Crispin Cowan <[EMAIL PROTECTED]> wrote:

> The other issue with the object capability model is analyzability.
> Stephen Smalley complained about this in some public setting a while ago
> when someone basically asked for an object capability enhancement to
> SELinux. Stephen is correct, in that with a pure ambient capability
> model, you can analyze the text of the complete system policy, and
> readily determine the maximum permissions that any given entity will
> have under that policy. With an object capability model, the scope of
> access of a given program is determined by what gets passed into it, and
> so you would have to resort to tools to compute the transitive closure
> of all capabilities that *could* be delegated to it.

That is not true in the general case.  If process A and process B can
communicate, process A can delegate any authority it has to process B,
if both processes want to do that.  Putting object-capability support
into the kernel is just a way of making that more efficient and
convenient.  SELinux/Apparmor are no more analyzable than
object-capability systems.

There is only a difference in analyzability if:
 - you decide you're not including malicious programs (i.e. not an
   adversarial model), or
 - you define analyzability so that you're measuring something that
   is not important (permissions) rather than something that is
   (authority).


>           o Show a use case of a real program (not a straw man) such
>             that with the current features, your choice is to either
>             provide a dangerously permissive security policy, or the
>             policy breaks the program.

An e-mail client.  With a static security system, if you want to be
able to use the e-mail program to send attachments, you must grant the
e-mail program access to all of your files in advance, because you
could want to send any file as an attachment.

Regards,
Mark
-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to