OpenVZ Forum


Home » Mailing lists » Devel » [PATCH] cgroups: implement device whitelist lsm (v3)
Re: [PATCH] cgroups: implement device whitelist lsm (v3) [message #28377 is a reply to message #28338] Fri, 14 March 2008 13:27 Go to previous messageGo to previous message
Stephen Smalley is currently offline  Stephen Smalley
Messages: 10
Registered: November 2007
Junior Member
On Fri, 2008-03-14 at 21:17 +1100, James Morris wrote:
> On Thu, 13 Mar 2008, Serge E. Hallyn wrote:
> 
> > Implement a cgroup using the LSM interface to enforce open and mknod
> > on device files.
> 
> Actually, I'm not sure that the LSM approach in general is best here.
> 
> The LSM model is that standard DAC logic lives in the core kernel, and 
> that extended security logic (e.g. MAC) is called after DAC via hooks.  
> cgroups has introduced new security logic of its own, which is arguably 
> "standard DAC" when cgroups is enabled.
> 
> I can understand Greg not wanting this security logic in the core kernel, 
> but it is specific to cgroups (which itself is security model agnostic) 
> and does not stand alone as a distinct security framework.
> 
> The fact that all existing LSMs need to invoke exactly the same code is an 
> indicator that it doesn't belong in LSM.
> 
> Moving this logic into LSM means that instead of the cgroups security 
> logic being called from one place in the main kernel (where cgroups 
> lives), it must be called identically from each LSM (none of which are 
> even aware of cgroups), which I think is pretty obviously the wrong 
> solution.
> 
> This is baggage which comes with cgroups -- please don't push it into LSM 
> to try and hide that.

I agree with the above, and would further note that I would expect the
SELinux solution to the problem would be done not by stacking with or
calling this device whitelist lsm but instead by introducing the ability
to bind security labels to devices within the kernel (independent of the
particular device node(s) in the filesystem used to access that device)
and applying permission checks on those device labels when processes
attempt to create or access those devices (again independent of the
particular device node used to access them).  That keeps the policy
integrated and analyzable and avoids an external dependency.

-- 
Stephen Smalley
National Security Agency

_______________________________________________
Containers mailing list
Containers@lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
 
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Previous Topic: [PATCH -mm] cgroup: fix boot option parsing
Next Topic: [PATCH] cgroups: implement device whitelist (v4)
Goto Forum:
  


Current Time: Mon Jun 30 04:25:00 GMT 2025

Total time taken to generate the page: 0.02076 seconds