Stephen Smalley wrote:
On Fri, 2007-08-31 at 15:32 +0100, David Howells wrote:
Stephen Smalley <[EMAIL PROTECTED]> wrote:

That's how mandatory access control is supposed to work; otherwise, a
flaw in A can leak the descriptor to B at will in violation of security
policy.
Yeah, but by making it impossible to have the flaw, you've also made it
impossible for A to validly pass to B a file descriptor B wouldn't otherwise
be able to access directly, but should be able to access on behalf of A.

Let me say it again:  that's how mandatory access control is supposed to
work.  A program (or user) isn't supposed to be able to delegate access
under a mandatory policy.

How about looking at it this way, I am work for company A and therefore I can see all of their engineering documents. You work for company B and are not supposed to see any of our engineering documents. Company A's policy states that I can't disclose company private information to any one who is not cleared for it. So by giving you access to this information (either by telling you (e.g., passing a file descriptor) or handing you a document) I am in violation of company policy. MAC is there to enforce the company policy so I won't give you the information you are not supposed to have.


To put it another way, how does A now legitimately pass on to B the grant of
rights A had on that specific file descriptor?

That would be discretionary, and therefore vulnerable to flawed and
malicious code.  That's the point.

Or B is a privileged (trusted) process that can raise/change the correct privilege/capability/context to access the information/descriptor.


--
Thanks,
Mike
----
Mikel L. Matthews
Chief Technology Officer
Innovative Security Systems, Inc. (dba Argus Systems Group)
1809 Woodfield Dr.
Savoy IL 61874
+1-217-355-6308
www.argus-systems.com

"Any intelligent fool can make things bigger, more complex, and more
violent.  It takes a touch of genius - and a lot of courage - to move
in the opposite direction."
                                Albert Einstein
-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to