Re: [AppArmor 00/44] AppArmor security module overview

2007-07-04 Thread Pavel Machek
Hi! > > > so... where do we stand with this? Fundamental, irreconcilable > > > differences over the use of pathname-based security? > > > > > There certainly seems to be some differences of opinion over the use > > of pathname-based-security. > > I was refreshed to have not been cc'ed on a

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-04 Thread Pavel Machek
Hi! so... where do we stand with this? Fundamental, irreconcilable differences over the use of pathname-based security? There certainly seems to be some differences of opinion over the use of pathname-based-security. I was refreshed to have not been cc'ed on a lkml thread for

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-03 Thread Andreas Gruenbacher
On Monday 02 July 2007 22:15, Christoph Hellwig wrote: > AA on the other hand just fucks up VFS layering [...] Oh come on, this claim clearly isn't justified. How on earth is passing vfsmounts down the lsm hooks supposed to break vfs layering? We are not proposing to pass additional information

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-03 Thread Dave Jones
On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: > I suspect that we're at the stage of having to decide between > > a) set aside the technical issues and grudgingly merge this stuff as a >service to Suse and to their users (both of which entities are very >important

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-03 Thread Dave Jones
On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: I suspect that we're at the stage of having to decide between a) set aside the technical issues and grudgingly merge this stuff as a service to Suse and to their users (both of which entities are very important to us)

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-03 Thread Andreas Gruenbacher
On Monday 02 July 2007 22:15, Christoph Hellwig wrote: AA on the other hand just fucks up VFS layering [...] Oh come on, this claim clearly isn't justified. How on earth is passing vfsmounts down the lsm hooks supposed to break vfs layering? We are not proposing to pass additional information

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-02 Thread Casey Schaufler
--- Christoph Hellwig <[EMAIL PROTECTED]> wrote: > On Mon, Jul 02, 2007 at 12:31:49PM -0700, Casey Schaufler wrote: > > It's true that the code review for AppArmor has proven difficult. > > That's going to be true of any change to the vfs layer, for any > > reason. Have someone who was there

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-02 Thread Christoph Hellwig
On Mon, Jul 02, 2007 at 12:31:49PM -0700, Casey Schaufler wrote: > It's true that the code review for AppArmor has proven difficult. > That's going to be true of any change to the vfs layer, for any > reason. Have someone who was there tell you about the original XFS > proposals some time. Again,

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-02 Thread Casey Schaufler
--- "Eric W. Biederman" <[EMAIL PROTECTED]> wrote: > A couple of random thoughts to mix up this discussion. > > From what I have been able to observer the LSM is roughly firewalls > rules for in box operations. All it can do is increase the chances > you will get -EPERM. More likely

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-02 Thread Eric W. Biederman
Adrian Bunk <[EMAIL PROTECTED]> writes: > On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: >> On Tue, 26 Jun 2007 19:24:03 -0700 John Johansen <[EMAIL PROTECTED]> wrote: >> >> > > >> > > so... where do we stand with this? Fundamental, irreconcilable >> > > differences over the

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-02 Thread Eric W. Biederman
Adrian Bunk [EMAIL PROTECTED] writes: On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: On Tue, 26 Jun 2007 19:24:03 -0700 John Johansen [EMAIL PROTECTED] wrote: so... where do we stand with this? Fundamental, irreconcilable differences over the use of pathname-based

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-02 Thread Casey Schaufler
--- Eric W. Biederman [EMAIL PROTECTED] wrote: A couple of random thoughts to mix up this discussion. From what I have been able to observer the LSM is roughly firewalls rules for in box operations. All it can do is increase the chances you will get -EPERM. More likely -EACCES, but

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-02 Thread Christoph Hellwig
On Mon, Jul 02, 2007 at 12:31:49PM -0700, Casey Schaufler wrote: It's true that the code review for AppArmor has proven difficult. That's going to be true of any change to the vfs layer, for any reason. Have someone who was there tell you about the original XFS proposals some time. Again, it's

Re: [AppArmor 00/44] AppArmor security module overview

2007-07-02 Thread Casey Schaufler
--- Christoph Hellwig [EMAIL PROTECTED] wrote: On Mon, Jul 02, 2007 at 12:31:49PM -0700, Casey Schaufler wrote: It's true that the code review for AppArmor has proven difficult. That's going to be true of any change to the vfs layer, for any reason. Have someone who was there tell you

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-28 Thread Bill O'Donnell
On Wed, Jun 27, 2007 at 05:27:17PM -0700, Casey Schaufler wrote: | | --- David Miller <[EMAIL PROTECTED]> wrote: | | > From: Crispin Cowan <[EMAIL PROTECTED]> | > Date: Wed, 27 Jun 2007 15:46:57 -0700 | > | > > But we do not want to prevent other people from using SELinux if it | > > suits

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-28 Thread Adrian Bunk
On Thu, Jun 28, 2007 at 01:27:12PM +0200, Tilman Schmidt wrote: > David Miller schrieb: > > What you get by the code going into the upstream kernel tree is that > > it a) adds some pseudo legitimacy to AppArmour (which I don't > > personally think is warranted) and b) gets the work of keeping > >

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-28 Thread Tilman Schmidt
David Miller schrieb: > What you get by the code going into the upstream kernel tree is that > it a) adds some pseudo legitimacy to AppArmour (which I don't > personally think is warranted) and b) gets the work of keeping > apparmour working with upstream largely off of your back and in the >

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-28 Thread Alan Cox
> > Anyone can apply the apparmour patch to their tree, they get the > > choice that way. Nobody is currently prevented from using apparmour > > if they want to, any such suggestion is pure rubbish. > > The exact same argument was made prior to SELinux going upstream. Its made for every thing

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-28 Thread Alan Cox
Anyone can apply the apparmour patch to their tree, they get the choice that way. Nobody is currently prevented from using apparmour if they want to, any such suggestion is pure rubbish. The exact same argument was made prior to SELinux going upstream. Its made for every thing before it

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-28 Thread Tilman Schmidt
David Miller schrieb: What you get by the code going into the upstream kernel tree is that it a) adds some pseudo legitimacy to AppArmour (which I don't personally think is warranted) and b) gets the work of keeping apparmour working with upstream largely off of your back and in the hands of

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-28 Thread Adrian Bunk
On Thu, Jun 28, 2007 at 01:27:12PM +0200, Tilman Schmidt wrote: David Miller schrieb: What you get by the code going into the upstream kernel tree is that it a) adds some pseudo legitimacy to AppArmour (which I don't personally think is warranted) and b) gets the work of keeping apparmour

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-28 Thread Bill O'Donnell
On Wed, Jun 27, 2007 at 05:27:17PM -0700, Casey Schaufler wrote: | | --- David Miller [EMAIL PROTECTED] wrote: | | From: Crispin Cowan [EMAIL PROTECTED] | Date: Wed, 27 Jun 2007 15:46:57 -0700 | | But we do not want to prevent other people from using SELinux if it | suits them. Linux is

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Andreas Dilger
Any chance you can remove linux-fsdevel from the CC list? I don't think this has anything to do with filesystems. Cheers, Andreas -- Andreas Dilger Principal Software Engineer Cluster File Systems, Inc. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread David Miller
From: Casey Schaufler <[EMAIL PROTECTED]> Date: Wed, 27 Jun 2007 17:27:17 -0700 (PDT) > --- David Miller <[EMAIL PROTECTED]> wrote: > > > Neither of those are reasons why something should go into the tree. > > They reflect the corporate reality of the open source community. > If you're going to

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Casey Schaufler
--- David Miller <[EMAIL PROTECTED]> wrote: > From: Crispin Cowan <[EMAIL PROTECTED]> > Date: Wed, 27 Jun 2007 15:46:57 -0700 > > > But we do not want to prevent other people from using SELinux if it > > suits them. Linux is about choice, and that is especially vital in > > security. As Linus

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread David Miller
From: Crispin Cowan <[EMAIL PROTECTED]> Date: Wed, 27 Jun 2007 15:46:57 -0700 > But we do not want to prevent other people from using SELinux if it > suits them. Linux is about choice, and that is especially vital in > security. As Linus himself observed when LSM was started, there are a > lot of

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Crispin Cowan
Sean wrote: > On Wed, 27 Jun 2007 14:06:04 -0700 > Crispin Cowan <[EMAIL PROTECTED]> wrote: > >> I am hoping for a reconciliation where the people who don't like >> AppArmor live with it by not using it. AppArmor is not intended to >> replace SELinux, it is intended to address a different set

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Sean
On Wed, 27 Jun 2007 14:06:04 -0700 Crispin Cowan <[EMAIL PROTECTED]> wrote: > I am hoping for a reconciliation where the people who don't like > AppArmor live with it by not using it. AppArmor is not intended to > replace SELinux, it is intended to address a different set of goals. You keep

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Crispin Cowan
Adrian Bunk wrote: > On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: > >> Do you agree with the "irreconcilable" part? I think I do. I am hoping for a reconciliation where the people who don't like AppArmor live with it by not using it. AppArmor is not intended to replace

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Adrian Bunk
On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: > On Tue, 26 Jun 2007 19:24:03 -0700 John Johansen <[EMAIL PROTECTED]> wrote: > > > > > > > so... where do we stand with this? Fundamental, irreconcilable > > > differences over the use of pathname-based security? > > > > > There

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Andreas Gruenbacher
On Wednesday 27 June 2007 12:58, Kyle Moffett wrote: > I seem to recall you could actually end up racing and building a path > to the file in those directories as "a/d/0/3" or some other path at > which it never even remotely existed. I'd love to be wrong, Cheer up, you recall wrong. > but I

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Kyle Moffett
On Jun 26, 2007, at 22:24:03, John Johansen wrote: other issues that have been raised are: - the use of d_path to generate the pathname used for mediation when a file is opened. - Generating the pathname using a reverse walk is considered ugly A little more than "ugly". In this basic

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread John Johansen
On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: > On Tue, 26 Jun 2007 19:24:03 -0700 John Johansen <[EMAIL PROTECTED]> wrote: > > > > > > > so... where do we stand with this? Fundamental, irreconcilable > > > differences over the use of pathname-based security? > > > > > There

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread John Johansen
On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: On Tue, 26 Jun 2007 19:24:03 -0700 John Johansen [EMAIL PROTECTED] wrote: so... where do we stand with this? Fundamental, irreconcilable differences over the use of pathname-based security? There certainly seems to

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Kyle Moffett
On Jun 26, 2007, at 22:24:03, John Johansen wrote: other issues that have been raised are: - the use of d_path to generate the pathname used for mediation when a file is opened. - Generating the pathname using a reverse walk is considered ugly A little more than ugly. In this basic

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Andreas Gruenbacher
On Wednesday 27 June 2007 12:58, Kyle Moffett wrote: I seem to recall you could actually end up racing and building a path to the file in those directories as a/d/0/3 or some other path at which it never even remotely existed. I'd love to be wrong, Cheer up, you recall wrong. but I can't

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Adrian Bunk
On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: On Tue, 26 Jun 2007 19:24:03 -0700 John Johansen [EMAIL PROTECTED] wrote: so... where do we stand with this? Fundamental, irreconcilable differences over the use of pathname-based security? There certainly seems to

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Crispin Cowan
Adrian Bunk wrote: On Tue, Jun 26, 2007 at 07:47:00PM -0700, Andrew Morton wrote: Do you agree with the irreconcilable part? I think I do. I am hoping for a reconciliation where the people who don't like AppArmor live with it by not using it. AppArmor is not intended to replace SELinux, it

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Sean
On Wed, 27 Jun 2007 14:06:04 -0700 Crispin Cowan [EMAIL PROTECTED] wrote: I am hoping for a reconciliation where the people who don't like AppArmor live with it by not using it. AppArmor is not intended to replace SELinux, it is intended to address a different set of goals. You keep saying

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Crispin Cowan
Sean wrote: On Wed, 27 Jun 2007 14:06:04 -0700 Crispin Cowan [EMAIL PROTECTED] wrote: I am hoping for a reconciliation where the people who don't like AppArmor live with it by not using it. AppArmor is not intended to replace SELinux, it is intended to address a different set of goals.

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread David Miller
From: Crispin Cowan [EMAIL PROTECTED] Date: Wed, 27 Jun 2007 15:46:57 -0700 But we do not want to prevent other people from using SELinux if it suits them. Linux is about choice, and that is especially vital in security. As Linus himself observed when LSM was started, there are a lot of

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Casey Schaufler
--- David Miller [EMAIL PROTECTED] wrote: From: Crispin Cowan [EMAIL PROTECTED] Date: Wed, 27 Jun 2007 15:46:57 -0700 But we do not want to prevent other people from using SELinux if it suits them. Linux is about choice, and that is especially vital in security. As Linus himself

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread David Miller
From: Casey Schaufler [EMAIL PROTECTED] Date: Wed, 27 Jun 2007 17:27:17 -0700 (PDT) --- David Miller [EMAIL PROTECTED] wrote: Neither of those are reasons why something should go into the tree. They reflect the corporate reality of the open source community. If you're going to go down

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-27 Thread Andreas Dilger
Any chance you can remove linux-fsdevel from the CC list? I don't think this has anything to do with filesystems. Cheers, Andreas -- Andreas Dilger Principal Software Engineer Cluster File Systems, Inc. - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-26 Thread Andrew Morton
On Tue, 26 Jun 2007 19:24:03 -0700 John Johansen <[EMAIL PROTECTED]> wrote: > > > > so... where do we stand with this? Fundamental, irreconcilable > > differences over the use of pathname-based security? > > > There certainly seems to be some differences of opinion over the use > of

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-26 Thread John Johansen
On Tue, Jun 26, 2007 at 04:52:02PM -0700, Andrew Morton wrote: > On Tue, 26 Jun 2007 16:07:56 -0700 > [EMAIL PROTECTED] wrote: > > > This post contains patches to include the AppArmor application security > > framework, with request for inclusion into -mm for wider testing. > > Patches 24 and 31

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-26 Thread Andrew Morton
On Tue, 26 Jun 2007 16:07:56 -0700 [EMAIL PROTECTED] wrote: > This post contains patches to include the AppArmor application security > framework, with request for inclusion into -mm for wider testing. Patches 24 and 31 didn't come through. Rolled-up diffstat (excluding 24&31): fs/attr.c

[AppArmor 00/44] AppArmor security module overview

2007-06-26 Thread jjohansen
This post contains patches to include the AppArmor application security framework, with request for inclusion into -mm for wider testing. These patches are currently against lkml but we will gladly rebase them against -mm so that they will apply cleanly. Any comments and feedback to improve

[AppArmor 00/44] AppArmor security module overview

2007-06-26 Thread jjohansen
This post contains patches to include the AppArmor application security framework, with request for inclusion into -mm for wider testing. These patches are currently against lkml but we will gladly rebase them against -mm so that they will apply cleanly. Any comments and feedback to improve

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-26 Thread Andrew Morton
On Tue, 26 Jun 2007 16:07:56 -0700 [EMAIL PROTECTED] wrote: This post contains patches to include the AppArmor application security framework, with request for inclusion into -mm for wider testing. Patches 24 and 31 didn't come through. Rolled-up diffstat (excluding 2431): fs/attr.c

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-26 Thread John Johansen
On Tue, Jun 26, 2007 at 04:52:02PM -0700, Andrew Morton wrote: On Tue, 26 Jun 2007 16:07:56 -0700 [EMAIL PROTECTED] wrote: This post contains patches to include the AppArmor application security framework, with request for inclusion into -mm for wider testing. Patches 24 and 31 didn't

Re: [AppArmor 00/44] AppArmor security module overview

2007-06-26 Thread Andrew Morton
On Tue, 26 Jun 2007 19:24:03 -0700 John Johansen [EMAIL PROTECTED] wrote: so... where do we stand with this? Fundamental, irreconcilable differences over the use of pathname-based security? There certainly seems to be some differences of opinion over the use of