Hello.

Regarding TOMOYO 1.x and CaitSith, it turned out that there is
a possibility of lockup problem mentioned at
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4449a51a7c281602
within the garbage collection when deleting domains by writing
"delete $domainname". Therefore, I released an update.

There is no report that this problem occurred in TOMOYO or CaitSith.
AKARI and TOMOYO 2.x are not affected. Also, TOMOYO 1.x with
CONFIG_CCSECURITY_USE_EXTERNAL_TASK_SECURITY enabled and CaitSith with
CONFIG_CAITSITH_USE_EXTERNAL_TASK_SECURITY enabled are not affected.

The latest files which include patches for Linux 4.10 are shown below.

  ccs-patch-1.8.5-20170220.tar.gz           MD5:ffff646d85482eb92c52ebbdfe43fc30
  akari-1.0.36-20170220.tar.gz              MD5:66665b863de0414c6dd63cf6a43b7999
  caitsith-patch-0.2-20170220.tar.gz        MD5:eeee437baa5c0419f2abbfdb1eb70361

There are updated tools packages, though I was too busy to announce.
The screen transition rule of the policy editor in tomoyo-tools 2.5
became same with ccs-tools 1.8.

  ccs-tools-1.8.5-20170102.tar.gz           MD5:44446af8b01e92c1605c0460b7dc97d2
  tomoyo-tools-2.5.0-20170102.tar.gz        MD5:888804d58742452fe213a68f7eadd0ad
  caitsith-tools-0.2-20161229.tar.gz        MD5:555555ed7ed21547d8d6d2285157c126



Recently, changes for kernel hardening seems to be actively merged.
For example, in kernels built with CONFIG_RANDOMIZE_BASE enabled,
though there will be no problem for AKARI, the addresses AKARI reports
and the addresses recorded in System.map no longer match. Also, changes
which add "const" attribute as much as possible, and/or add "read only"
attribute after initialization completes are proposed.

The array of "struct security_hook_list" which is used for LSM hooks is
also subjected to this add "read only" attribute after initialization
completed proposal. It might become difficult to load modules like AKARI
which interrupts into LSM hooks.

Kernel modules used by antivirus software for on-access scanning which
interrupt into LSM hooks might be also affected. Note that since LSM
framework is already ready to register multiple LSM modules (though there
are several restrictions remaining), it seems that proposing such kernel
modules to upstream with modifications for upstream will be welcomed
( http://www.openwall.com/lists/kernel-hardening/2017/02/17/15 ).

As for the rest, it seems that the security_task_alloc() hook which was
removed in Linux 2.6.29 is about to be revived for the first time in a
decade, due to proposal of new LSM modules (e.g. ptags, Timgad) which want
to manage security attributes for per "struct task_struct" basis rather than
per "struct cred" basis. For TOMOYO which was named due to use of per
"struct task_struct" basis management, names and natures will agree. ;-)

_______________________________________________
tomoyo-users-en mailing list
tomoyo-users-en@lists.osdn.me
http://lists.osdn.me/mailman/listinfo/tomoyo-users-en

Reply via email to