* [PATCH] LSM networking update: summary (0/5)
@ 2003-02-06 15:11 James Morris
0 siblings, 0 replies; 6+ messages in thread
From: James Morris @ 2003-02-06 15:11 UTC (permalink / raw)
To: David S. Miller, kuznet; +Cc: linux-security-module, netdev
The following five patches are an updated version of the LSM (Linux
Security Modules) networking support hooks, submitted for inclusion in 2.5
mainline.
Since the post last week, the networking hooks have been reworked so that
they are more generalized and do not poke as deeply into network
protocols.
Change summary:
o The netdevice, skb and ipv4 hooks are gone.
o The sock_queue_rcv_skb() hook has been encapsulated within
sk_filter() as suggested by David Miller.
o The sk->security field has been removed (use the socket inode field
instead, if needed, or infer the value).
o The sk_filter() calls for TCPv4 and TCPv6 have been relocated so that
they are called before skb->dev is cleared (which also fixes a
mainline issue).
o An sk_filter() call was added to SCTP.
o The default Netlink capability hooks have been inlined so that they do
not call out to a module when CONFIG_SECURITY is disabled, per
requirements from David Miller.
o The Netlink hooks now also cover ip6_queue and xfrm_user.
Full diffstat:
include/linux/security.h | 429 ++++++++++++++++++++++++++++++++++++++++-
include/net/sock.h | 95 ++++++---
net/core/rtnetlink.c | 3
net/decnet/dn_nsp_in.c | 29 +-
net/ipv4/netfilter/ip_queue.c | 3
net/ipv4/tcp_ipv4.c | 9
net/ipv4/xfrm_user.c | 3
net/ipv6/netfilter/ip6_queue.c | 6
net/ipv6/tcp_ipv6.c | 15 -
net/netlink/af_netlink.c | 8
net/sctp/input.c | 4
net/socket.c | 72 ++++++
net/unix/af_unix.c | 16 +
security/Kconfig | 9
security/capability.c | 2
security/dummy.c | 135 ++++++++++++
16 files changed, 760 insertions(+), 78 deletions(-)
- James
--
James Morris
<jmorris@intercode.com.au>
^ permalink raw reply [flat|nested] 6+ messages in thread
* RE: [PATCH] LSM networking update: summary (0/5)
@ 2003-02-07 16:58 Makan Pourzandi (LMC)
2003-02-07 23:10 ` James Morris
2003-02-08 8:24 ` David S. Miller
0 siblings, 2 replies; 6+ messages in thread
From: Makan Pourzandi (LMC) @ 2003-02-07 16:58 UTC (permalink / raw)
To: 'James Morris', David S. Miller, kuznet
Cc: linux-security-module, netdev
Hi all,
My comments conecrn the (ip_decode_options, ip_encapsulate and ip_decapsulate) hooks. Even, if James has done much regarding this topic and I'm sure that he knows much more than me about it, I wanted to give my 2 cents on why we should keep these hooks in future releases.
Actually, we know that based on FIPS documents (http://csrc.nist.gov/publications/fips/fips188/fips188.ps) we can use ip options for security purposes. I believe for my part that this hook can be useful if used to decode ip options and decide to drop or not the ip packets. I don't believe that this level of control can be achieved using other hooks at socket layer.
In DSI project (security in telecom clustered servers, www.sourceforge.net/projects/disec), we use this hook for dropping ip packets from processes in the cluster that do not have privileges to communicate to defined nodes in the cluster. Mainly, this hook is useful because it allows us to have a process-level control over communications from a node to another node. I don't believe that this can be achieved with firewalling rules as this means setting up rules for an ip address (which means for all processes in a node in the cluster). Further more, SSL does not cut it as it is based on developer's will and competence to be used properly.
I believe that the use of ip_decode_options by DSI is only one example and its use can be easily extended to various other cases.
Regards,
Makan Pourzandi
-------------------------------------------------------
Makan Pourzandi
Ericsson Research Canada
http://sourceforge.net/projects/disec/
-------------------------------------------------------
This email does not represent or express the opinions of Ericsson
Corporation.
> -----Original Message-----
> From: James Morris [mailto:jmorris@intercode.com.au]
> Sent: Thursday, February 06, 2003 10:11 AM
> To: David S. Miller; kuznet@ms2.inr.ac.ru
> Cc: linux-security-module@wirex.com; netdev@oss.sgi.com
> Subject: [PATCH] LSM networking update: summary (0/5)
>
>
> The following five patches are an updated version of the LSM (Linux
> Security Modules) networking support hooks, submitted for
> inclusion in 2.5
> mainline.
>
> Since the post last week, the networking hooks have been
> reworked so that
> they are more generalized and do not poke as deeply into network
> protocols.
>
> Change summary:
>
> o The netdevice, skb and ipv4 hooks are gone.
>
> o The sock_queue_rcv_skb() hook has been encapsulated within
> sk_filter() as suggested by David Miller.
>
> o The sk->security field has been removed (use the socket
> inode field
> instead, if needed, or infer the value).
>
> o The sk_filter() calls for TCPv4 and TCPv6 have been
> relocated so that
> they are called before skb->dev is cleared (which also fixes a
> mainline issue).
>
> o An sk_filter() call was added to SCTP.
>
> o The default Netlink capability hooks have been inlined so
> that they do
> not call out to a module when CONFIG_SECURITY is disabled, per
> requirements from David Miller.
>
> o The Netlink hooks now also cover ip6_queue and xfrm_user.
>
>
> Full diffstat:
>
> include/linux/security.h | 429
> ++++++++++++++++++++++++++++++++++++++++-
> include/net/sock.h | 95 ++++++---
> net/core/rtnetlink.c | 3
> net/decnet/dn_nsp_in.c | 29 +-
> net/ipv4/netfilter/ip_queue.c | 3
> net/ipv4/tcp_ipv4.c | 9
> net/ipv4/xfrm_user.c | 3
> net/ipv6/netfilter/ip6_queue.c | 6
> net/ipv6/tcp_ipv6.c | 15 -
> net/netlink/af_netlink.c | 8
> net/sctp/input.c | 4
> net/socket.c | 72 ++++++
> net/unix/af_unix.c | 16 +
> security/Kconfig | 9
> security/capability.c | 2
> security/dummy.c | 135 ++++++++++++
> 16 files changed, 760 insertions(+), 78 deletions(-)
>
>
> - James
> --
> James Morris
> <jmorris@intercode.com.au>
>
>
> _______________________________________________
> linux-security-module mailing list
> linux-security-module@wirex.com
> http://mail.wirex.com/mailman/listinfo/linux-security-module
>
^ permalink raw reply [flat|nested] 6+ messages in thread
* RE: [PATCH] LSM networking update: summary (0/5)
2003-02-07 16:58 [PATCH] LSM networking update: summary (0/5) Makan Pourzandi (LMC)
@ 2003-02-07 23:10 ` James Morris
2003-02-08 8:44 ` David S. Miller
2003-02-08 8:24 ` David S. Miller
1 sibling, 1 reply; 6+ messages in thread
From: James Morris @ 2003-02-07 23:10 UTC (permalink / raw)
To: Makan Pourzandi (LMC)
Cc: David S. Miller, kuznet, linux-security-module, netdev
On Fri, 7 Feb 2003, Makan Pourzandi (LMC) wrote:
> Hi all,
>
> My comments conecrn the (ip_decode_options, ip_encapsulate and
> ip_decapsulate) hooks. Even, if James has done much regarding this topic
> and I'm sure that he knows much more than me about it, I wanted to give
> my 2 cents on why we should keep these hooks in future releases.
>
As mentioned during the last week, the current set of network hooks will
not directly support explicitly labeled networking. It's not just the ip
hooks: you'd also need the skb and possibly other rejected hooks to make
it useful.
Possibilities moving forward include reworking the design of the relevant
LSM frameork components so that they are acceptable to the network
maintainers in a future kernel release cycle, and investigating other
schemes such as implicit labeling (e.g. Ajaya Chitturi's work on the Flask
project).
- James
--
James Morris
<jmorris@intercode.com.au>
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH] LSM networking update: summary (0/5)
2003-02-07 16:58 [PATCH] LSM networking update: summary (0/5) Makan Pourzandi (LMC)
2003-02-07 23:10 ` James Morris
@ 2003-02-08 8:24 ` David S. Miller
1 sibling, 0 replies; 6+ messages in thread
From: David S. Miller @ 2003-02-08 8:24 UTC (permalink / raw)
To: Makan.Pourzandi; +Cc: jmorris, kuznet, linux-security-module, netdev
From: "Makan Pourzandi (LMC)" <Makan.Pourzandi@ericsson.ca>
Date: Fri, 7 Feb 2003 11:58:49 -0500
Actually, we know that based on FIPS documents
(http://csrc.nist.gov/publications/fips/fips188/fips188.ps) we can
use ip options for security purposes. I believe for my part that
this hook can be useful if used to decode ip options and decide to
drop or not the ip packets. I don't believe that this level of
control can be achieved using other hooks at socket layer.
James added a hook for SKB reception, you can do whatever you
want in analzying incoming packet contents using that generic
hook.
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH] LSM networking update: summary (0/5)
2003-02-07 23:10 ` James Morris
@ 2003-02-08 8:44 ` David S. Miller
2003-02-08 9:43 ` James Morris
0 siblings, 1 reply; 6+ messages in thread
From: David S. Miller @ 2003-02-08 8:44 UTC (permalink / raw)
To: jmorris; +Cc: Makan.Pourzandi, kuznet, linux-security-module, netdev
From: James Morris <jmorris@intercode.com.au>
Date: Sat, 8 Feb 2003 10:10:44 +1100 (EST)
As mentioned during the last week, the current set of network hooks will
not directly support explicitly labeled networking.
Why not? I thought we had completely established that anything
the socket receive SKB hook could not handle would be implementable
via netfilter.
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH] LSM networking update: summary (0/5)
2003-02-08 8:44 ` David S. Miller
@ 2003-02-08 9:43 ` James Morris
0 siblings, 0 replies; 6+ messages in thread
From: James Morris @ 2003-02-08 9:43 UTC (permalink / raw)
To: David S. Miller; +Cc: Makan.Pourzandi, kuznet, linux-security-module, netdev
On Sat, 8 Feb 2003, David S. Miller wrote:
> From: James Morris <jmorris@intercode.com.au>
> Date: Sat, 8 Feb 2003 10:10:44 +1100 (EST)
>
> As mentioned during the last week, the current set of network hooks will
> not directly support explicitly labeled networking.
>
> Why not? I thought we had completely established that anything
> the socket receive SKB hook could not handle would be implementable
> via netfilter.
>
By not directly supported, I mean by the LSM network hooks.
- James
--
James Morris
<jmorris@intercode.com.au>
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2003-02-08 9:43 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-02-07 16:58 [PATCH] LSM networking update: summary (0/5) Makan Pourzandi (LMC)
2003-02-07 23:10 ` James Morris
2003-02-08 8:44 ` David S. Miller
2003-02-08 9:43 ` James Morris
2003-02-08 8:24 ` David S. Miller
-- strict thread matches above, loose matches on Subject: below --
2003-02-06 15:11 James Morris
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).