public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Peter Dolding <oiaohm@gmail.com>
To: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org
Subject: Re: Linux Security *Module* Framework (Was: LSM conversion to static interface)
Date: Wed, 31 Oct 2007 09:38:18 +1000	[thread overview]
Message-ID: <4727C06A.4060005@gmail.com> (raw)
In-Reply-To: <Pine.LNX.4.64.0710301136560.31325@fbirervta.pbzchgretzou.qr>

Jan Engelhardt wrote:
> I disagree.
>
> Traditionally, Linux has given a process all capabilities when the
> UID changed to 0 (either by setuid(2) or executing a SUID binary).
> This has been relieved over the years, and right now with LSMs in the
> field, it is possible to 'deactivate' this special case for UID 0.
>   
> SELinux does not have this special case for UID 0. Neither does it
> seem to use capabilities (quick grep through the source). So
> basically, all users are the same, and no one has capabilities by
> default. Does SELinux thus break with other LSMs?
>
> Now assume a SELinux system where all users have all capabilities
> (and the policy that is in place restricts the use of these
> capabilities then) -- should not be that unlikely. Does that break
> with other LSMs?
>   
MultiAdmin loaded before Selinux breaks Selinux since Multi Admin rules 
are applied over using Selinux rules.  This is just the way it is 
stacking LSM's is Just not healthy you always risk on LSM breaking 
another.  Part of the reason why I have suggested a complete redesign of 
LSM.  To get away from this problem of stacking.

I see MultiAdmin purely in the class of posix file capabilities( Fine 
grained replacement to SUID).
This is a standard feature fix not part of LSM.  Note it can not replace 
all SUID bits due to some internals of applications design need to be 
changed to support posix file capabilities in particular not checking if 
running as UID 0.  Traditional  UID 0 is already optional for 
applications without  LSM's.

Posix file capabilities only applies to applications only.  MultiAdmin 
being the user mirror of Posix file capabilities.

MultiAdmin patch to the user side may allow more SUID bits to be killed 
off from the start line.  So increasing overall system security.

Of course MultiAdmin might end up two halfs.   One a standard feature 
that hands out capabilities to users that LSMs can overrule.  And one a 
user by user directory access control LSM directory control LSM less 
likely to cause problems.

I really don't see the need for a LSM stacking order.  Some features 
just should not be LSM's in my eyes.  MultiAdmin is one of them.

Traditional way has all ready been expanded for applications without 
LSM's.  So my call still stand O heck head ache rating.   Because its in 
the wrong place.  Particularly when you think people will want to use it 
stacked with other LSM's.   Stacking should be avoided where able.   
This means at least some of Multiadmin features just have to be done 
core kernel as a normal kernel module to avoid stacking and breaking the 
LSM.

Note posix file capabilities was developed as a LSM module too at first 
the point came where it was going to cause more trouble for other LSMs 
granting stuff in conflict.    Both Multiadmin and posix file 
capabilities share a lot in common.  Both developed in the wrong place.  
Both required to be else where.  Even there function is similar breaking 
down root powers and handing them out more effectively.  So in my eyes 
it is a pure Posix extension not a LSM.

Peter Dolding

  parent reply	other threads:[~2007-10-30 23:38 UTC|newest]

Thread overview: 103+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-10-29 19:04 Linux Security *Module* Framework (Was: LSM conversion to static interface) Rob Meijer
2007-10-29 19:41 ` Crispin Cowan
2007-10-30  5:13   ` Peter Dolding
2007-10-30  7:14     ` Defense in depth: LSM *modules*, not a static interface Cliffe
2007-10-30  6:55       ` Al Viro
2007-10-30  7:55         ` Crispin Cowan
2007-10-30 15:01           ` Casey Schaufler
2007-10-30  8:00         ` Cliffe
2007-10-30 12:30       ` Simon Arlott
2007-11-06  3:46         ` Crispin Cowan
2007-11-06  7:26           ` Cliffe
2007-11-06 23:59             ` Peter Dolding
2007-11-07  3:50               ` Cliffe
2007-11-07  3:35                 ` Casey Schaufler
2007-11-07  4:11                   ` Tetsuo Handa
2007-11-07  4:34                     ` Peter Dolding
2007-11-07  4:34                     ` Casey Schaufler
2007-10-30 18:42     ` Linux Security *Module* Framework (Was: LSM conversion to static interface) Jan Engelhardt
2007-10-30 19:14       ` Casey Schaufler
2007-10-30 19:50         ` Jan Engelhardt
2007-10-30 23:38       ` Peter Dolding [this message]
2007-10-31  0:16         ` david
2007-10-31  2:21           ` Peter Dolding
2007-10-31  3:43             ` Casey Schaufler
2007-10-31  5:08             ` david
2007-10-31  6:43             ` Crispin Cowan
2007-10-31  9:03               ` Peter Dolding
2007-10-31 10:10               ` Toshiharu Harada
2007-11-01  2:04                 ` Peter Dolding
2007-11-01  2:20                   ` Casey Schaufler
2007-11-01  2:51                     ` Peter Dolding
2007-11-01  7:17                       ` Jan Engelhardt
2007-11-01 11:49                         ` David Newall
2007-11-04  1:28                           ` Peter Dolding
2007-11-05  6:56                       ` Andrew Morgan
2007-11-05 13:29                         ` Serge E. Hallyn
2007-10-29 20:27 ` Casey Schaufler
  -- strict thread matches above, loose matches on Subject: below --
2007-10-29 10:01 Rob Meijer
2007-10-29 10:24 ` Crispin Cowan
2007-10-29 13:32   ` Peter Dolding
2007-10-18  2:18 LSM conversion to static interface Linus Torvalds
2007-10-19 20:26 ` Andreas Gruenbacher
2007-10-19 20:40   ` Linus Torvalds
2007-10-20 11:05     ` Jan Engelhardt
2007-10-20 22:57       ` James Morris
2007-10-23  4:09         ` LSM conversion to static interface [revert patch] Arjan van de Ven
2007-10-23  5:16           ` Chris Wright
2007-10-24  0:31             ` Jeremy Fitzhardinge
2007-10-24  5:06               ` Arjan van de Ven
2007-10-24 11:50                 ` Linux Security *Module* Framework (Was: LSM conversion to static interface Simon Arlott
2007-10-24 12:55                   ` Adrian Bunk
2007-10-24 18:11                     ` Linux Security *Module* Framework (Was: LSM conversion to static interface) Simon Arlott
2007-10-24 18:51                       ` Jan Engelhardt
2007-10-24 18:59                         ` Simon Arlott
2007-10-24 19:04                           ` Jan Engelhardt
2007-10-24 21:02                             ` David P. Quigley
2007-10-24 21:37                               ` Serge E. Hallyn
2007-10-24 21:51                                 ` Jan Engelhardt
2007-10-24 22:02                                   ` David P. Quigley
2007-10-24 23:13                                     ` Jan Engelhardt
2007-10-25  1:50                                 ` david
2007-10-25  3:50                                 ` Kyle Moffett
2007-10-24 21:42                               ` Jan Engelhardt
2007-10-24 21:58                               ` Casey Schaufler
2007-10-24 22:04                                 ` David P. Quigley
2007-10-25 11:38                               ` Simon Arlott
2007-10-24 20:18                         ` Crispin Cowan
2007-10-24 20:46                           ` Jan Engelhardt
2007-10-24 21:29                             ` Casey Schaufler
2007-10-24 22:31                       ` Adrian Bunk
2007-10-24 22:58                         ` Casey Schaufler
2007-10-24 23:32                           ` Adrian Bunk
2007-10-24 23:42                             ` Linus Torvalds
2007-10-25  0:41                               ` Chris Wright
2007-10-25  2:19                                 ` Arjan van de Ven
2007-10-30  3:37                                 ` Toshiharu Harada
2007-10-25  1:03                               ` Casey Schaufler
2007-10-25  0:23                           ` Chris Wright
2007-10-25  0:35                             ` Ray Lee
2007-10-25  1:26                               ` Peter Dolding
2007-10-25  1:41                               ` Alan Cox
2007-10-25  2:11                                 ` david
2007-10-25 18:17                                 ` Ray Lee
2007-10-25 22:21                                   ` Alan Cox
2007-10-26  3:45                                     ` david
2007-10-26  5:44                                       ` Peter Dolding
2007-10-27 18:29                                   ` Pavel Machek
2007-10-28 18:48                                     ` Hua Zhong
2007-10-28 19:05                                     ` Hua Zhong
2007-10-28 22:08                                 ` Crispin Cowan
2007-10-28 22:50                                   ` Alan Cox
2007-11-26 20:42                                     ` serge
2007-10-28 23:55                                   ` Peter Dolding
2007-10-29  5:12                                   ` Arjan van de Ven
2007-10-25  9:19                               ` Bernd Petrovitsch
2007-10-25 16:04                                 ` Ray Lee
2007-10-25 17:10                                   ` Arjan van de Ven
2007-10-30  9:41                                   ` Bernd Petrovitsch
2007-10-25  1:42                             ` Casey Schaufler
2007-10-27 18:22                               ` Pavel Machek
2007-10-30  3:23                               ` Toshiharu Harada
2007-10-30  8:40                                 ` Jan Engelhardt
2007-10-30  8:50                                   ` Crispin Cowan
2007-10-30  9:27                                     ` Jan Engelhardt
2007-10-30  9:21                                   ` Toshiharu Harada
2007-10-25 11:44                         ` Simon Arlott
2007-10-25 23:09                         ` Tilman Schmidt
2007-10-26  2:56                           ` Greg KH
2007-10-26  7:09                             ` Jan Engelhardt
2007-10-26 15:54                               ` Greg KH
2007-10-26  9:46                             ` Tilman Schmidt
2007-10-26 15:58                               ` Greg KH
2007-10-26 16:32                                 ` Simon Arlott
2007-10-26 23:26                               ` Adrian Bunk

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4727C06A.4060005@gmail.com \
    --to=oiaohm@gmail.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox