Re: [TOMOYO 1/9] Allow use of namespace_sem from LSM module.

2007-06-14 Thread Kentaro Takeda
/Plain_text_e-mail_(Thunderbird) Kentaro Takeda - To unsubscribe from this list: send the line unsubscribe linux-security-module in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

[TOMOYO 01/15] Allow use of namespace_sem from LSM module.

2007-08-24 Thread Kentaro Takeda
TOMOYO Linux uses pathnames for auditing and controlling file access. Therefore, namespace_sem is needed. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- fs/namespace.c|2 +- include/linux/mnt_namespace.h |2 ++ 2 files

[TOMOYO 03/15] Data structures and prototypes definition.

2007-08-24 Thread Kentaro Takeda
Data structures and prototype defitions for TOMOYO Linux. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/include/realpath.h | 44 +++ security/tomoyo/include/tomoyo.h | 516 + 2 files

[TOMOYO 02/15] Kconfig and Makefile for TOMOYO Linux.

2007-08-24 Thread Kentaro Takeda
Kconfig and Makefile for TOMOYO Linux. TOMOYO Linux is placed in security/tomoyo . Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/Kconfig |1 + security/Makefile|1 + security/tomoyo/Kconfig | 18

[TOMOYO 04/15] Memory and pathname management functions.

2007-08-24 Thread Kentaro Takeda
Basic functions to get canonicalized absolute pathnames for TOMOYO Linux. Even the requested pathname is symlink()ed or chroot()ed, TOMOYO Linux uses the original pathname. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo

[TOMOYO 06/15] Domain transition handler functions.

2007-08-24 Thread Kentaro Takeda
-security. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/domain.c | 1291 +++ 1 files changed, 1291 insertions(+) --- /dev/null 1970-01-01 00:00:00.0 + +++ linux-2.6/security

[TOMOYO 07/15] Auditing interface.

2007-08-24 Thread Kentaro Takeda
in the TOMOYO Linux policy. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- include/linux/audit.h |3 ++ security/tomoyo/audit.c | 68 2 files changed, 71 insertions(+) --- /dev/null 1970-01-01 00:00

[TOMOYO 14/15] Conditional permission support.

2007-08-24 Thread Kentaro Takeda
This patch allows administrators use conditional permission. TOMOYO Linux supports conditional permission based on process's UID,GID etc. and/or requested pathname's UID/GID. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo

[TOMOYO 13/15] LSM adapter for TOMOYO.

2007-08-24 Thread Kentaro Takeda
and namespace_sem can remain static. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/tomoyo.c | 745 +++ 1 files changed, 745 insertions(+) --- /dev/null 1970-01-01 00:00:00.0 +

[TOMOYO 10/15] Networking access control functions.

2007-08-24 Thread Kentaro Takeda
' and 'UDP accept'(recv), LSM expansion patch ([TOMOYO /]) is needed. Each permission can be automatically accumulated into the policy of each domain using 'learning mode'. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/net.c | 983

[TOMOYO 11/15] Namespace manipulation control functions.

2007-08-24 Thread Kentaro Takeda
mode'. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/mount.c | 1019 1 files changed, 1019 insertions(+) --- /dev/null 1970-01-01 00:00:00.0 + +++ linux-2.6/security

[TOMOYO 12/15] Signal transmission control functions.

2007-08-24 Thread Kentaro Takeda
'learning mode'. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/signal.c | 238 +++ 1 files changed, 238 insertions(+) --- /dev/null 1970-01-01 00:00:00.0 + +++ linux-2.6

[TOMOYO 05/15](repost) Domain transition handler functions.

2007-10-02 Thread Kentaro Takeda
-security. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/domain.c | 1256 +++ 1 files changed, 1256 insertions(+) --- /dev/null 1970-01-01 00:00:00.0 + +++ linux-2.6/security

[TOMOYO 06/15](repost) Auditing interface.

2007-10-02 Thread Kentaro Takeda
in the TOMOYO Linux policy. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- include/linux/audit.h |3 ++ security/tomoyo/audit.c | 68 2 files changed, 71 insertions(+) --- /dev/null 1970-01-01 00:00

[TOMOYO 07/15](repost) File access control functions.

2007-10-02 Thread Kentaro Takeda
-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/file.c | 1544 + 1 files changed, 1544 insertions(+) --- /dev/null 1970-01-01 00:00:00.0 + +++ linux-2.6/security/tomoyo/file.c2007-10-02

[TOMOYO 08/15](repost) Argv[0] access control functions.

2007-10-02 Thread Kentaro Takeda
argv[0] check functions for TOMOYO Linux. If the executed program name and argv[0] is different, TOMOYO Linux checks permission. Each permission can be automatically accumulated into the policy of each domain using 'learning mode'. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off

[TOMOYO 09/15](repost) Networking access control functions.

2007-10-02 Thread Kentaro Takeda
' and 'UDP connect', LSM expansion patch ([TOMOYO 14/15]) is needed. Each permission can be automatically accumulated into the policy of each domain using 'learning mode'. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/net.c | 975

[TOMOYO 10/15](repost) Namespace manipulation control functions.

2007-10-02 Thread Kentaro Takeda
mode'. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/mount.c | 1019 1 files changed, 1019 insertions(+) --- /dev/null 1970-01-01 00:00:00.0 + +++ linux-2.6/security

[TOMOYO 11/15](repost) Signal transmission control functions.

2007-10-02 Thread Kentaro Takeda
'learning mode'. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/signal.c | 229 +++ 1 files changed, 229 insertions(+) --- /dev/null 1970-01-01 00:00:00.0 + +++ linux-2.6

[TOMOYO 12/15](repost) LSM adapter for TOMOYO.

2007-10-02 Thread Kentaro Takeda
and namespace_sem can remain static. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/tomoyo.c | 748 +++ 1 files changed, 748 insertions(+) --- /dev/null 1970-01-01 00:00:00.0 +

[TOMOYO 14/15](repost) LSM expansion for TOMOYO Linux.

2007-10-02 Thread Kentaro Takeda
. * post_recv_datagram is added in skb_recv_datagram. You can try TOMOYO Linux without this patch, but in that case, you can't use access control functionality for restricting signal transmission and incoming network data. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa

Re: [TOMOYO 00/15](repost) TOMOYO Linux - MAC based on process invocation history.

2007-10-02 Thread Kentaro Takeda
On 2007/08/27 21:11, Kyle Moffett wrote: This is probably not acceptable; I doubt there's a chance in hell that TOMOYO will get merged as long as it has text-based-language parsing in the kernel. You also have $NEW_RANDOM_ABUSE_OF_PROCFS and $PATH_BASED_LSM_ISSUES. See the long flamewars on

Re: [TOMOYO 00/15](repost) TOMOYO Linux - MAC based on process invocation history.

2007-10-02 Thread Kentaro Takeda
] is in the three. If the [00/15] will be delivered, everything goes just fine. We are going to wait some more time and decide to repost them again. Thanks again. Kentaro Takeda - To unsubscribe from this list: send the line unsubscribe linux-security-module in the body of a message to [EMAIL PROTECTED

[TOMOYO 02/15](repost) Data structures and prototypes definition.

2007-10-02 Thread Kentaro Takeda
Data structures and prototype defitions for TOMOYO Linux. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/include/realpath.h | 44 +++ security/tomoyo/include/tomoyo.h | 517 + 2 files

[TOMOYO 03/15](repost) Memory and pathname management functions.

2007-10-02 Thread Kentaro Takeda
Basic functions to get canonicalized absolute pathnames for TOMOYO Linux. Even the requested pathname is symlink()ed or chroot()ed, TOMOYO Linux uses the original pathname. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo

[TOMOYO #6 17/21] Capability access control functions.

2008-01-08 Thread Kentaro Takeda
tomoyo-capability.patch Description: application/octect-stream

[TOMOYO #6 02/21] Add struct vfsmount to struct task_struct.

2008-01-08 Thread Kentaro Takeda
add-struct-vfsmount-to-struct-task_struct.patch Description: application/octect-stream

[TOMOYO #6 06/21] Data structures and prototype defitions.

2008-01-08 Thread Kentaro Takeda
tomoyo-headers.patch Description: application/octect-stream

[TOMOYO #6 15/21] Namespace manipulation control functions.

2008-01-08 Thread Kentaro Takeda
tomoyo-mount.patch Description: application/octect-stream

[TOMOYO #6 13/21] environment variable name check functions.

2008-01-08 Thread Kentaro Takeda
tomoyo-environ.patch Description: application/octect-stream

[TOMOYO #6 21/21] Add signal hooks at sleepable location.

2008-01-08 Thread Kentaro Takeda
add-signal-hooks-at-sleepable-locations.patch Description: application/octect-stream

[TOMOYO #6 05/21] Add packet filtering based on processs security context.

2008-01-08 Thread Kentaro Takeda
add-packet-filtering-based-on-process-security-context.patch Description: application/octect-stream

[TOMOYO #6 01/21] TOMOYO Linux documentation.

2008-01-08 Thread Kentaro Takeda
tomoyo-documentation.patch Description: application/octect-stream

[TOMOYO #6 18/21] LSM adapter functions.

2008-01-08 Thread Kentaro Takeda
tomoyo-hooks.patch Description: application/octect-stream

[TOMOYO #6 03/21] Add wrapper functions for VFS helper functions.

2008-01-08 Thread Kentaro Takeda
add-wrapper-functions-for-vfs-helper-functions.patch Description: application/octect-stream

[TOMOYO #6 07/21] Memory and pathname management functions.

2008-01-08 Thread Kentaro Takeda
tomoyo-realpath.patch Description: application/octect-stream

[TOMOYO #6 19/21] Conditional permission support.

2008-01-08 Thread Kentaro Takeda
tomoyo-condition.patch Description: application/octect-stream

[TOMOYO #6 retry 01/21] TOMOYO Linux documentation.

2008-01-08 Thread Kentaro Takeda
Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] Signed-off-by: Toshiharu Harada [EMAIL PROTECTED] --- Documentation/TOMOYO.txt | 266 +++ 1 file changed, 266 insertions(+) --- /dev/null +++ linux-2.6-mm

[TOMOYO #6 retry 03/21] Add wrapper functions for VFS helper functions.

2008-01-08 Thread Kentaro Takeda
This patch allows LSM hooks refer previously associated struct vfsmount parameter so that they can calculate pathname of given struct dentry. AppArmor's approach is to add struct vfsmount parameter to all related functions, while my approach is to store struct vfsmount parameter in struct

[TOMOYO #6 retry 05/21] Add packet filtering based on processs security context.

2008-01-08 Thread Kentaro Takeda
not be able to pick up this datagram will repeat recvmsg() forever, which is a worse side effect. So, don't give different permissions between processes who shares one socket. Otherwise, some connections/datagrams cannot be delivered to intended process. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED

[TOMOYO #6 retry 06/21] Data structures and prototype defitions.

2008-01-08 Thread Kentaro Takeda
Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/include/realpath.h | 45 ++ security/tomoyo/include/tomoyo.h | 695 + 2 files changed, 740 insertions(+) --- /dev/null +++ linux-2.6-mm

[TOMOYO #6 retry 07/21] Memory and pathname management functions.

2008-01-08 Thread Kentaro Takeda
Basic functions to get canonicalized absolute pathnames for TOMOYO Linux. Even the requested pathname is symlink()ed or chroot()ed, TOMOYO Linux uses the original pathname. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo

[TOMOYO #6 retry 11/21] File access control functions.

2008-01-08 Thread Kentaro Takeda
TOMOYO Linux checks permission in open/creat/unlink/truncate/ftruncate/mknod/mkdir/ rmdir/symlink/link/rename/uselib/sysctl . Each permission can be automatically accumulated into the policy of each domain using 'learning mode'. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off

[TOMOYO #6 retry 13/21] environment variable name check functions.

2008-01-08 Thread Kentaro Takeda
TOMOYO Linux checks environment variable's names passed to execve() because some envorinment variables affects to the behavior of program like argv[0]. Each permission can be automatically accumulated into the policy of each domain using 'learning mode'. Signed-off-by: Kentaro Takeda [EMAIL

[TOMOYO #6 retry 15/21] Namespace manipulation control functions.

2008-01-08 Thread Kentaro Takeda
TOMOYO Linux checks mount permission based on device name, mount point, filesystem type and optional flags. TOMOYO Linux also checks permission in umount and pivot_root. Each permission can be automatically accumulated into the policy using 'learning mode'. Signed-off-by: Kentaro Takeda [EMAIL

[TOMOYO #6 retry 17/21] Capability access control functions.

2008-01-08 Thread Kentaro Takeda
processes, which may cause performance and log flooding problem? Each permission can be automatically accumulated into the policy of each domain using 'learning mode'. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/capability.c

[TOMOYO #6 retry 20/21] Kconfig and Makefile

2008-01-08 Thread Kentaro Takeda
TOMOYO Linux is placed in security/tomoyo . Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/Kconfig |1 + security/Makefile|1 + security/tomoyo/Kconfig | 26 ++ security/tomoyo/Makefile

[TOMOYO #6 retry 18/21] LSM adapter functions.

2008-01-08 Thread Kentaro Takeda
To avoid namespace_sem deadlock, this patch uses current-last_vfsmount associated by wrapper functions. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED] --- security/tomoyo/tomoyo.c | 825 +++ 1 file

[TOMOYO #6 retry 21/21] Add signal hooks at sleepable location.

2008-01-08 Thread Kentaro Takeda
enforcing mode which allows administrator judge interactively. You can try TOMOYO Linux without this patch, but in that case, you can't use access control functionality for restricting signal transmission. Signed-off-by: Kentaro Takeda [EMAIL PROTECTED] Signed-off-by: Tetsuo Handa [EMAIL PROTECTED

Re: [TOMOYO #6 retry 02/21] Add struct vfsmount to struct task_struct.

2008-01-15 Thread Kentaro Takeda
? Regards. Kentaro Takeda - To unsubscribe from this list: send the line unsubscribe linux-security-module in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [TOMOYO #6 retry 02/21] Add struct vfsmount to struct task_struct.

2008-01-16 Thread Kentaro Takeda
submitting only vfsmount patches before submitting AppArmor/TOMOYO main module? We think the patches relate to not only LSM folks but also fsdevel folks. So we are going to post the brief description of the patches to fsdevel. Regards, Kentaro Takeda - To unsubscribe from this list: send the line

[RFC] Add vfsmount to vfs helper functions.

2008-01-25 Thread Kentaro Takeda
In the LSM ml, we are discussing about how to know requested pathnames within LSM modules. Currently, VFS helper functions don't pass struct vfsmount parameter. Therefore, we cannot calculate requested pathnames within LSM modules because LSM hooks can't know struct vfsmount parameter that