* access
is used, why not? It's not like it would do any good.
>
>> Shouldn't it follow along and be copied much as are the root namespace
>> entries?
>
> There is no "root" attribute namespace that users can manipulate -
> there is a "trusted" namespace for root users, but that's not what
> you are talking about. The VFS defined name spaces are:
----
Sorry, I was going by this manpage, shipped by (it looks like) Gnu
with their
xattr program:
XFS uses 2 disjoint attribute name spaces associated with every
filesystem object. They are the root and user address spaces. The
root address space is accessible only to the superuser, and then only
by specifying a flag argument to the function call. Other users will
not see or be able to modify attributes in the root address space. The
user address space is protected by the normal file permissions mecha-
nism, so the owner of the file can decide who is able to see and/or
modify the value of attributes on any particular file.
>
> - user
> - security
> - trusted (requires CAP_SYS_ADMIN)
> - system
----
Doesn't security also require CAP_SYS_ADMIN?
>
> All of the other xattrs fall into these groups. e.g. posix acls:
>
> - system.posix_acl_access
> - system.posix_acl_default
>
> What you are doing is conflating how XFS stores xattrs on disk with
> user visible xattr namespaces. The two are not the same thing.
----
That's fine -- the virtual model != the physical model -- just like
in almost every
other area. ;-)
> The
> VFS enforces access to the "trusted" namespace and posix ACLs,
> security modules enforce access to their own attributes and
> potentially restrict access to the entire security namespace.
> Whatever remains is left up to the filesystem to decide access
> rules.
>
>
> Hence, cp as a user cannot copy trusted xattrs and certain security
> attributes as a matter of principle, and some security modules only
> allow security xattr write permission to CAP_SYS_ADMIN (e.g.
> selinux), and hence cp as a user cannot read and/or write these
> xattrs to put them on the newly copied file.
-----
I'm running with the "default" security (Discretionary -
mode bits + access lists + cap bits slowly supplanting need for root.
>
> IOWs, how XFS stores them on disk is irrelevant to access
> permissions that are enforced by layers above it...
>
>> It gets really confusing if a "proxy service" (ex. file server)
>> for the user, stores attributes in that namespace thinking they will
>> somehow be useful when the user accesses the file w/o the proxy service --
>> i.e. as a normal file.
>
> That's never worked. xattrs are only meaningful to the application
> that created them.
----
NT attrs that are stored on a file server, _natively_ are the same
as local attrs. Samba has traditionally tried to map as much of the
NT acl -> the native acl. In this particular instance, an
unprivileged user (me) saved a file to their home directory. Then as
an unprivileged user, I couldn't move the file without saving the NT
ACL -- which would still be desired (or needed) on any other exported
NT partition.
I feel it is a a problem if a normal user can both create the ACL's
when accessing the share over samba but cannot directly move or create
such ACL's. It it is like Windows, I could probably mount it via a
loopback, and using the file system presented by samba and mounted
with CIFS (untested), but a user on a client (remote or local) should
have consistent access to the ACL that is stored on the file so they
can move, copy it or back it up.
> Trying to manipulate those xattrs as a user
> outside the context of the application is almost always going to
> fail when special permissions are required by the application to
> manipulate those xattrs.
-----
They don't on NT-servers. The native OS ACLS are pretty
much the same. If I have an ACL on the file and move it, it
goes with the file. Of course if the file is using a directory
default ACL, it gets whatever it gets in the new dir.
File sensitivity flags are stored on NT to flag possibly unsafe
material (downloaded material from general internet, for example).
The user can't set those labels directly, but they do get moved
by the system if the user moves or copies the file.
> Access to the security xattr namespace is entirely controlled by the
> kernel security modules. If you want to use that namespace, you have
> to follow whatever rules your currently loaded security module
> enforces. That, in general, means that the only thing you can
> guarantee is that the security xattr namespace requires
> CAP_SYS_ADMIN for write access.
It also appears the system namespace isn't visible unless you have that
CAP set. I.e. the manpage is correct in this regard.
====
As I tried to make clear -- this is a new behavior I'm seeing. I've never
had attrs on my files that I, as the file 'owner' couldn't move around
to permitted locations. As it is an ACL, my feeling is it should be
stored in the same way the posix acls are -- which are copyable.
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: usefulness of 'security attr' being non-copiable on discretionary access linux.
2013-12-16 2:20 ` usefulness of 'security attr' being non-copiable on discretionary access linux LA Walsh
@ 2013-12-16 3:02 ` Dave Chinner
2013-12-16 7:41 ` LA Walsh
0 siblings, 1 reply; 9+ messages in thread
From: Dave Chinner @ 2013-12-16 3:02 UTC (permalink / raw)
To: LA Walsh; +Cc: xfs-oss
On Sun, Dec 15, 2013 at 06:20:20PM -0800, LA Walsh wrote:
> On 12/15/2013 3:54 PM, Dave Chinner wrote:
> > default on copies or inter-partition moves.
> >
> >So you want users with no privileges to be able to create and
> >modify security context imformation, such as selinux labels,
> >integrity hashes, etc? Really?
> ----
> If they are running under a non-SElinux system where only
> *discretionary* access
> is used, why not? It's not like it would do any good.
> >
> >>Shouldn't it follow along and be copied much as are the root namespace
> >>entries?
> >
> >There is no "root" attribute namespace that users can manipulate -
> >there is a "trusted" namespace for root users, but that's not what
> >you are talking about. The VFS defined name spaces are:
> ----
> Sorry, I was going by this manpage, shipped by (it looks like)
> Gnu with their
> xattr program:
>
> XFS uses 2 disjoint attribute name spaces associated with every
> filesystem object. They are the root and user address spaces. The
> root address space is accessible only to the superuser, and then only
> by specifying a flag argument to the function call. Other users will
> not see or be able to modify attributes in the root address space. The
> user address space is protected by the normal file permissions mecha-
> nism, so the owner of the file can decide who is able to see and/or
> modify the value of attributes on any particular file.
Note the name of the man page:
ATTR(1) XFS Compatibility API
The fact there is a utility that lets you access the XFS on-disk
xattr space does not mean other tools actually access those
namespaces directly.
Indeed, have you looked at what attr does when it writes an
attribute into the "root" namespace in XFS?
$ sudo strace attr -R -s blah -V grotfuddink foo
....
lsetxattr("foo", "trusted.blah", "grotfuddink", 11, 0) = 0
....
It writes it into the "trusted" VFS xattr namespace which means it
knows *nothing* about how XFS stores it's xattrs on disk.
> > - user
> > - security
> > - trusted (requires CAP_SYS_ADMIN)
> > - system
> ----
> Doesn't security also require CAP_SYS_ADMIN?
I've already answered that question:
> >Hence, cp as a user cannot copy trusted xattrs and certain security
> >attributes as a matter of principle, and some security modules only
> >allow security xattr write permission to CAP_SYS_ADMIN (e.g.
> >selinux), and hence cp as a user cannot read and/or write these
> >xattrs to put them on the newly copied file.
> -----
> I'm running with the "default" security (Discretionary -
> mode bits + access lists + cap bits slowly supplanting need for root.
So, did you turn the distro default selinux config off?
> >permissions that are enforced by layers above it...
> >
> >>It gets really confusing if a "proxy service" (ex. file server)
> >>for the user, stores attributes in that namespace thinking they will
> >>somehow be useful when the user accesses the file w/o the proxy service --
> >>i.e. as a normal file.
> >
> >That's never worked. xattrs are only meaningful to the application
> >that created them.
> ----
> NT attrs that are stored on a file server, _natively_ are the same
> as local attrs. Samba has traditionally tried to map as much of the
> NT acl -> the native acl. In this particular instance, an
> unprivileged user (me) saved a file to their home directory. Then as
> an unprivileged user, I couldn't move the file without saving the NT
> ACL -- which would still be desired (or needed) on any other exported
> NT partition.
You missed what I said completely. You didn't create the NT attr,
Samba did it on your behalf. Samba - the aplication that owns the
xattr - has higher privileges than you do, and so it can do things
you can't. Like manage attributes in the security namespace.
> I feel it is a a problem if a normal user can both create the ACL's
> when accessing the share over samba but cannot directly move or create
> such ACL's.
