From: "Lorenzo Hernández García-Hierro" <lorenzo@gnu.org>
To: Valdis.Kletnieks@vt.edu
Cc: rsbac@rsbac.org,
"linux-security-module@wirex.com"
<linux-security-module@wirex.com>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>
Subject: Re: Thoughts on the "No Linux Security Modules framework" old claims
Date: Wed, 16 Feb 2005 14:29:03 +0100 [thread overview]
Message-ID: <1108560543.3826.89.camel@localhost.localdomain> (raw)
In-Reply-To: <200502160421.j1G4Ls7l004329@turing-police.cc.vt.edu>
[-- Attachment #1: Type: text/plain, Size: 1915 bytes --]
El mar, 15-02-2005 a las 23:21 -0500, Valdis.Kletnieks@vt.edu escribió:
> On Tue, 15 Feb 2005 23:38:09 +0100, Lorenzo =?ISO-8859-1?Q?Hern=E1ndez_?= =?ISO-8859-1?Q?Garc=EDa-Hierro?= said:
>
> > Yes, and that's noticed from the "official" documentation.
> > But, who says that we can't place auditing facilities inside the
> > existing hooks? or even file system linking related tweaks?
>
> Many auditing policies require an audit event to be generated if the operation
> is rejected by *either* the DAC (as implemented by the file permissions
> and possibly ACLs) *or* the MAC (as implemented by the LSM exit). However,
> in most (all?) cases, the DAC check is made *first*, and the LSM exit isn't
> even called if the DAC check fails. As a result, if you try to open() a file
> and get -EPERM due to the file permissions, the LSM exit isn't called and
> you can't cut an audit record there.
Yes, there are many cases that apply to such scenario and context, this
may be worth to work on, but think it's main shortcoming is that it cuts
performance and adds further overlapping to the DAC checks, that should
be the first ones being called (as most times they do) and then apply
the LSM basis, so, post-processing will be only required if the DAC
checks get in override or passed, without adding too-much overhead to
the current behavior.
So, I just agree partially, but yes, maybe modifying the DAC checks
themselves and add what-ever-else helper function to handle by-default
auditing in certain operations could be interesting.
I think it could be worthy to have a roadmap in a wiki or even talk
about a one, trying to write it, so, we all could know what needs to be
improved and done, getting a higher percentage of mainline-accepted
approaches.
Cheers,
--
Lorenzo Hernández García-Hierro <lorenzo@gnu.org>
[1024D/6F2B2DEC] & [2048g/9AE91A22][http://tuxedo-es.org]
[-- Attachment #2: Esta parte del mensaje está firmada digitalmente --]
[-- Type: application/pgp-signature, Size: 189 bytes --]
next prev parent reply other threads:[~2005-02-16 13:29 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-02-15 22:38 Thoughts on the "No Linux Security Modules framework" old claims Lorenzo Hernández García-Hierro
2005-02-16 4:21 ` Valdis.Kletnieks
2005-02-16 13:29 ` Lorenzo Hernández García-Hierro [this message]
2005-02-16 13:30 ` Stephen Smalley
2005-02-16 16:07 ` Casey Schaufler
2005-02-16 15:52 ` Casey Schaufler
2005-02-16 17:41 ` Valdis.Kletnieks
2005-02-21 10:19 ` [rsbac] " Amon Ott
2005-02-21 17:15 ` Lorenzo Hernández García-Hierro
2005-02-21 17:50 ` Casey Schaufler
2005-02-22 8:57 ` Amon Ott
2005-02-22 15:23 ` Casey Schaufler
2005-02-24 0:55 ` Kurt Garloff
2005-02-24 8:28 ` Amon Ott
2005-02-25 10:14 ` Kurt Garloff
2005-02-23 21:37 ` Crispin Cowan
2005-02-23 22:00 ` Lorenzo Hernández García-Hierro
2005-02-23 22:07 ` Crispin Cowan
2005-02-23 22:34 ` Lorenzo Hernández García-Hierro
2005-02-24 13:23 ` Stephen Smalley
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1108560543.3826.89.camel@localhost.localdomain \
--to=lorenzo@gnu.org \
--cc=Valdis.Kletnieks@vt.edu \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@wirex.com \
--cc=rsbac@rsbac.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox