Gary Winiger wrote: >> OK then ;-) I'll be posting a summary of the issues discussed >> and responses shortly so we're all on the same page. > > During this case discussion a few points were raised. In order to work > towards convergence of the case the project team would like to respond to > those > issues in summary. An updated spec will follow the convergence of the case. > > Gary.. > ====== > > * PSARC/2007/315 Extensible Attribute Interfaces was referenced as a > dependency. The ZFS project team pointed out this was not a relevant > reference and that PSARC/2002/240 ZFS (Zettabyte Filesystem) was the > only case dependency required. > > References to PSARC/2007/315 have been removed. > > * What is the inheritance characteristic of the slabel property? > > The slabel property is inherited just the same as the other > data set properties. Modifying the slabel's value requires > the specified privilege. > > * How does zfs send deal with the slabel property? > > send (and receive) preserve the slabel property. Making the > received data set available (mount) is restricted as specified > in the case materials mount policy. > > * How is the slabel property related to delegation (zfs allow)? > > Delegation deals with owner rights (Discretionary Policy as in > Discretionary Access Control, DAC), slabel is a Mandatory Policy > attribute. It deals with label based Mandatory Access Control, > MAC, thus unlike other zfs properties, additional policy applies > to the slabel property. In addition to having DAC rights to > modify the slabel property, the specified policy (privileges, > or setting to the label of the zone in which it is mounted > Read/Write) is required. > > * Why have all three none/admin_low/admin_high; what is the relationship > between them? > > The intent of this case is to prevent inadvertent access to labeled > data. The default slabel value (including when not present), none, > implies the data has not been labeled, thus default access is > allowed. admin_low and admin_high are "administrative" labels > associated with system, rather than user, data. They are only > set explicitly by Trusted Extensions administrators to indicate > how they wish system data to be protected. As opposed to other > labels in a Trusted Extensions configuration, they are not > automatically set when mounted. Trusted Extensions administrators > have to explicitly specify how they want system data protected. > When mounted in the global zone, admin_low data sets must not have > the existing zoned property set and must be mounted read only. > labeled-(non-global)-zone admin_low data sets must be mounted read > only. admin_high labeled data sets, must not have the zoned property > set and may only be mounted in the global zone. This allows the > Trusted Extensions administrator to ensure that such labeled data > sets will not be unintentionally mounted in ways that could cause > inadvertent data access or modification. > > * Why must zfs set slabel= and zfs get slabel only deal with internally > formatted labels? > > There is no reason. The case will be updated to allow human > readable as well as internally formatted labels. Internally > formatted labels will be stored as the string value of the > slabel property. The zfs command will do the translation > using the standard Trusted Extensions interfaces which take > into account the calling user's rights to view/set human > readable label strings. > > * What is the interaction between the zfs crypto project and this case? > > The on disk format of the slabel string is public information > (unclassified) and requires no protection. > _______________________________________________ > opensolaris-arc mailing list > opensolaris-arc at opensolaris.org
Two comments/requests from the ZFS team. 1) Please choose a more descriptive name for the property than 'slabel'. Perhaps "securitylabel" or "seclabel" or something else? 2) Please make the property either not delegate-able or fully delegate-able. By fully delegate-able we mean, no other privilege required if you've been delegated permission to manipulate the property. -tim