Re: [PATCH v6 0/3] LSM: security module information improvements
From: Casey Schaufler
Date: Thu Oct 27 2016 - 20:05:58 EST
On 10/27/2016 3:32 PM, James Morris wrote:
> On Wed, 26 Oct 2016, Casey Schaufler wrote:
>
>> Create interfaces that make it possible to deal with process
>> attributes in the face of multiple "major" security modules.
> We don't have support for multiple major modules currently (perhaps ever),
> so I'm not merging infrastructure which is only useful for them.
The 2/3 patch provides for disambiguation of "current"
whether you have multiple modules or just one. In effect
it corrects an error made in both Smack and AppArmor to
reuse the attribute interface names from SELinux. There
was substantial discussion on the LSM list about how best
to address this. I had originally suggested new names in
the attr directory, but the subdirectory approach was
greatly preferred by the populous.
The 3/3 patch is forward looking, I'll admit. Userspace
can start getting ready for the combined format in
advance of multiple major modules. When complete module
stacking patches are available I don't want to be addressing
"no userspace is set up to handle that" if at all possible.
I don't want to be Chicken or Egged to death. The attr/context
would be the ideal thing for the id command to report, as
the format would always be the same and identify the module(s).
>
>> Patch 1/3 adds /sys/kernel/security/lsm, which provides
>> a list of the active security modules on the system.
>>
>> $ cat /sys/kernel/security/lsm
>> capability,yama,loadpin,smack
> This may make sense on its own. Has anyone requested this, or is likely
> to adopt it into a distro?
As John mentioned, Ubuntu would like this. I expect to use
it in the Smack userspace, hence Tizen.