From: Chris Wright <chrisw@osdl.org>
To: Reiner Sailer <sailer@us.ibm.com>
Cc: Chris Wright <chrisw@osdl.org>,
serue@us.ibm.com, James Morris <jmorris@redhat.com>,
Reiner Sailer <sailer@watson.ibm.com>,
LKML <linux-kernel@vger.kernel.org>,
LSM <linux-security-module@wirex.com>,
Toml@us.ibm.com, Greg KH <greg@kroah.com>,
Emilyr@us.ibm.com, kylene@us.ibm.com
Subject: Re: [PATCH] 3 of 5 IMA: LSM-based measurement code
Date: Wed, 15 Jun 2005 15:59:51 -0700 [thread overview]
Message-ID: <20050615225951.GU9046@shell0.pdx.osdl.net> (raw)
In-Reply-To: <Pine.WNT.4.63.0506151754150.2452@laptop>
* Reiner Sailer (sailer@us.ibm.com) wrote:
> Access control is a very broad term. Before I go into details, I would
> like to make clear that I do not have a preference for or against LSM. We
> are working hard to make the functionality available and it does not
> matter to the user where IMA will be located. The true potential of
> Trusted Computing will only show with experimenting going on outside
> the research labs. IMA can help by being one modest building block
> for experiments only if it is broadly available.
Yeah, understood.
> Regarding the access control discussion, one can map (almost) anything
> onto access control. There are (many) people that teach today that the
> whole security issue is about access control. The question is:
> controlling access of whom to what?
OK, let's look at it another way. Say your access control model used
kernel profiling data as part of policy. It still makes sense to let
oprofile do that collection, and the LSM is just a consumer of that
data when it makes an acces control decision. Perhaps a klunky analogy,
but do you see the idea?
> IMA does control access by forcing measurements on executables
> before they are loaded. Access control is more than saying yes or no at
> some point on the code path. IMA enables remote parties to figure out
> whether a system has some (usage dependent) properties. This can serve as
> the basis for controlling such systems' access to resources. IMA supplies
> input into a remote Access Control Decision Function.
Right, the measurement data collection stand alone, which no access
control decisions in sight (talking about the IMA LSM now), is what
tipped the scale.
thanks,
-chris
next prev parent reply other threads:[~2005-06-15 23:02 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-06-15 22:44 [PATCH] 3 of 5 IMA: LSM-based measurement code Reiner Sailer
2005-06-15 22:59 ` Chris Wright [this message]
-- strict thread matches above, loose matches on Subject: below --
2005-06-15 22:48 Reiner Sailer
2005-06-15 14:40 Reiner Sailer
2005-06-15 20:02 ` James Morris
2005-06-15 20:49 ` serue
2005-06-15 20:58 ` Stephen Smalley
2005-06-15 21:48 ` serue
2005-06-15 20:59 ` Chris Wright
2005-06-15 21:50 ` serue
2005-06-15 21:53 ` Chris Wright
2005-06-15 22:42 ` Serge E. Hallyn
2005-06-15 22:49 ` Chris Wright
2005-06-15 22:00 ` Casey Schaufler
2005-06-15 22:38 ` Serge E. Hallyn
2005-06-15 22:40 ` Chris Wright
2005-06-15 22:52 ` Serge E. Hallyn
2005-06-16 2:01 ` Chris Wright
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20050615225951.GU9046@shell0.pdx.osdl.net \
--to=chrisw@osdl.org \
--cc=Emilyr@us.ibm.com \
--cc=Toml@us.ibm.com \
--cc=greg@kroah.com \
--cc=jmorris@redhat.com \
--cc=kylene@us.ibm.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@wirex.com \
--cc=sailer@us.ibm.com \
--cc=sailer@watson.ibm.com \
--cc=serue@us.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox