[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070622074044.GA14593@suse.de>
Date: Fri, 22 Jun 2007 00:40:44 -0700
From: John Johansen <jjohansen@...e.de>
To: James Morris <jmorris@...ei.org>
Cc: Chris Mason <chris.mason@...cle.com>,
Stephen Smalley <sds@...ho.nsa.gov>,
Lars Marowsky-Bree <lmb@...e.de>, Pavel Machek <pavel@....cz>,
Crispin Cowan <crispin@...ell.com>, Greg KH <greg@...ah.com>,
Andreas Gruenbacher <agruen@...e.de>, jjohansen@...e.de,
linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org,
linux-fsdevel@...r.kernel.org
Subject: Re: [AppArmor 39/45] AppArmor: Profile loading and manipulation, pathname matching
On Thu, Jun 21, 2007 at 09:06:40PM -0400, James Morris wrote:
> On Thu, 21 Jun 2007, Chris Mason wrote:
>
> > > The incomplete mediation flows from the design, since the pathname-based
> > > mediation doesn't generalize to cover all objects unlike label- or
> > > attribute-based mediation. And the "use the natural abstraction for
> > > each object type" approach likewise doesn't yield any general model or
> > > anything that you can analyze systematically for data flow.
> >
> > This feels quite a lot like a repeat of the discussion at the kernel
> > summit. There are valid uses for path based security, and if they don't
> > fit your needs, please don't use them. But, path based semantics alone
> > are not a valid reason to shut out AA.
>
> The validity or otherwise of pathname access control is not being
> discussed here.
>
> The point is that the pathname model does not generalize, and that
> AppArmor's inability to provide adequate coverage of the system is a
> design issue arising from this.
>
As we have previously stated we are not using pathnames for IPC. The
use of pathnames for file access mediation is not a design issue that in
anyway prevents us from extending AppArmor to mediate IPC or networking.
The current focus is making the revision necessary for AppArmor's file
mediation at which point we can focus on finishing of the network
and IPC support.
> Recall that the question asked by Lars was whether there were any
> outstanding technical issues relating to AppArmor.
>
> AppArmor does not and can not provide the level of confinement claimed by
> the documentation, and its policy does not reflect its actual confinement
> properties. That's kind of a technical issue, right?
>
AppArmor currently controls file and capabilities, which was explicitly
stated in the documentation submitted with the patches. And it has
been posted before that network and IPC mediation are a wip.
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists