On 4/25/2013 8:01 AM, Paul Moore wrote: > On Wednesday, April 24, 2013 05:43:08 PM Casey Schaufler wrote: >> On 4/24/2013 4:00 PM, John Johansen wrote: >>> On 04/24/2013 02:15 PM, Paul Moore wrote: >>>> On Wednesday, April 24, 2013 01:22:20 PM Casey Schaufler wrote: > ... > >>>>> An interesting aside that may be relevant is that the error >>>>> condition behavior makes it advisable to have the LSM you care >>>>> about most go last. If the networking components were strictly >>>>> FCFS you might have to chose an ordering you might not want for >>>>> other reasons. >>>> Well, maybe not ... I think. If we take a FCFS approach to the network >>>> controls then only one LSM is really ever going to throw an error on the >>>> network hooks, yes? >> You set up the order you want to get the networking handled >> correctly and you could get filesystem hooks in the wrong order. >> Not that that really ought to be a problem, but there are wonky >> admin tools out there. > I don't quite follow; can you be a bit more explicit about getting the > filesystem hooks in the wrong order? Let's assume that there's a case for the stat() system call that would get EPERM from SELinux and EACCES from Smack. A carefully crafted admin tool might take different actions based on the return code. If Smack ahead of SELinux in the list the tool will respond one way, whereas if SELinux is ahead it will behave the other way. If this tool came with Fedora it will likely expect the SELinux error code. Thus, it will be somewhat important that Smack precede SELinux in the LSM ordering. That will grant Smack the NetLabel component. If you want SELinux to use NetLabel you'll have to explicitly configure that. It's probably not going to be an issue that often. Making the ordering implications clear to those who may be affected by them is probably the best choice and biggest challenge. It would be nice to keep them to a minimum. I fear some future LSM author getting clever with error codes and demanding the ultimate position in all cases. >>>> I'm still in favor of assigning the network hooks to the LSM at boot >>>> based on the "security=" configuration. >>> yeah dealing with selection at boot time is going to be needed >>> at some point, whether its now or later ... >> I'll have a go at it then. What that would mean is that: >> >> security=smack,selinux >> >> gives Smack NetLabel and SELinux xfrm and secmark while >> >> security=selinux,smack >> >> gives SELinux all three. > That seems reasonable, it also keeps the door open for adding a specific > network hook ordering option, e.g. "security_net=", at a later date if > necessary. > >> I would still like it to be possible to explicitly configure the allocation >> at build time. > I suppose I have no object to that, I would just place my vote to have the > dynamic FCFS (or LCFS if that makes more sense) assignment be the Kconfig > default. > -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.