Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Mimi Zohar
On Thu, 2007-03-08 at 15:38 -0500, [EMAIL PROTECTED] wrote: > On Thu, 08 Mar 2007 12:46:47 CST, "Serge E. Hallyn" said: > > I think it should be done as both. The part which measures the > > integrity of files should be an integrity subsystem. The part which > > uses those results to either

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Serge E. Hallyn
Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): > On Thu, 08 Mar 2007 12:46:47 CST, "Serge E. Hallyn" said: > > I think it should be done as both. The part which measures the > > integrity of files should be an integrity subsystem. The part which > > uses those results to either allow/refuse

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Valdis . Kletnieks
On Thu, 08 Mar 2007 12:46:47 CST, "Serge E. Hallyn" said: > I think it should be done as both. The part which measures the > integrity of files should be an integrity subsystem. The part which > uses those results to either allow/refuse actions or take some other > action (i.e. shut down the

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Chris Wright
* Casey Schaufler ([EMAIL PROTECTED]) wrote: > > --- "Serge E. Hallyn" <[EMAIL PROTECTED]> wrote: > > > > It's unfortunate, agreed, but > > > > use of LSM as an integrity framework was also a > > no-go. > > You're going to have to justify this assertion. > I know of at least one

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Serge E. Hallyn
Quoting Casey Schaufler ([EMAIL PROTECTED]): > > --- "Serge E. Hallyn" <[EMAIL PROTECTED]> wrote: > > > > It's unfortunate, agreed, but > > > > use of LSM as an integrity framework was also a > > no-go. > > You're going to have to justify this assertion. You misunderstand. I wasn't saying

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Casey Schaufler
--- "Serge E. Hallyn" <[EMAIL PROTECTED]> wrote: > It's unfortunate, agreed, but > > use of LSM as an integrity framework was also a > no-go. You're going to have to justify this assertion. I know of at least one work-in-progress for which LSM works just fine. Not to mention the Integrity

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Chris Wright
* Serge E. Hallyn ([EMAIL PROTECTED]) wrote: > It's unfortunate, agreed, but > use of LSM as an integrity framework was also a no-go. > > Options? There's too much dup because stuff like above is just access control not integrity measurement. Need to break off the parts that really are

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Serge E. Hallyn
Quoting Chris Wright ([EMAIL PROTECTED]): > * Mimi Zohar ([EMAIL PROTECTED]) wrote: > > +static int dummy_inode_setxattr(struct dentry *dentry, char *name, void > > *value, > > + size_t size, int flags) > > +{ > > + if (!strncmp(name, XATTR_SECURITY_PREFIX, > > +

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Chris Wright
* Mimi Zohar ([EMAIL PROTECTED]) wrote: > +static int dummy_inode_setxattr(struct dentry *dentry, char *name, void > *value, > + size_t size, int flags) > +{ > + if (!strncmp(name, XATTR_SECURITY_PREFIX, > + sizeof(XATTR_SECURITY_PREFIX) - 1) && >

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Chris Wright
* Mimi Zohar ([EMAIL PROTECTED]) wrote: +static int dummy_inode_setxattr(struct dentry *dentry, char *name, void *value, + size_t size, int flags) +{ + if (!strncmp(name, XATTR_SECURITY_PREFIX, + sizeof(XATTR_SECURITY_PREFIX) - 1) +

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Serge E. Hallyn
Quoting Chris Wright ([EMAIL PROTECTED]): * Mimi Zohar ([EMAIL PROTECTED]) wrote: +static int dummy_inode_setxattr(struct dentry *dentry, char *name, void *value, + size_t size, int flags) +{ + if (!strncmp(name, XATTR_SECURITY_PREFIX, +

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Chris Wright
* Serge E. Hallyn ([EMAIL PROTECTED]) wrote: It's unfortunate, agreed, but use of LSM as an integrity framework was also a no-go. Options? There's too much dup because stuff like above is just access control not integrity measurement. Need to break off the parts that really are different.

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Casey Schaufler
--- Serge E. Hallyn [EMAIL PROTECTED] wrote: It's unfortunate, agreed, but use of LSM as an integrity framework was also a no-go. You're going to have to justify this assertion. I know of at least one work-in-progress for which LSM works just fine. Not to mention the Integrity claims of

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Serge E. Hallyn
Quoting Casey Schaufler ([EMAIL PROTECTED]): --- Serge E. Hallyn [EMAIL PROTECTED] wrote: It's unfortunate, agreed, but use of LSM as an integrity framework was also a no-go. You're going to have to justify this assertion. You misunderstand. I wasn't saying it wouldn't work :)

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Chris Wright
* Casey Schaufler ([EMAIL PROTECTED]) wrote: --- Serge E. Hallyn [EMAIL PROTECTED] wrote: It's unfortunate, agreed, but use of LSM as an integrity framework was also a no-go. You're going to have to justify this assertion. I know of at least one work-in-progress for which LSM

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Valdis . Kletnieks
On Thu, 08 Mar 2007 12:46:47 CST, Serge E. Hallyn said: I think it should be done as both. The part which measures the integrity of files should be an integrity subsystem. The part which uses those results to either allow/refuse actions or take some other action (i.e. shut down the system)

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Serge E. Hallyn
Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): On Thu, 08 Mar 2007 12:46:47 CST, Serge E. Hallyn said: I think it should be done as both. The part which measures the integrity of files should be an integrity subsystem. The part which uses those results to either allow/refuse actions or

Re: [RFC][Patch 1/6] integrity: new hooks

2007-03-08 Thread Mimi Zohar
On Thu, 2007-03-08 at 15:38 -0500, [EMAIL PROTECTED] wrote: On Thu, 08 Mar 2007 12:46:47 CST, Serge E. Hallyn said: I think it should be done as both. The part which measures the integrity of files should be an integrity subsystem. The part which uses those results to either allow/refuse