[redhat-lspp] LSPP Development Telecon 11/16/2005 Minutes

Daniel J Walsh dwalsh at redhat.com
Fri Nov 18 16:45:41 UTC 2005


Stephen Smalley wrote:
> On Fri, 2005-11-18 at 00:34 -0600, Debora Velarde wrote:
>   
>> --------------------
>> RBAC - audit by role
>> --------------------
>> - auditing by roles in order to meet RBAC
>> - pretty good size task, going to take some time to do
>> - filtering by strings vs bitmasks?
>> - controls inside selinux?
>> - so far no real solution
>> - task is open for someone to start looking into
>> - whoever wants to jump into that however they want
>> - George thinks Stephen had objections to adding controls
>> - If you want to suppress records early on would need controls in there
>>     
>
> Sorry I wasn't able to attend - had a conflicting meeting, and won't be
> around next week.  To clarify my position here:  I have no problem with
> the kernel audit system and auditctl supporting syscall audit filters
> (or watches) based on roles, other components of security contexts, or
> entire security contexts.  The only delicate issue is splitting up
> responsibility between the kernel audit system and SELinux for the
> interpretation and testing of such audit filters so that we don't
> hardcode knowledge of the security context format in the audit system.
> My earlier objection was to having auditctl / the kernel audit system
> directly configure the SELinux auditallow/dontaudit/auditdeny rules in
> the kernel, which I still think would be a mistake, versus having some
> audit frontend tool that regenerates SELinux audit-related rules and
> builds a policy module from them for a policy reload.
>
>   
>> Understanding what RBAC means by a role and what we mean by a role
>> - selinux has roles
>> - are we meeting RBAC requirement to the right thing?
>> - selinux roles are a bit lower level
>>     
>
> Perhaps, but they can certainly represent RBAC roles.  Note also that
> with the seusers mapping, we are effectively now using SELinux user
> identities as "role sets" and mapping Linux users to these "role sets",
> so one might treat a SELinux user identity as a RBAC role if you needed
> a larger grouping.
>
>   
>> sys_admin restarting system service
>> - need to make sure not actually switching roles unless you do a new role
>>     
>
> Older SELinux required explicit operations for all such role changes,
> including use of run_init for restarting services in the proper context,
> but that was viewed as unacceptable for users in Fedora/RHEL, so
> automatic role transitions were applied there.
>   
But this was removed before we had targeted policy so this might/should 
be something we replace in MLS policy.
dnl define(`direct_sysadm_daemon') I disabled in not defined in MLS policy.

>   
>> Big task partially because of politics
>> - How are you going to do that, by policy?
>> - could change to a hash for faster compare, already doing that for files
>> - Stephen Smalley doesn't want capability of inserting anything into 
>> selinux w/o going through policy
>> - other LSMs might want to use audit
>> - don't want to closely tangle audit with selinux
>> - RBAC is closely tied to selinux
>> - do we need an immutable role id, like login_uid
>> - we just need to know what role caused it, selinux role should be doable 
>> that way
>> - don't want a new set of hooks to do enforcement
>> - selinux role doesn't match what RBAC considers a role
>>     
>
> See my comments above.  Separate role id would be a mistake; just one
> more attribute that can potentially become inconsistent, has no
> well-defined control semantics, and is completely unknown to existing
> kernel APIs and userspace.
>
>   


-- 





More information about the redhat-lspp mailing list