* Re: capabilitiescompute_cred [not found] ` <20040402111554.E21045@build.pdx.osdl.net> @ 2004-04-02 20:21 ` Andy Lutomirski 2004-04-02 21:03 ` capabilitiescompute_cred Chris Wright 2004-04-02 21:47 ` capabilitiescompute_cred Stephen Smalley 0 siblings, 2 replies; 4+ messages in thread From: Andy Lutomirski @ 2004-04-02 20:21 UTC (permalink / raw) To: Chris Wright; +Cc: Stephen Smalley, Andrew Morton, luto, linux-kernel Chris Wright wrote: >>IMHO, capabilities are a broken idea anyway, and should ultimately be >>replaced entirely using Type Enforcement (which SELinux includes). A >>comparison of the two approaches is in >>http://www.securecomputing.com/pdf/secureos.pdf. Today we still stack >>SELinux with the capabilities module, but long term, I'd like to see us >>just drop capabilities and use TE by itself to manage privileges. > > > I have the same dislike for capabilities. It's more like a wart than > a feature. I get requests to have RBAC be the core priv system rather > than capabilities. I agree in principle, but it would still be nice to have a simple way to have useful capabilities without setting up a MAC system. I don't see a capabilities fix adding any significant amount of code; it just takes some effort to get it right. > > In the meantime, I've often idly wondered why we don't simply inherit as > advertised. The patch below does this, but I haven't even started > looking for security sensitive failure modes. I'm not sure that introduces security problems, but I'm also not sure it fixes much. You can find my attempts to get it right in the linux-kernel archives, and I'll probably try to get something into 2.7 when it forks. With or without MAC, having a functioning capability system wouldn't hurt security. > > thanks, > -chris ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: capabilitiescompute_cred 2004-04-02 20:21 ` capabilitiescompute_cred Andy Lutomirski @ 2004-04-02 21:03 ` Chris Wright 2004-04-02 21:47 ` capabilitiescompute_cred Stephen Smalley 1 sibling, 0 replies; 4+ messages in thread From: Chris Wright @ 2004-04-02 21:03 UTC (permalink / raw) To: Andy Lutomirski Cc: Chris Wright, Stephen Smalley, Andrew Morton, luto, linux-kernel * Andy Lutomirski (luto@stanford.edu) wrote: > Chris Wright wrote: > > I have the same dislike for capabilities. It's more like a wart than > > a feature. I get requests to have RBAC be the core priv system rather > > than capabilities. > > I agree in principle, but it would still be nice to have a simple way to > have useful capabilities without setting up a MAC system. I don't see a > capabilities fix adding any significant amount of code; it just takes > some effort to get it right. Main problem is the granularity and poorly defined semantics. You have no context when making a capability decision. In some cases it overrides normal DAC checks, and in other cases it's a stand alone privilege. Then there's CAP_SYS_ADMIN... > > In the meantime, I've often idly wondered why we don't simply inherit as > > advertised. The patch below does this, but I haven't even started > > looking for security sensitive failure modes. > > I'm not sure that introduces security problems, but I'm also not sure it > fixes much. You can find my attempts to get it right in the > linux-kernel archives, and I'll probably try to get something into 2.7 > when it forks. With or without MAC, having a functioning capability > system wouldn't hurt security. It simply allows one to properly inherit. As it stands inherit is totally broken. Once you execve() the capabilities get reset to all or nothing. So if you want to drop privs and execve() bash (as a login utility might do), you'll need something like this. Only hesitance I have is being sure it doesn't introduce some subtle bug. thanks, -chris -- Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: capabilitiescompute_cred 2004-04-02 20:21 ` capabilitiescompute_cred Andy Lutomirski 2004-04-02 21:03 ` capabilitiescompute_cred Chris Wright @ 2004-04-02 21:47 ` Stephen Smalley 2004-04-03 15:41 ` capabilitiescompute_cred Andy Lutomirski 1 sibling, 1 reply; 4+ messages in thread From: Stephen Smalley @ 2004-04-02 21:47 UTC (permalink / raw) To: Andy Lutomirski; +Cc: Chris Wright, Andrew Morton, luto, lkml On Fri, 2004-04-02 at 15:21, Andy Lutomirski wrote: > I agree in principle, but it would still be nice to have a simple way to > have useful capabilities without setting up a MAC system. I don't see a > capabilities fix adding any significant amount of code; it just takes > some effort to get it right. I'm not opposed to making the existing capability logic more useable; I just think that capabilities will ultimately be superseded by TE. > You can find my attempts to get it right in the > linux-kernel archives, and I'll probably try to get something into 2.7 > when it forks. With or without MAC, having a functioning capability > system wouldn't hurt security. Does revising the capability logic need to wait on 2.7? Have you changed the logic significantly since the last patch you posted to lkml? -- Stephen Smalley <sds@epoch.ncsc.mil> National Security Agency ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: capabilitiescompute_cred 2004-04-02 21:47 ` capabilitiescompute_cred Stephen Smalley @ 2004-04-03 15:41 ` Andy Lutomirski 0 siblings, 0 replies; 4+ messages in thread From: Andy Lutomirski @ 2004-04-03 15:41 UTC (permalink / raw) To: Stephen Smalley, Andrew Morton; +Cc: Chris Wright, luto, lkml Stephen Smalley wrote: > On Fri, 2004-04-02 at 15:21, Andy Lutomirski wrote: > >>I agree in principle, but it would still be nice to have a simple way to >>have useful capabilities without setting up a MAC system. I don't see a >>capabilities fix adding any significant amount of code; it just takes >>some effort to get it right. > > > I'm not opposed to making the existing capability logic more useable; I > just think that capabilities will ultimately be superseded by TE. > > >>You can find my attempts to get it right in the >>linux-kernel archives, and I'll probably try to get something into 2.7 >>when it forks. With or without MAC, having a functioning capability >>system wouldn't hurt security. > > > Does revising the capability logic need to wait on 2.7? Have you > changed the logic significantly since the last patch you posted to lkml? > I don't _think_ it's changed, but I'll double-check that in a few days (I'm out of town). I'll also rediff my patch. Should it be a config option? Anyway, I have no strong objection to seeing a change in 2.6 -- there's just some risk that it could break something that depends on the current (broken, undocumented) behavior. Andrew: would you be willing to put a capabilities fix into -mm? --Andy ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2004-04-03 15:41 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20040402033231.05c0c337.akpm@osdl.org>
[not found] ` <1080912069.27706.42.camel@moss-spartans.epoch.ncsc.mil>
[not found] ` <20040402111554.E21045@build.pdx.osdl.net>
2004-04-02 20:21 ` capabilitiescompute_cred Andy Lutomirski
2004-04-02 21:03 ` capabilitiescompute_cred Chris Wright
2004-04-02 21:47 ` capabilitiescompute_cred Stephen Smalley
2004-04-03 15:41 ` capabilitiescompute_cred Andy Lutomirski
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox