[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1182459594.20464.16.camel@moss-spartans.epoch.ncsc.mil>
Date: Thu, 21 Jun 2007 16:59:54 -0400
From: Stephen Smalley <sds@...ho.nsa.gov>
To: Lars Marowsky-Bree <lmb@...e.de>
Cc: James Morris <jmorris@...ei.org>, Pavel Machek <pavel@....cz>,
Crispin Cowan <crispin@...ell.com>, Greg KH <greg@...ah.com>,
Andreas Gruenbacher <agruen@...e.de>, jjohansen@...e.de,
linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org,
linux-fsdevel@...r.kernel.org
Subject: Re: [AppArmor 39/45] AppArmor: Profile loading and manipulation,
pathname matching
On Thu, 2007-06-21 at 21:54 +0200, Lars Marowsky-Bree wrote:
> On 2007-06-21T15:42:28, James Morris <jmorris@...ei.org> wrote:
>
> > > A veto is not a technical argument. All technical arguments (except for
> > > "path name is ugly, yuk yuk!") have been addressed, have they not?
> > AppArmor doesn't actually provide confinement, because it only operates on
> > filesystem objects.
> >
> > What you define in AppArmor policy does _not_ reflect the actual
> > confinement properties of the policy. Applications can simply use other
> > mechanisms to access objects, and the policy is effectively meaningless.
>
> Only if they have access to another process which provides them with
> that data.
Or can access the data under a different path to which their profile
does give them access, whether in its final destination or in some
temporary file processed along the way.
> And now, yes, I know AA doesn't mediate IPC or networking (yet), but
> that's a missing feature, not broken by design.
The incomplete mediation flows from the design, since the pathname-based
mediation doesn't generalize to cover all objects unlike label- or
attribute-based mediation. And the "use the natural abstraction for
each object type" approach likewise doesn't yield any general model or
anything that you can analyze systematically for data flow.
The emphasis on never modifying applications for security in AA likewise
has an adverse impact here, as you will ultimately have to deal with
application mediation of access to their own objects and operations not
directly visible to the kernel (as we have already done in SELinux for
D-BUS and others and are doing for X). Otherwise, your "protection" of
desktop applications is easily subverted.
> > You might define this as a non-technical issue, but the fact that AppArmor
> > simply does not and can not work is a fairly significant consideration, I
> > would imagine.
>
> If I restrict my Mozilla to not access my on-disk mail folder, it can't
> get there. (Barring bugs in programs which Mozilla is allowed to run
> unconfined, sure.)
Um, no. It might not be able to directly open files via that path, but
showing that it can never read or write your mail is a rather different
matter.
--
Stephen Smalley
National Security Agency
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists