--- Greg KH <greg@xxxxxxxxx> wrote: > On Fri, Jun 15, 2007 at 01:43:31PM -0700, Casey Schaufler wrote: > > > > Yup, I see that once you accept the notion that it is OK for a > > file to be misslabeled for a bit and that having a fixxerupperd > > is sufficient it all falls out. > > > > My point is that there is a segment of the security community > > that had not found this acceptable, even under the conditions > > outlined. If it meets your needs, I say run with it. > > If that segment feels that way, then I imagine AA would not meet their > requirements today due to file handles and other ways of passing around > open files, right? That segment is itself divided (think the "Judean Peoples Front" and the "Peoples Front of Judea") on many issues, but as it has always put correctness over ease of use I would expect AppArmor to have a tough roe to hoe. There are other segments for which AppArmor may well be appealing, and those segments have always been much larger than Judea. > So, would SELinux today (without this AA-like daemon) fit the > requirements of this segment? The JPF is head over heels in love with SELinux, restorecond and all. The PFJ has some issues, but will most likely go along with the JPF in part because the JPF is bringing the beer and besides, what are their alternatives today? The PJF ("that's him, over there") is still stunned by some of what SELinux accepts as normal (restorecond, 400,000 line "policy" definitions with embedded wildcards) and spends a lot of time chanting the TCB Principle in hopes that it will help, but no lightning strikes from above to date. But you knew that. I'm an advocate of making a variety of alternates available which is why I had originally proposed the authoritative hooks version of the LSM and why I don't believe in rolling every possible security facility into SELinux. I also believe in warning people of pitfalls before they've impaled themselves on the spikes, but some people gotta have the experience. Just trying to help. Casey Schaufler casey@xxxxxxxxxxxxxxxx - To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html