netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] LSM networking update: summary (0/5)
@ 2003-02-06 15:11 James Morris
  0 siblings, 0 replies; 6+ messages in thread
From: James Morris @ 2003-02-06 15:11 UTC (permalink / raw)
  To: David S. Miller, kuznet; +Cc: linux-security-module, netdev

The following five patches are an updated version of the LSM (Linux 
Security Modules) networking support hooks, submitted for inclusion in 2.5 
mainline.

Since the post last week, the networking hooks have been reworked so that
they are more generalized and do not poke as deeply into network
protocols.

Change summary:

  o The netdevice, skb and ipv4 hooks are gone.

  o The sock_queue_rcv_skb() hook has been encapsulated within 
    sk_filter() as suggested by David Miller.

  o The sk->security field has been removed (use the socket inode field 
    instead, if needed, or infer the value).

  o The sk_filter() calls for TCPv4 and TCPv6 have been relocated so that 
    they are called before skb->dev is cleared (which also fixes a 
    mainline issue).

  o An sk_filter() call was added to SCTP.

  o The default Netlink capability hooks have been inlined so that they do 
    not call out to a module when CONFIG_SECURITY is disabled, per 
    requirements from David Miller.

  o The Netlink hooks now also cover ip6_queue and xfrm_user.


Full diffstat:

 include/linux/security.h       |  429 ++++++++++++++++++++++++++++++++++++++++-
 include/net/sock.h             |   95 ++++++---
 net/core/rtnetlink.c           |    3 
 net/decnet/dn_nsp_in.c         |   29 +-
 net/ipv4/netfilter/ip_queue.c  |    3 
 net/ipv4/tcp_ipv4.c            |    9 
 net/ipv4/xfrm_user.c           |    3 
 net/ipv6/netfilter/ip6_queue.c |    6 
 net/ipv6/tcp_ipv6.c            |   15 -
 net/netlink/af_netlink.c       |    8 
 net/sctp/input.c               |    4 
 net/socket.c                   |   72 ++++++
 net/unix/af_unix.c             |   16 +
 security/Kconfig               |    9 
 security/capability.c          |    2 
 security/dummy.c               |  135 ++++++++++++
 16 files changed, 760 insertions(+), 78 deletions(-)


- James
-- 
James Morris
<jmorris@intercode.com.au>

^ permalink raw reply	[flat|nested] 6+ messages in thread

* RE: [PATCH] LSM networking update: summary (0/5)
@ 2003-02-07 16:58 Makan Pourzandi (LMC)
  2003-02-07 23:10 ` James Morris
  2003-02-08  8:24 ` David S. Miller
  0 siblings, 2 replies; 6+ messages in thread
From: Makan Pourzandi (LMC) @ 2003-02-07 16:58 UTC (permalink / raw)
  To: 'James Morris', David S. Miller, kuznet
  Cc: linux-security-module, netdev

Hi all, 

My comments conecrn the (ip_decode_options, ip_encapsulate and ip_decapsulate) hooks. Even, if James has done much regarding this topic and I'm sure that he knows much more than me about it, I wanted to give my 2 cents on why we should keep these hooks in future releases. 

Actually, we know that based on FIPS documents (http://csrc.nist.gov/publications/fips/fips188/fips188.ps) we can use ip options for security purposes. I believe for my part that this hook can be useful if used to decode ip options and decide to drop or not the ip packets. I don't believe that this level of control can be achieved using other hooks at socket layer. 

In DSI project (security in telecom clustered servers,  www.sourceforge.net/projects/disec), we use this hook for dropping ip packets from processes in the cluster that do not have privileges to communicate to defined nodes in the cluster. Mainly, this hook is useful because it allows us to have a process-level control over communications from a node to another node. I don't believe that this can be achieved with firewalling rules as this means setting up rules for an ip address (which means for all processes in a node in the cluster). Further more, SSL does not cut it as it is based on developer's will and competence to be used properly. 

I believe that the use of ip_decode_options by DSI is only one example and its use can be easily extended to various other cases. 

Regards,
Makan Pourzandi 
-------------------------------------------------------
Makan Pourzandi            
Ericsson Research Canada
http://sourceforge.net/projects/disec/      
-------------------------------------------------------         

This email does not represent or express the opinions of Ericsson
Corporation.

> -----Original Message-----
> From: James Morris [mailto:jmorris@intercode.com.au]
> Sent: Thursday, February 06, 2003 10:11 AM
> To: David S. Miller; kuznet@ms2.inr.ac.ru
> Cc: linux-security-module@wirex.com; netdev@oss.sgi.com
> Subject: [PATCH] LSM networking update: summary (0/5)
> 
> 
> The following five patches are an updated version of the LSM (Linux 
> Security Modules) networking support hooks, submitted for 
> inclusion in 2.5 
> mainline.
> 
> Since the post last week, the networking hooks have been 
> reworked so that
> they are more generalized and do not poke as deeply into network
> protocols.
> 
> Change summary:
> 
>   o The netdevice, skb and ipv4 hooks are gone.
> 
>   o The sock_queue_rcv_skb() hook has been encapsulated within 
>     sk_filter() as suggested by David Miller.
> 
>   o The sk->security field has been removed (use the socket 
> inode field 
>     instead, if needed, or infer the value).
> 
>   o The sk_filter() calls for TCPv4 and TCPv6 have been 
> relocated so that 
>     they are called before skb->dev is cleared (which also fixes a 
>     mainline issue).
> 
>   o An sk_filter() call was added to SCTP.
> 
>   o The default Netlink capability hooks have been inlined so 
> that they do 
>     not call out to a module when CONFIG_SECURITY is disabled, per 
>     requirements from David Miller.
> 
>   o The Netlink hooks now also cover ip6_queue and xfrm_user.
> 
> 
> Full diffstat:
> 
>  include/linux/security.h       |  429 
> ++++++++++++++++++++++++++++++++++++++++-
>  include/net/sock.h             |   95 ++++++---
>  net/core/rtnetlink.c           |    3 
>  net/decnet/dn_nsp_in.c         |   29 +-
>  net/ipv4/netfilter/ip_queue.c  |    3 
>  net/ipv4/tcp_ipv4.c            |    9 
>  net/ipv4/xfrm_user.c           |    3 
>  net/ipv6/netfilter/ip6_queue.c |    6 
>  net/ipv6/tcp_ipv6.c            |   15 -
>  net/netlink/af_netlink.c       |    8 
>  net/sctp/input.c               |    4 
>  net/socket.c                   |   72 ++++++
>  net/unix/af_unix.c             |   16 +
>  security/Kconfig               |    9 
>  security/capability.c          |    2 
>  security/dummy.c               |  135 ++++++++++++
>  16 files changed, 760 insertions(+), 78 deletions(-)
> 
> 
> - James
> -- 
> James Morris
> <jmorris@intercode.com.au>
> 
> 
> _______________________________________________
> linux-security-module mailing list
> linux-security-module@wirex.com
> http://mail.wirex.com/mailman/listinfo/linux-security-module
> 

^ permalink raw reply	[flat|nested] 6+ messages in thread

* RE: [PATCH] LSM networking update: summary (0/5)
  2003-02-07 16:58 [PATCH] LSM networking update: summary (0/5) Makan Pourzandi (LMC)
@ 2003-02-07 23:10 ` James Morris
  2003-02-08  8:44   ` David S. Miller
  2003-02-08  8:24 ` David S. Miller
  1 sibling, 1 reply; 6+ messages in thread
From: James Morris @ 2003-02-07 23:10 UTC (permalink / raw)
  To: Makan Pourzandi (LMC)
  Cc: David S. Miller, kuznet, linux-security-module, netdev

On Fri, 7 Feb 2003, Makan Pourzandi (LMC) wrote:

> Hi all,
> 
> My comments conecrn the (ip_decode_options, ip_encapsulate and
> ip_decapsulate) hooks. Even, if James has done much regarding this topic
> and I'm sure that he knows much more than me about it, I wanted to give
> my 2 cents on why we should keep these hooks in future releases.
> 

As mentioned during the last week, the current set of network hooks will
not directly support explicitly labeled networking.  It's not just the ip
hooks: you'd also need the skb and possibly other rejected hooks to make 
it useful.

Possibilities moving forward include reworking the design of the relevant
LSM frameork components so that they are acceptable to the network
maintainers in a future kernel release cycle, and investigating other
schemes such as implicit labeling (e.g. Ajaya Chitturi's work on the Flask
project).


- James
-- 
James Morris 
<jmorris@intercode.com.au>

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH] LSM networking update: summary (0/5)
  2003-02-07 16:58 [PATCH] LSM networking update: summary (0/5) Makan Pourzandi (LMC)
  2003-02-07 23:10 ` James Morris
@ 2003-02-08  8:24 ` David S. Miller
  1 sibling, 0 replies; 6+ messages in thread
From: David S. Miller @ 2003-02-08  8:24 UTC (permalink / raw)
  To: Makan.Pourzandi; +Cc: jmorris, kuznet, linux-security-module, netdev

   From: "Makan Pourzandi (LMC)" <Makan.Pourzandi@ericsson.ca>
   Date: Fri, 7 Feb 2003 11:58:49 -0500 

   Actually, we know that based on FIPS documents
   (http://csrc.nist.gov/publications/fips/fips188/fips188.ps) we can
   use ip options for security purposes. I believe for my part that
   this hook can be useful if used to decode ip options and decide to
   drop or not the ip packets. I don't believe that this level of
   control can be achieved using other hooks at socket layer. 

James added a hook for SKB reception, you can do whatever you
want in analzying incoming packet contents using that generic
hook.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH] LSM networking update: summary (0/5)
  2003-02-07 23:10 ` James Morris
@ 2003-02-08  8:44   ` David S. Miller
  2003-02-08  9:43     ` James Morris
  0 siblings, 1 reply; 6+ messages in thread
From: David S. Miller @ 2003-02-08  8:44 UTC (permalink / raw)
  To: jmorris; +Cc: Makan.Pourzandi, kuznet, linux-security-module, netdev

   From: James Morris <jmorris@intercode.com.au>
   Date: Sat, 8 Feb 2003 10:10:44 +1100 (EST)
   
   As mentioned during the last week, the current set of network hooks will
   not directly support explicitly labeled networking.

Why not?  I thought we had completely established that anything
the socket receive SKB hook could not handle would be implementable
via netfilter.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH] LSM networking update: summary (0/5)
  2003-02-08  8:44   ` David S. Miller
@ 2003-02-08  9:43     ` James Morris
  0 siblings, 0 replies; 6+ messages in thread
From: James Morris @ 2003-02-08  9:43 UTC (permalink / raw)
  To: David S. Miller; +Cc: Makan.Pourzandi, kuznet, linux-security-module, netdev

On Sat, 8 Feb 2003, David S. Miller wrote:

>    From: James Morris <jmorris@intercode.com.au>
>    Date: Sat, 8 Feb 2003 10:10:44 +1100 (EST)
>    
>    As mentioned during the last week, the current set of network hooks will
>    not directly support explicitly labeled networking.
> 
> Why not?  I thought we had completely established that anything
> the socket receive SKB hook could not handle would be implementable
> via netfilter.
> 

By not directly supported, I mean by the LSM network hooks.


- James
-- 
James Morris
<jmorris@intercode.com.au>

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2003-02-08  9:43 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-02-07 16:58 [PATCH] LSM networking update: summary (0/5) Makan Pourzandi (LMC)
2003-02-07 23:10 ` James Morris
2003-02-08  8:44   ` David S. Miller
2003-02-08  9:43     ` James Morris
2003-02-08  8:24 ` David S. Miller
  -- strict thread matches above, loose matches on Subject: below --
2003-02-06 15:11 James Morris

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).