Re: [saag] [Labeled-nfs] Common labeled security (comment on CALIPSO, labeled NFSv4)

Casey Schaufler <casey@schaufler-ca.com> Wed, 08 April 2009 03:02 UTC

Return-Path: <casey@schaufler-ca.com>
X-Original-To: saag@core3.amsl.com
Delivered-To: saag@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 22DC13A6E39 for <saag@core3.amsl.com>; Tue, 7 Apr 2009 20:02:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.522
X-Spam-Level:
X-Spam-Status: No, score=-2.522 tagged_above=-999 required=5 tests=[AWL=0.077, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ULw9ZZogB1z4 for <saag@core3.amsl.com>; Tue, 7 Apr 2009 20:02:07 -0700 (PDT)
Received: from smtp105.prem.mail.sp1.yahoo.com (smtp105.prem.mail.sp1.yahoo.com [98.136.44.60]) by core3.amsl.com (Postfix) with SMTP id 0B6703A6829 for <saag@ietf.org>; Tue, 7 Apr 2009 20:01:59 -0700 (PDT)
Received: (qmail 68806 invoked from network); 8 Apr 2009 03:03:06 -0000
Received: from unknown (HELO ?192.168.1.102?) (casey@64.41.22.89 with plain) by smtp105.prem.mail.sp1.yahoo.com with SMTP; 8 Apr 2009 03:03:05 -0000
X-YMail-OSG: ChUx_fQVM1kvWnap40cXzs0w.14_a4USXvW2sMfsxdDZkOfasABCYFCxBtLKieNOxl04tf531NpFlrD2XgyDx87DVudn7776xmRRT6vyFaKU223HN.gEXOjVHHEpvVIK1ty0YrxBKRrIfzKhqJthE8ruQPReSyeKljSfAImpH3c5oDaE52c7viN.a0phRtdBJSa7N6FhThG2DjMojEMdBH6JF5UQfv8GjHAMV0TE71sE7I0Sfz3kMtw.sWmj5yZlXm8R_.WLCkQclx5NMUWUjTBHZAz.esw17HrdNZHWZriSRILJ
X-Yahoo-Newman-Property: ymail-3
Message-ID: <49DC13DA.10405@schaufler-ca.com>
Date: Tue, 07 Apr 2009 20:02:50 -0700
From: Casey Schaufler <casey@schaufler-ca.com>
User-Agent: Thunderbird 2.0.0.21 (Windows/20090302)
MIME-Version: 1.0
To: Nicolas Williams <Nicolas.Williams@sun.com>
References: <20090402154402.GM1500@Sun.COM> <FAD1CF17F2A45B43ADE04E140BA83D48A9FF82@scygexch1.cygnacom.com> <20090403164522.DEA9A9A4739@odin.smetech.net> <9C2457A4-328A-4A68-A9D2-6E4B5544078D@Isode.com> <FAD1CF17F2A45B43ADE04E140BA83D48A9FFE0@scygexch1.cygnacom.com> <B8FB99E8-17AA-4D4B-A309-8AF79838A304@Isode.com> <FAD1CF17F2A45B43ADE04E140BA83D48A9FFE9@scygexch1.cygnacom.com> <20090406151606.GQ1500@Sun.COM> <20090406180424.BA7AC9A4749@odin.smetech.net> <49DAC29D.6030902@schaufler-ca.com> <20090407164420.GW1500@Sun.COM>
In-Reply-To: <20090407164420.GW1500@Sun.COM>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: labeled-nfs@linux-nfs.org, Kurt Zeilenga <Kurt.Zeilenga@Isode.com>, nfsv4@ietf.org, saag@ietf.org, nfs-discuss@opensolaris.org, Casey Schaufler <casey@schaufler-ca.com>, Santosh Chokhani <SChokhani@cygnacom.com>
Subject: Re: [saag] [Labeled-nfs] Common labeled security (comment on CALIPSO, labeled NFSv4)
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Apr 2009 03:02:08 -0000

Nicolas Williams wrote:
> On Mon, Apr 06, 2009 at 08:03:57PM -0700, Casey Schaufler wrote:
>   
>> I don't think so. Two SELinux machines will most likely have different
>> policies even if they installed from the same media on similar hardware
>> with similar configurations. If there's any reason for the NFS server
>> to know anything about the client that impacts policy enforcement the
>> server has to know enough to make that judgment correctly. If the server
>> can ignore the client's policy there is no need to send any information.
>> If the server can't ignore the client's policy it needs to be able to
>> reconcile the local policy to the remote policy in order to enforce
>> reasonable policy.
>>     
>
> We can have label-aware servers with non-label-aware protocols.  But
> that's too constraining: it means clients have to be at a single label
> or otherwise communicate labels by convention (e.g., data location).  It
> also means that interfaces to labeling will be proprietary.
>
> We can have non-label-aware server, non-label-aware protocols, and label
> aware clients, trusting the clients to enforce a common policy.  But
> this too is too constraining: a) it forces one to associate labels with
> document _location_, b) it forces one to trust the clients too much.
>
> We need multi-level clients, since many users will have a
> range of clearances, not just a single one (and they need a trusted
> desktop).
>
> Given the above then we need label-aware servers and label-aware
> protocols so as to support for multi-level clients (with clients trusted
> to within a range of labels associated with clients' and users'
> authenticated identities and other authorization information).
>
> Even before putting labels on the wire we'd have a security policy
> management issue since storage can span many servers.
>
> With labels appearing on the wire (in IP headers, in application
> protocols, in PKIX certificate extensions and Kerberos V authorization-
> data, ...) we simply cannot avoid the need to express common security
> policies.  We also cannot force everything and everyone to operate in a
> single DOI.  And we cannot avoid the need to classify the security
> policies themselves, including varying classification for different
> subsets of the policies.
>
> IMO that means that we need something like SPIF, including:
>
>  - a generic security policy data model/syntax
>  - an interoperable encoding of security policies
>  - a method by which two peers can detect and agree that they know a
>    given common subset of a common security policy
>  - label equivalencies
>
> The last item is the least critical -- we can deal with that later.
>   

Wow.

Before I go too far, how familiar are you with MLS, SELinux, or Smack?
All three provide general security policy models (Opinions vary on MLS)
but none would lend themselves as a "generic" model. MLS is strictly
oriented toward sensitivity, SELinux depends on the programs installed
on the machine, and Smack uses no syntax in its labels at all. An
interoperable encoding of policies might be possible for very limited
policies. I suggest that mapping any other policy to the SELinux
reference policy is beyond the state of the art, and I welcome an
informed argument that proves me wrong. Two peers negotiating a
policy subset? How does that help? Regarding the notion that the issue
of label equivalences is "least critical", I don't see how you can
claim to have successfully addressed any of the other bullet items
without it.

You're busy stocking the nursery and you haven't kissed the girl yet.

If the information from the client is meaningless to the server the
server can not use it to make an access control decision. Same goes
the other way. With Smack I can assert that the label space for the
client and server are the same and that it's OK if they use the labels
passed around even if their rule sets differ. I know a good number of
people who would find such an assertion dangerous, maybe even
criminal. Label representations are meaningless without the policy
behind them and mapping policies is hard enough that you could probably
get a PHD from a reputable institution by measuring just how hard it
is.


>> So you're back to mapping policies. You have to map policies if you
>> want either side to do all the work. The mechanisms used to map
>>     
>
> Yes.
>
>   
>> labels used by different installations of the same 1990's MLS systems
>> will not work for SELinux systems installed for different purposes by
>> disjoint agencies.
>>     
>
> That's fine, unless you want them to interop and you can establish
> equivalencies.  And provided SELinux can deal -- but that's less
> important because if it's just a small matter of programming (i.e., we
> have specs to code to or know what to code that we can write specs
> from) then it's just a matter of time.
>
> So we need to know whether solutions in this space are technically
> feasible.  I believe they are.  (We also need to know whether they are
> politically feasible, but here I think we'll find that they are
> politically required :)
>
>   
>> I'm not trying to stop progress here. I am simply trying to point out
>> that choosing a mechanism to implement a facility that won't work in
>> the end is pretty pointless. Sure the old schemes worked in certain
>>     
>
> No one is knowingly proposing a mechanism that won't work so far as I
> can tell.
>
>   
>> cases in the olden days. The question is will they work now, and the
>> answer is obviously "no".
>>     
>
>
>