Re: [saag] [Labeled-nfs] Common labeled security (comment on CALIPSO, labeled NFSv4)
Nicolas Williams <Nicolas.Williams@sun.com> Wed, 08 April 2009 21:50 UTC
Return-Path: <Nicolas.Williams@sun.com>
X-Original-To: saag@core3.amsl.com
Delivered-To: saag@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8740C3A6988; Wed, 8 Apr 2009 14:50:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.812
X-Spam-Level:
X-Spam-Status: No, score=-5.812 tagged_above=-999 required=5 tests=[AWL=0.234, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g5ebErg3SsXe; Wed, 8 Apr 2009 14:50:28 -0700 (PDT)
Received: from brmea-mail-1.sun.com (brmea-mail-1.Sun.COM [192.18.98.31]) by core3.amsl.com (Postfix) with ESMTP id 0B8743A6E82; Wed, 8 Apr 2009 14:50:27 -0700 (PDT)
Received: from dm-central-02.central.sun.com ([129.147.62.5]) by brmea-mail-1.sun.com (8.13.6+Sun/8.12.9) with ESMTP id n38LpZxc010247; Wed, 8 Apr 2009 21:51:35 GMT
Received: from binky.Central.Sun.COM (binky.Central.Sun.COM [129.153.128.104]) by dm-central-02.central.sun.com (8.13.8+Sun/8.13.8/ENSMAIL,v2.2) with ESMTP id n38LpYlH028697; Wed, 8 Apr 2009 15:51:34 -0600 (MDT)
Received: from binky.Central.Sun.COM (localhost [127.0.0.1]) by binky.Central.Sun.COM (8.14.3+Sun/8.14.3) with ESMTP id n38LCARu006680; Wed, 8 Apr 2009 16:12:10 -0500 (CDT)
Received: (from nw141292@localhost) by binky.Central.Sun.COM (8.14.3+Sun/8.14.3/Submit) id n38LC9HT006679; Wed, 8 Apr 2009 16:12:09 -0500 (CDT)
X-Authentication-Warning: binky.Central.Sun.COM: nw141292 set sender to Nicolas.Williams@sun.com using -f
Date: Wed, 08 Apr 2009 16:12:09 -0500
From: Nicolas Williams <Nicolas.Williams@sun.com>
To: Casey Schaufler <casey@schaufler-ca.com>
Message-ID: <20090408211209.GS1500@Sun.COM>
References: <FAD1CF17F2A45B43ADE04E140BA83D48A9FFE0@scygexch1.cygnacom.com> <B8FB99E8-17AA-4D4B-A309-8AF79838A304@Isode.com> <FAD1CF17F2A45B43ADE04E140BA83D48A9FFE9@scygexch1.cygnacom.com> <20090406151606.GQ1500@Sun.COM> <20090406180424.BA7AC9A4749@odin.smetech.net> <49DAC29D.6030902@schaufler-ca.com> <20090407164420.GW1500@Sun.COM> <49DC13DA.10405@schaufler-ca.com> <20090408051745.GG1500@Sun.COM> <49DCCC94.80501@schaufler-ca.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <49DCCC94.80501@schaufler-ca.com>
User-Agent: Mutt/1.5.7i
Cc: labeled-nfs@linux-nfs.org, Kurt Zeilenga <Kurt.Zeilenga@Isode.com>, nfsv4@ietf.org, saag@ietf.org, nfs-discuss@opensolaris.org, Santosh Chokhani <SChokhani@cygnacom.com>
Subject: Re: [saag] [Labeled-nfs] Common labeled security (comment on CALIPSO, labeled NFSv4)
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Apr 2009 21:50:29 -0000
On Wed, Apr 08, 2009 at 09:11:00AM -0700, Casey Schaufler wrote: > The 1990's MLS solutions used labels that described sensitivity > levels and category sets. There was variation on exactly how > these were represented, some used fixed size bit maps, others > arrays of category numbers, but the information they contain is > a complete description of the information required to make an > access control decision. Unfortunately to the task at hand, MLS > is a technology that has seen its last development efforts. But has MLS seen its last days for deployment? I think that for generic non-governmental agency deployment you're quite right that MLS is barely sufficient. DTE is needed. Incidentally, I should clarify that in the context of labeled NFS I only care to solve the sub-problem of how the client and server can determine what policy or subset thereof they share. I currently think that's a simpler problem than how to represent policies (and equivalencies), but only if we also assume a solution that. > The SELinux label, whose textual representation is called a "context", > contains enough information for the system on which it was generated > to interpret it relative to the system policy. It does not contain > sufficient information for a system that does understand that policy > to make decisions based on that context. For a context generated on > Stephen's machine to be meaningful on David's David's machine would > need a full understanding of both policies. Last I looked the > SELinux reference policy was approaching a million lines. Based on > the many interrelationships between policy elements, I do not > think that subsetting is going to be viable, although I'm willing > to be educated on that. I'm still learning about DTE. If I understand correctly though we could constrain ourselves to administrator defined policies built on system- and vendor-defined types/roles. If so then DTE policy subset agreement seems within reach. > In some ways Smack is even worse. The Smack label contains no > actual information, it is just a character string and the access > control is left completely up to the access control rules specified > on the system. A Smack label from Etienne's system has no intrinsic > value on Casey's and give no hint as to how it should be interpreted > or enforced. Ouch. > Summary: Old MLS systems passed sufficient information in their > labels for any number of mechanisms including SPIF, CIPSO, TSIX, > and IPSEC to be useful. 21st century MAC systems, including > SELinux and Smack, have labels that do not contain sufficient > information for another system to make an access control decision. Jarret's point was that this is true even for MLS labels because a node might not know what the meaning of a given sensitivity and compartment are. This is not a problem for CALIPSO because middle boxes need only determine label dominance, but Jarret thinks that this is a problem for NFS. > > IIUC it should be possible to generate SELinux policies from generic > > ones, but not the reverse. If so then that provides a path to > > interoperable deployment, though it would mean sacrificing some > > flexibility. Can you clarify my understanding? > > An SELinux policy can be created from scratch, and we're seeing some > people in the embedded space trying to do just that. Sure, you can > limit the problem by constraining the variation of the policies, but > as we type the reference policy continues to be refined and expanded. > I'm not going to tell Joshua that he has to slow policy development > in support of NFS. I see. This is important knowledge. I'm not sure what can be done about that. > Let's see if I can be clear for a change. (smiley here) :) > The assumption that policy agreement can be assumed is inappropriate. I think you're very likely right about that w.r.t. DTE. But I still harbor some hope. > > So you're saying that a) "a good number of people" think a solution is > > needed that allows the client and server to each know with certainty > > that the other will understand their labels, b) you're among those > > people (?), but c) no solution is feasible. Correct? > > > > a) Else there's no point to labeled NFS. > b) Yup. > c) It is not feasible to meet "a" using just the information contained > in either an SELinux context or a Smack label, regardless of how > the information is transmitted between the client and server. You > can meet "a" for 20th century MLS systems using just the information > contained in the MLS label. Crystal clear. Thanks. > I hope I've clarified the difference between the problem of MLS systems > and the problem of our current set of technologies. You have. Thanks! I'll need to think about the DTE issues, and SELinux vs. Solaris FMAC. Nico --
- [saag] Common labeled security (comment on CALIPS… Nicolas Williams
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Nicolas Williams
- Re: [saag] Common labeled security (comment on CA… Shawn Campbell
- Re: [saag] Common labeled security (comment on CA… Russ Housley
- Re: [saag] Common labeled security (comment on CA… Nicolas Williams
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Nicolas Williams
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Nicolas Williams
- Re: [saag] Common labeled security (comment on CA… Nicolas Williams
- Re: [saag] Common labeled security (comment on CA… Kurt Zeilenga
- Re: [saag] Common labeled security (comment on CA… Russ Housley
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Kurt Zeilenga
- Re: [saag] Common labeled security (comment on CA… Sean Turner
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Santosh Chokhani
- Re: [saag] Common labeled security (comment on CA… Nicolas Williams
- Re: [saag] Common labeled security (comment on CA… Nicolas Williams
- Re: [saag] Common labeled security (comment on CA… Nicolas Williams
- Re: [saag] Common labeled security (comment on CA… Russ Housley
- Re: [saag] Common labeled security (comment on CA… Nicolas Williams
- Re: [saag] [Labeled-nfs] Common labeled security … Santosh Chokhani
- Re: [saag] [Labeled-nfs] Common labeled security … Nicolas Williams
- Re: [saag] [Labeled-nfs] Common labeled security … Casey Schaufler
- Re: [saag] [Labeled-nfs] Common labeled security … Casey Schaufler
- Re: [saag] [Labeled-nfs] Common labeled security … Nicolas Williams
- Re: [saag] [nfsv4] [Labeled-nfs] Common labeled s… James Morris
- Re: [saag] [Labeled-nfs] Common labeled security … Santosh Chokhani
- Re: [saag] [Labeled-nfs] Common labeled security … Casey Schaufler
- Re: [saag] [nfsv4] [Labeled-nfs] Common labeled s… Nicolas Williams
- Re: [saag] [Labeled-nfs] Common labeled security … Santosh Chokhani
- Re: [saag] [Labeled-nfs] Common labeled security … Nicolas Williams
- Re: [saag] [Labeled-nfs] Common labeled security … Jarrett Lu
- Re: [saag] [Labeled-nfs] Common labeled security … James Morris
- Re: [saag] [Labeled-nfs] Common labeled security … Nicolas Williams
- Re: [saag] [Labeled-nfs] Common labeled security … Casey Schaufler