08/21/2006 lspp Meeting Minutes:
===============================
  Attendees

  Robin Redden (IBM) - RR
  George Wilson (IBM) - GW
  Michael Thompson (IBM) - MT
  Thiago Bauermann (IBM) - TB
  Al Viro (Red Hat) - AV
  Irina Boverman (Red Hat) - IB
  Lisa Smith (HP) - LMS
  Amy Griffis (HP) - AG
  Matt Anderson (HP) - MA
  Joe Nall - JN
  Bill O'Donnel (SGI) - BO
  Dan Walsh (Red Hat) - DW
  Debora Velarde (IBM) - DV
  Lenny Bruzanak - LB
  Ted Toth - TT
  Linda Knippers (HP) - LK


Forgive me if any names are mis-spelled or statements attributed to the wrong voice. :)


Tentative Agenda:
        Kernel / Rawhide update
        SELinux base update
        MLS policy issues
        Audit userspace
        Print
        CIPSO
        IPsec
        xinetd
        ipsec-tools:  SPD dump and racoon base + MLS
        Single-user mode
        Self tests
        VFS polyinstantiation
        Cron, tmpwatch, mail, etc.
        Bugs / remaining tasks
        Final cutoff date


Announcements
-------------
  GW: Janak Desai has left the project. He has taken a new opportunity
      within IBM. There should be some backfill. Farewell Janak :)

Kernel / Rawhide update
-----------------------
   AV: Steve Grubb and Al's stuff got into mainline (should take care of
       some line items). Rawhide should see these changes in a few days,
       mainline has, and MM will get once Andrew rebases.
   GW: Can we mix beta and rawhide?
   SG: Yes, for a while, no major changes so in some cases you should be
       able to interchange.
   GW: Seen a problem on fc5+rawhide where root can't change his or
       other's passwords. Haven't tested on beta yet.
   DV: Seen this on alpha with rawhide layered
   GW: We need to retry this on the beta

   AV: For syscall classes, andrew added support for ppc/ppc64/s390x.
       Probably want to carefully test these. This doesn't differ much
       on amd64 and the like since they already have the change.
   GW: yes, we need to retest carefully

   DW: Changing passwords works ok for me on beta
   GW: ok, that's probably an alpha bug

   SG: Bugzilla re: ppc shared memory values problem, don't have access
       to a ppc machine to do any real debug work.
   GW: Try to work with IBM kernel developers?
   MT: ok

   SG: Confirmed that ppid seems to be backwards (= != flipped) and
       needs to be looked into
   AV: Interesting...
   GW: Is that code dustin wrote?

   LK: Are there bugzillas for this stuff that we can see?
   GW: Yes, but it's usually painful. We have to add to a confidential
       group which makes difficult for others to find/see them.
       Can we change this with RH's bugzilla?
   IB: We can change that... maybe not
   GW: RHIT bugs are now opaque to us
   SG: We've talked about these bugs on IRC, and we need to start
       looking into them. These are only bugs that we're tracking with
       the audit system.
   AV: I'm looking at ppc code right now... don't see any difference
   MT: Seen this on both ppc and x86_64
   AV: Audit pid works correctly
   SG: MT: AV: what the heck...

   SG: for ppc shared mem, can't really work on, no hardware
   GW: we need to leverage our internal hands

IPsec
-----
   JN: Confused about IPsec, it seems IPsec not doing what people think
       it should intuitively. What are the plans for all the
       reconsilliation patches? Is IPsec going to be usefl from an
       application developer prospective?
   GW: I thought the upshot of that email thread was joy and venkat
       finding a bug
   LK: I would appriciated a big picture of whats going on
   GW: I think its bug fixes, Joy could tell us more
   LK: I think Venkat took patches to the list... don't know whats
        missing if these patches don't make it, etc
   JN: I think he reposted those patches, am putting a system together
       to run Joshua Brendal's test
   GW: I need to get in touch with Venkat and Joy

   GW: Joy to produce write up (not seen yet) to clarify setup and
       produce some example policy. Joy claims testing in enforcing mode
       and complete label flow. Suspects Joshua had setup problems or
       found a bug... thinks might be a bug.
   LK: This all might be unrelated to Venkat's patches
   GW: Yes, she wouldn't e testing with those patches, she was just
       testing with IPsec stress and she found memmv memcpy bugs on ppc
       Hoping that she can do write up now that she's done. Will get in
       touch with Venkat and Joy to follow up.

   JN: Any intent to update racoon to negotiate the labels for
       automation?
   GW: Venkat has given joy this patch, but Joy hit the oops so she
       couldn't continue testing.
   JN: That's this patch?
   GW: Yes, I think that's one of the patches Venkat produced. Need to
       get a handle on Joy and Venkat's status about this. Think Joy was
       supposed to send on Venkat's pathes for integrated patches to
       netdev

SELinux base update
-------------------
   DW: 2 things, 1 been mucking around trying to get rpm and yum working
       right. Right now, when we run rpm, when it runs post install its
       also running at sysadm_r, which is not sufficient. i.e. yum
       update will get scriplet failures trying to get sysadm_r to
       automatically transition to system_r, but its difficult to do
       this due to run_init.
   DW: Thinking we should make users run "rpm" under run_init, but this
       is going to be a usability nightmare (reauthentication)
   MA: Isn't run_init like newrole? can't we have a "root OK" style
       confirm?
   DW: Not sure
   MA: Getting password prompt to authenticate on newrole to sysadm_r
   DW: This might work. Going to restrict rpm to run_init only, to allow
       for easy transitions

   DW: Issue 2 is cron is running as user_cron_t, which means its
       filling up sys logs with AVC messages. cron patch probably
       not right, since its running scripts with the wrong context.

   DW: Infamous boot to single mode on failure, will go to single user.
We have a patch in place. Using a flag that we're not cleaning
       up.

   SG: Few things for SELinux: secmark looks like later this week
       initial patches will be going into iptabels, but won't be the
       complete patch. People can start experimenting.

   SG: Are we going to start testing the scripts and stuff from
       policycoreutils?
   GW: We're focusing on certification testing
   SG: What kind of testing coverage is going to be given to SELinux?
       Like  setenforce and sestatus?
   GW: Security relevant will be more throughly tested than
       informational
   SG: But like restorecon etc
   GW: yes, those will be heavily test, like semanage, etc all the
       important ones. They will receive fairly extensive testing
       needs to be done to meet CC testing requirements

   SG: Linda, what about you guys? are you looking into policycoreutils
       and libselinux?
   LK: My answer is like George's
   GW: We don't want to ship broken code, but we can't afford to spend
       that bandwidth. We want to get as much FVT as we can, but we
       can't do it all
   SG: Wondering if other packages will get the same attention as audit
   GW: Philosophy has to be low-level testing, not necessarily at the
       higher levels

   SG: I would like to see restorecon tested heavily
   LK: You'll see test caeses written around tools listed in the config
       guide

   LK: We could use instructions on how to take RHEL5 beta and how to
       get it into enforcing mode correctly
   GW: We're using rawhide packages on top of the beta
   LK: Not seeing any issues?
   GW: I don't think so, but that password problem might be related. As
       Steve said, if thinks haven't moved too far, should be OK.

   LK: If we find a problem in the beta with rawhide packages, who do we
       label it against?
   SG: If you file against rawhide, we'll fix rawhide but we need to
       remember to port to beta
   LK: Didn't see an MLS policy in the beta
   GW: Key thing is to CC Irina, Dan and Steve

   GW: Question, will there be an update repo from the beta or do we
       keep pulling from rawhide?
   IB: I think we're planning a repo which would be refreshed once a
       week
   GW: Good, we need that package confidence
   IB: Bugs against rawhide usually need to be opened twice, I'll try to
       keep track of these
   DW: Open these against RHEL5, esp. if in the policy tool chain

Audit userspace
---------------
   SG: No news
   GW: Should we drop this from the agenda?
   SG: I'll have stuff going in, mostly normal bugs and audit parse
       library
   GW: Will leave a  generic audit related item in the agenda

Print
-----
   GW: Matt, how is print going?
   MA: Not too bad, have had feedback regarding audit messages, working
       on this suggestion was a user banner, final banner override field
       in messages lprm only doing DAC check, and cancel is going on the
       same code path need to get an new version out that has MLS check.
   MA: Posted re: what just works means for MCS. think MCS if no
       category, then leave label off, assume sysadm didn't want a label
       applied because user operating without categories thats about it
   GW: Hope you get feedback from the post


CIPSO
-----
   LK: Paul on travel, no news on CIPSO
   JN: Wrote a pretty complicated policy that seems to be working. Send
       me (Joe Nall) an email if you want a copy of this.
   LK: Glad to see tools made it into extras
   JN: What happens right now if you turn netlabel on, your not able to
       access the net because those packets are unlabeled

xinetd
------
   TT: Have extended internally to use. So far so good
   SG: xinetd has ability to relay between networks, will disable in
       favor of iptables
   TT: Should xinetd use pam_namespaces to get things to the right
       namespace? Am concerned with multi-level stuff.
   SG: No, xinetd tries to stay out of pam, but not hard to write a
       program that creates the "pam-ified" environment.
   TT: So that's what we should do?
   SG: Yeah, a program called "pam tester", available at freshmeat,
       which launches a bunch of utils
   TT: We have a bunch of internal apps which launch though xinetd, and
       most of them rely on polyinstantiated /tmp and trying to figure
       out how to best recreate that, will look at pam_test and let you
       know what I find.

Selftest
--------
   SG: Disable prelink
   GW: Recommended ripping out and using 8?
   SG: Possibly, if it does show up in beta2, do that, but don't do that
       work yet.
   SG: James will hook it up with the audit system so if we find a
       mismatch then we can send messages to audit.
   GW: One of the problems I found was RPM misclassifying things, like
       config files not being noted as such
   SG: Not every config file is labeled that way, because its a note to
       RPM to not overwrite this file
   GW: Would be nice if I had a real integrety checker to call into
   SG: That's the hope

VFS polyinstantiation & cron
----------------------------
   GW: Janak will try to help out here, but his time is re-allocated.
       We'll try to pick up the slack, but we're - 1(janak).

Bugs / remaining tasks
----------------------
   GW: Keep testing and filing bugs, need to test integration, esp in
       networking. Need focus on IPsec rather desperately need to flush
       out how things should be set up and how to write tests, and we
       need the integration test.

   GW: For communication on the bugs, if they are not confidential,
       should we posting the bug abstract to the list?
   LK: Yes, that would be nice. Paul has done this before.
   GW: If we could share abstracts, it would be beneficial if Red Hat is
       OK with this?
   IB: Yes, should be ok
   LK: I think I've seen bugs where IBM, RH, HP and Klaus are all
       working together

   IB: I can set a bug to be IBM and HP confidential, so I can do that
       and it can be seen by both
   GW: If we don't check confidential boxes, it should be public yes?
   IB: Yes, that's what I thought

   IB: I will see if its OK to post the list of bugs to the LSPP list
   GW: Yes, that's the preferable approach rather than us deciding
       confidential or not

Final cutoff date
-----------------
   GW: What is the final cut-off date?
   IB: I don't think we know, think Oct 4th is the 2nd beta date, but
       that's not finalized
   IB: I would encourage people to do as much as they can in the next
       2-3 weeks

~Fin

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to