Just because you own the file, it doesn't mean you own or can access
all the xattrs on it the file.
> >Access to the security xattr namespace is entirely controlled by the
> >kernel security modules. If you want to use that namespace, you have
> >to follow whatever rules your currently loaded security module
> >enforces. That, in general, means that the only thing you can
> >guarantee is that the security xattr namespace requires
> >CAP_SYS_ADMIN for write access.
> It also appears the system namespace isn't visible unless you have
> that CAP set. I.e. the manpage is correct in this regard.
>
> ====
> As I tried to make clear -- this is a new behavior I'm seeing. I've never
> had attrs on my files that I, as the file 'owner' couldn't move around
> to permitted locations. As it is an ACL, my feeling is it should be
> stored in the same way the posix acls are -- which are copyable.
Then something above the filesystem has changed. We haven't changed
anything to do with who or how xattrs are stored or used in XFS for
a long time.
Cheers,
Dave.
--
Dave Chinner
david@fromorbit.com
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: usefulness of 'security attr' being non-copiable on discretionary access linux.
2013-12-16 3:02 ` Dave Chinner
@ 2013-12-16 7:41 ` LA Walsh
0 siblings, 0 replies; 9+ messages in thread
From: LA Walsh @ 2013-12-16 7:41 UTC (permalink / raw)
To: Dave Chinner; +Cc: xfs-oss
On 12/15/2013 7:02 PM, Dave Chinner wrote:
> It writes it into the "trusted" VFS xattr namespace which means it
> knows *nothing* about how XFS stores it's xattrs on disk.
----
I never said it was correct, Dave. At best, I thought it might have
represented some state in the past.
>> -----
>> I'm running with the "default" security (Discretionary -
>> mode bits + access lists + cap bits slowly supplanting need for root.
>
> So, did you turn the distro default selinux config off?
----
Suse ships AppArmor enabled by default, not selinux.
I run my own kernel from kernel.org sources. (Suse doesn't
support booting directly from disk, and /usr is expected
to be mounted when the OS starts coming up (they put mount in
/usr/bin now and a symlink in /bin pointing to /usr/bin.
> You missed what I said completely. You didn't create the NT attr,
> Samba did it on your behalf. Samba - the aplication that owns the
> xattr - has higher privileges than you do, and so it can do things
> you can't. Like manage attributes in the security namespace.
---
I didn't miss it -- I was talking about user-proxies. The point of
my running a linux server as a Domain Controller is that I have 1 point
of security on my net -- the server, and whether I log in to a client
or the server, I "should" (conceptually) have access to the same files.
If I ssh from the client to the server, I see a message in messages:
sshd accepted public key for Domain\\linda from [station]...
Samba provides user and group name resolution and security for the
server.
>> ====
>> As I tried to make clear -- this is a new behavior I'm seeing. I've never
>> had attrs on my files that I, as the file 'owner' couldn't move around
>> to permitted locations. As it is an ACL, my feeling is it should be
>> stored in the same way the posix acls are -- which are copyable.
>
> Then something above the filesystem has changed. We haven't changed
> anything to do with who or how xattrs are stored or used in XFS for
> a long time.
----
Neither the kernel nor xfs were high on my list of
candidates.
>
> Cheers,
---
and felicitations!...
linda
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2013-12-16 7:41 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <52A96211.3050602@tlinx.org>
[not found] ` <20131212181315.GB20500@samba2>
[not found] ` <52AAC7CC.8000802@tlinx.org>
[not found] ` <20131213105314.GA2117@infradead.org>
2013-12-13 21:32 ` Security issue - storing NTACL's in non-NT-security-namespace L.A. Walsh
2013-12-13 22:08 ` Jeremy Allison
2013-12-13 22:14 ` L.A. Walsh
2013-12-13 23:20 ` Dave Chinner
2013-12-15 14:21 ` BTW - to xfs folk, 'security attr' doesn't seem very useful w/current copy policies L.A. Walsh
2013-12-15 23:54 ` Dave Chinner
2013-12-16 2:20 ` usefulness of 'security attr' being non-copiable on discretionary access linux LA Walsh
2013-12-16 3:02 ` Dave Chinner
2013-12-16 7:41 ` LA Walsh
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox