James Morris <[email protected]> wrote:
> I think this looks ok from an SELinux point of view if keys are treated as
> opaque objects, i.e. like files.
I'll make some changes based on the suggestions I've received. Those who
request the return of keyfs can go boil their heads.
> We could do something like create a new object class (kernkey or
> something) and implement SELinux permissions for the class such as read,
> write, search, link, setattr and getattr. Your KEY_VIEW perm could be
> translated to SELinux getattr.
Should I expand the permissions mask to include a setattr?
> More thought needs to go into whether we need to implement an SELinux
> create permission (and add hooks into the code), for control over whether
> a process can create an anonymous keyring.
That's not really a per-key type of thing.
> I'm not sure if we need user-level labeling of keys via the set & get
> security ops, although LSPP may require some form of get_security. If we
> don't need to manually set security attributes but still view them, they
> could be displayed via /proc/keys rather than implementing a separate
> multiplexed syscall.
Would it be worth me adding a key type op by which a security module can ask
the type its opinion (or by which key_alloc() can ask the type to give the
security module an earful)?
> keyctl_chown_key()
> keyctl_setperm_key()
Okay.
> keyctl_set_reqkey_keyring()
Should this really be securified? It merely controls the default destination
for a key created by request_key(), and is limited to the keyrings the process
is subscribed to in any case.
> keyctl_join_session_keyring() [only if we add a 'create' perm]
This does need a security hook, at least for joining an existing session.
I wonder if I should treat named sessions on a per-user basis and whether I
should separate them from keyrings, so that session names refer to keyrings
and have their own permissions and security, but aren't those keyrings. This
latter bit is the big stumbling block that I had with the clone-handle
functionality that Kyle Moffett woulkd like.
> All users of key_permission() need to propagate the error code from the
> LSM back to the user.
Really? Why?
Note that the fact that key_permission() fails for a key is sometimes ignored,
such as when I'm doing a search and one potentially matching key fails, but a
subsequent matching key passes.
David
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]