Re: USENIX Security LSM BOF Notes

From: Stephen Smalley (sdsat_private)
Date: Thu Aug 16 2001 - 07:21:35 PDT

  • Next message: richard offer: "Re: USENIX Security LSM BOF Notes"

    Thanks for posting your notes.  A few quick comments:
    
    > Hot Issues
    >    * what to do w/ capabilities module?
    >    * UNIX domain sockets using abstract namespace
    
    Since we didn't get to these topics, I wanted to touch briefly on them.  
    
    With regard to the capabilities module, I think Greg merged my recent bug
    fix patch but not the capget/capset hook patch.  Does anyone have any 
    objections to the latter patch?  If that patch is integrated, then I am
    actually comfortable with the state of the capabilities module.  The big
    remaining task would be to actually move the capability bits from the
    kernel data structures into the security blobs, and I'm not so sure about
    the desirability of that task (see my patch message for a list of some of
    the places in the kernel that would still need to be changed in order to
    move the bits completely).
    
    With regard to Unix domain sockets, the issue is that Linux provides 
    an alternative to the conventional file name space for Unix domain
    sockets.  Whereas binding and connecting to sockets in the file name 
    space is mediated by the typical file permissions (and caught by our
    hooks on vfs_mknod and permission), binding and connecting to sockets
    in the abstract name space is completely unmediated.  I do not believe
    that we can achieve sufficient control of sockets in the abstract
    names space using the socket layer hooks, because we need to know
    the actual target socket, which is not looked up until we are in
    the af_unix code.  So it appears that we need some explicit hooks
    in the af_unix code to mediate access to the abstract namespace.
    
    >    * Action:  SGI should look at Stephen's early June authoritative
    >      patch, and determine to what extent it will satisfy their needs.
    >      To the extent that it falls short, SGI should identify what is
    >      needed in addition.  It is important that the cases SGI looks at
    >      not be just the simple ones; there are hard cases that need to be
    >      examined.
    
    On this issue, I volunteered to provide SGI with a copy of that patch,
    and I may go ahead and update it to be consistent with the current
    version of the LSM patch to make life easier for SGI.
    
    --
    Stephen D. Smalley, NAI Labs
    ssmalleyat_private
    
    
    
    
    
    _______________________________________________
    linux-security-module mailing list
    linux-security-moduleat_private
    http://mail.wirex.com/mailman/listinfo/linux-security-module
    



    This archive was generated by hypermail 2b30 : Thu Aug 16 2001 - 07:23:43 PDT