Re: [RFC][PATCH] Extended Attributes for Security Modules

From: richard offer (offerat_private)
Date: Wed Apr 16 2003 - 15:02:21 PDT

  • Next message: Stephen Smalley: "Re: [RFC][PATCH] Extended Attributes for Security Modules"

    * frm sdsat_private "04/16/03 09:47:22 -0400" | sed '1,$s/^/* /'
    * 
    * Thanks for your comments.  It occurred to me after I sent my initial
    * reply that you might be thinking of a scenario where you have two
    * different security modules for two different environments, and you
    * switch back and forth between them depending on what environment you are
    * working in.  
    
    I'm not sure what I was thinking, I think I was thinking about smaller
    modules, say capabilities and openwall or alternatively a reluctance to
    remove things that "belong" to other people... 
    
    If you attach a capability attribibute to a file under the capability
    module, what happens when you use SELinux ? Under your scheme, you'd remove
    the capability and write a combined attribute that included SELinux and and
    if needed the capability. 
    
    Under my scheme, the capability attribute would be left alone, SELinux
    would add its own, and then as its the primary module would decide whether
    to use the existing capability attribute or its own "combined" attribute.
    The important thing is that if you ever decide to reboot a pure capability
    system that you don't have to refigure all your attributes (although you
    could/should).
    
    Extended attributes are still relatively rare that people forget to record
    them when replacing a file (I do that all the time under Trusted Irix),
    under your scheme they would have to record every attribute on the system
    before loading a module if they every wanted to return to its prior state.
    If you forgot to do it just once the consequences could be nasty.
    
    With separate attributes, its easy to write a tool to "de-dte" a system by
    removing all the DTE attributes and know that nothing else will change. But
    that would be a direct user action, not an unforseen side effect.
    
    I can see your reasons for the single attribute (known quantity for
    production systems), but think its better at this stage to experiment with
    multiple attributes and see how people use them before forcing everyone to
    a single standard. It allows small steps rather than force everyone to make
    a single large one.
    
    * Stephen Smalley <sdsat_private>
    * National Security Agency
    
    richard.
    
    -- 
    -----------------------------------------------------------------------
    Richard Offer                     Technical Lead, Trust Technology, SGI
    "Specialization is for insects"
    _______________________________________________________________________
    
    _______________________________________________
    linux-security-module mailing list
    linux-security-moduleat_private
    http://mail.wirex.com/mailman/listinfo/linux-security-module
    



    This archive was generated by hypermail 2b30 : Wed Apr 16 2003 - 15:07:13 PDT