lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201301110014.CDB90164.MFtFHVSQOFOJLO@I-love.SAKURA.ne.jp>
Date:	Fri, 11 Jan 2013 00:14:42 +0900
From:	Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
To:	eparis@...hat.com, linux-kernel@...r.kernel.org
Cc:	dwalsh@...hat.com, dmalcolm@...hat.com, sds@...ho.nsa.gov,
	segoon@...nwall.com, linux-security-module@...r.kernel.org
Subject: Re: Friendlier EPERM - Request for input

Eric Paris wrote:
> On systems with a strict security policy worried about such things this
> would quite reasonably need to be disabled.  But most of the reason
> people turn off LSMs is because it gets in the way and they get pissed
> getting an EPERM, checking rwx bits, having no idea WTF happened, and
> then being REALLY pissed at the LSM when they figure out that was the
> problem.  I want to put it right there, out front, here is what went
> wrong for the common case.

The reason I think is that people turn off LSMs because they are using LSMs
without understanding "what the current configuration is" and/or "how to change
configuration". People do not spend (or cannot afford spending) resources for
understanding LSM's configuration.

> We could if it was worth it make filling in the extended dial
> information an LSM hook where you can check on a per denial basis.  But
> I don't see the need.

Have you ever tried TOMOYO's interactive enforcing mode?

> The audit log is complete crap from a usability PoV.  If a web admin is

TOMOYO's audit log is very useful. TOMOYO is a security tool but is also useful
for education/training/debugging/development/profiling etc.

> trying to figure out why his web server isn't serving out web pages
> in /home he's going to look in the web server logs and see EPERM.

TOMOYO's interactive enforcing mode allows the administrator to judge whether
the web pages in /home should be served or not, before he gets EPERM.

> That's it.  Now he has to start blindly guessing which of the many
> possible reasons for EPERM is his problem.  Wouldn't it be better if the
> information was actually available?  Using the audit log in real time is
> a bloody nightmare.

TOMOYO's interactive enforcing mode utilizes TOMOYO's audit log in real time.
In other words, TOMOYO can interpose syscalls and expose the current syscall
which is about to be denied. Useful information is available in real time
and is used before getting an EPERM.

>                     As the audit maintainer I know how to use ausearch,
> but then again, as the SELinux maintainer I know how to figure out which
> of the many possibilities from EPERM are the cause.  But I want to make
> it easier for a normal admin to figure that out.

The problem I think is that people don't understand "what the current
configuration is" and/or "how to change configuration".

> 
> I know many people are worried about information leaks, so I'll right up
> front say lets add the sysctl to disable the interface for those who are
> concerned about the metadata information leak.  But for most of us I
> want that data right when it happens, where it happens, so It can be
> exposed, used, and acted upon by the admin trying to troubleshoot why
> the shit just hit the fan.

TOMOYO is exposing useful information in real time.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