[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ednsma$hbt$1@taverner.cs.berkeley.edu>
Date: Thu, 7 Sep 2006 01:29:46 +0000 (UTC)
From: daw@...berkeley.edu (David Wagner)
To: linux-kernel@...r.kernel.org
Subject: Re: patch to make Linux capabilities into something useful (v 0.3.1)
Casey Schaufler wrote:
>In our TCSEC B1 (Old person speak for LSPP)
>evaluation we had to put way too much effort
>into explaining why certain operations that
>had nothing to do with the system security
>policy (e.g. compute resource limitations)
>required privilege. These operations had
>no security implications at all, but since
>they required privilege they were assumed to
>have dire consequences should they be abused.
Well, this is sounding like a pretty weak argument.
It sounds like what you are saying is the evaluators were not thinking
straight when they gave you a hard time about your efforts to do a
better job of implementing the principle of least privilege. If I
understand the gist of what you are saying correctly, you reduced the
privilege on some processes, and the result was that they complained
more loudly than if you had done nothing. If so, that's pretty lame.
That doesn't sound to me like the evaluators were thinking very clearly.
And if the evaluators don't really understand how to think clearly about
security, why should we pay any attention to them, anyway? I see no
reason to design the Linux kernel around the whims of those who don't
understand the technical issues. Who cares about what the evaluators
think, if they don't have their head screwed on straight? Personally,
I care more about technical merit than about pleasing folks who don't
understand security.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists