Re: Security hooks for rpm

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Sep 11, 2012 at 6:05 PM, Jeffrey Johnson <n3npq@xxxxxx> wrote:
> While your POV is perfectly sane and general, the reality is
> that there are no other RPM modules, nor has there been any
> attempt to use the existing SELinux module framework except
> for MSSF.

True, but I guess everything has its beginning. So, if we are the second user
of this interface, we can make it work well for any other potential users.
Mimi was considering using some hooks in rpm for bootstrapping the
IMA/EVM signatures, so she might be a third user. And after that others
might also follow.

>> If not, I don't see why it cannot be made to support that functionality.
>> It isn't truly unique to security; other kinds of functional plugins may
>> need/want to be able to abort the installation.
>>
>
> The existing module framework is too narrowly focussed on SE Linux
> (and MSSF) needs to be generally useful for "package management".
>
Yes, I think we need a generic interface for rpm plugins that can be used
for security or package management reasons. However, I don't think we
can attempt to define all needed hooks for all generic purposes now, but
regarding security together we might have quite close hit.

> Passing a dirname/basename pair instead of a full file path is a flawed API imho. ymmv.
I can change it to pass fsm->path. Having these two separated might be useful
for some reasons, but it indeed looks better with just one argument that
contains both.

> While using a "void *" pointer makes sense for opaque layering design, a
> shared data structure alleviates the need to reinvent the wheel in modules.
>
> E.g. all versions of RPM already make significant use of crypto libraries.
> Linking modules opaquely to to the same/different crypto libraries forces
> needless bloat and duplication for the sole purpose of a opaque layering
> design.

Sure, but I don't think I was proposing that. I was just trying to
make sure the internal,
specific only to concrete LSM data, is out of rpm itself. Smack rpm
plug-in isn't
going to make much use of selinux label handles and vice versa.

> The design issues of a generally useful module framework for RPM need more
> than a wrapper (with security labeling side-effects) to mkdir(2).

What kind of functionality do you have in mind for this wrapper apart
from labeling?

> More thought and a higher level abstraction than wrapped system calls needs to be
> considered for a useful module framework for RPM.

Yes, and this is I think where the problem might be. If we say that
our goal is to design
a generic module framework for RPM (not only for security purpose),
then I am afraid
this can take ages and it is quite a big step. I personally don't have
any good understanding
of needs for rpm modules outside of security ones.

Let me try to include rpm maintainer into this discussion and see what
he thinks about this.

Best Regards,
Elena.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux