From: Jamie Lokier <jamie@shareable.org>
To: Crispin Cowan <crispin@crispincowan.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>,
"Serge E. Hallyn" <serue@us.ibm.com>,
Matthew Wilcox <matthew@wil.cx>,
Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>,
paul.moore@hp.com, akpm@linux-foundation.org,
linux-kernel@vger.kernel.org,
linux-security-module@vger.kernel.org, takedakn@nttdata.co.jp,
linux-fsdevel@vger.kernel.org, netdev@vger.kernel.org
Subject: Re: [TOMOYO #7 30/30] Hooks for SAKURA and TOMOYO.
Date: Thu, 17 Apr 2008 09:45:22 +0100 [thread overview]
Message-ID: <20080417084522.GA23301@shareable.org> (raw)
In-Reply-To: <4807011D.8060009@crispincowan.com>
Crispin Cowan wrote:
> Of *course* AppArmor protects the integrity of /etc/shadow, and
> unauthorized parties are not permitted to feed data into that file
> unless explicit access is granted. The difference is in how it is done:
>
> * SELinux marks the inode with a label, and only processes with the
> right permissions can mess with the label.
> o Residual problem: someone could rename the inode and drop a
> new inode into place named "/etc/shadow". SELinux addresses
> this with access control on the parent directory.
<small> I have actually hacked a system by renaming /etc/passwd in
this way. /etc was owned by user "bin", and I had a login as "bin"
due to a misfeature in some program. So I substituted another
/etc/passwd, and gave myself a root shell. </small>
The trouble with access control on the parent directory is that
occasionally some human accidentally forgets how important that is,
thinking that permissions on the /etc/shadow file are important.
Also *programs* care about a file with that name. They reference it
by name, apply security decisions based on a process which starts with
that name. So the name is the most relevant point of communication
between the policy setter and programs which need to be affected.
So I think AppArmor's approach is good here.
> * AppArmor checks the name "/etc/shadow" so that you cannot access
> that name without explicit permission.
> o AppArmor cares about the integrity of what the OS returns
> when you access the name "/etc/shadow" and does not care a
> wit what happens to the inode that was *previously* named
> "/etc/shadow".
>
> Now, without running off into the weeds again, tell me again why I
> should care about the *integrity* of an inode that was *previously*
> known as "/etc/shadow"?
But insufficient here.
If you rename /etc/shadow legitimately, after changing a password,
there might be a program which still has a handle to the _old_ inode
and is still reading it, still comparing a password against its contents.
If policy was entirely name based, so modifications may be possible to
that file after it's renamed from /etc/shadow to /etc/shadow.bak,
_while_ some programs are still reading it (because it was /etc/shadow
when they opened it, and they got swapped for a moment), that's a failure.
So you *should* care about the integrity of an inode that was
previously known as /etc/shadow - at least until you can prove that
nobody is still dependent on it's earlier security properties. That's
a garbage collection problem.
> So associating a security property with a name is ok if you do it
> statically at some arbitrary point in time, but not if you consider it
> at the time of access? WtF? Isn't that a gigantic race condition?
Both are race conditions.
> To the contrary, I argue that the *current* name of a file is vastly
> more meaningful for security properties than the name the file had some
> months ago when someone ran restorecon over the file system.
I agree that the current name is meaningful, but it's not watertight
when your systems change. To avoid unexpected weaknesses, you'll need
to apply the intersection of permissions over a time period, using
name based policy but having it follow renames until you can prove
it's safe to release the following.
-- Jamie
next prev parent reply other threads:[~2008-04-17 8:45 UTC|newest]
Thread overview: 33+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20080404122242.867070732@I-love.SAKURA.ne.jp>
2008-04-04 12:22 ` [TOMOYO #7 07/30] Some wrapper functions for socket operation Tetsuo Handa
2008-04-04 12:23 ` [TOMOYO #7 30/30] Hooks for SAKURA and TOMOYO Tetsuo Handa
2008-04-04 16:29 ` Daniel Walker
2008-04-07 13:56 ` Tetsuo Handa
2008-04-07 15:39 ` Daniel Walker
2008-04-07 15:40 ` Paul Moore
2008-04-07 22:57 ` Casey Schaufler
2008-04-09 8:37 ` Toshiharu Harada
2008-04-09 12:49 ` Stephen Smalley
2008-04-10 5:57 ` Toshiharu Harada
2008-04-10 12:51 ` Stephen Smalley
2008-04-11 11:48 ` Toshiharu Harada
2008-04-09 13:11 ` Matthew Wilcox
2008-04-09 13:26 ` Stephen Smalley
2008-04-11 14:12 ` Tetsuo Handa
2008-04-11 14:30 ` Matthew Wilcox
2008-04-12 11:33 ` Tetsuo Handa
2008-04-13 16:36 ` Serge E. Hallyn
2008-04-14 2:05 ` Crispin Cowan
2008-04-14 14:17 ` Stephen Smalley
2008-04-14 17:05 ` Casey Schaufler
2008-04-15 4:59 ` Crispin Cowan
2008-04-16 16:31 ` Stephen Smalley
2008-04-17 7:49 ` Crispin Cowan
2008-04-17 8:45 ` Jamie Lokier [this message]
2008-04-17 12:42 ` Stephen Smalley
2008-04-15 13:00 ` Toshiharu Harada
2008-04-14 1:41 ` Crispin Cowan
2008-04-14 13:48 ` Matthew Wilcox
2008-04-15 3:21 ` Crispin Cowan
2008-04-15 4:57 ` Al Viro
2008-04-09 13:22 ` Serge E. Hallyn
2008-04-11 3:57 ` Toshiharu Harada
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20080417084522.GA23301@shareable.org \
--to=jamie@shareable.org \
--cc=akpm@linux-foundation.org \
--cc=crispin@crispincowan.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=matthew@wil.cx \
--cc=netdev@vger.kernel.org \
--cc=paul.moore@hp.com \
--cc=penguin-kernel@I-love.SAKURA.ne.jp \
--cc=sds@tycho.nsa.gov \
--cc=serue@us.ibm.com \
--cc=takedakn@nttdata.co.jp \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).