Received: by 10.213.65.68 with SMTP id h4csp1705536imn; Sun, 8 Apr 2018 09:32:38 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+GYOIU2lsB5J+NZrzkvlQtmQDFonyGAF7f7iq8NRXcPjUgTGtkzmBn5aUpBvgdqFa3RWel X-Received: by 2002:a17:902:a24:: with SMTP id 33-v6mr35637933plo.72.1523205158550; Sun, 08 Apr 2018 09:32:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523205158; cv=none; d=google.com; s=arc-20160816; b=fUxNkdTUHfzx1oyIZ3nedIEd1K0lgEk+ayRYIsgKRdQrTtUONR+faz3JG/xg7QWWga 2Apybvzaz5RWFFRtkzLuqLecenH3OWSPfQCfEWX4+9Lpfk5aUA7XKNLg6OHgE8DsNHFN MIiyLODJY4amJSb2zTXtl60L6Mpx9vUa3+OIZXQ1qbMuZrWqfW8jFZILcg+pNzsSqrK0 ri0lD0OO+qY6B57Ts0fZhi3erHyROYia2o+vAa+6GF1LNZdJ/uEAtR1mgREVpPpjK3Zt /BCZxUp2gPBJlld1/HkR2FXuRMmscNRspqabkikv+KIG81k1zw7Did/fMn0c/B95ic7V uB6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=pwa7NdSrordaWeqq7Q+qN5JvGIgLhCVuOfhWXRrK6xE=; b=PxVS8LP6C7H3qNqNbG8c9iauGFE2+WIwPnDuMgAPEaT+EdhT2kOuHefR6mFt4Qc2de lF24DGDLfLx2PLbP6S0+Tj6WKTcyFaSKhuNqucHdvj47ZFwDnh/g5epKC1dnISuS6zUw UwrVWkZBrn6deG+lcu4/zrb4oEJnh9xf7ET6ZibLB6+W2WSU/IfK+2Vo3QG1YkhepNRV V0vDAPkQxwMrWqUHF/lgpmsiH3cSlfS0FpVu5T8bjxEVqkr4i3HYvL4rkb+VYbNgIeir Z4NJ1GJBcHFtRuwuxlzBVTPgod3XKHp4YwQLIC/65GD+RiZAbII9SJoaJIRVrZb9GOxE GPIw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q17si11378272pfg.298.2018.04.08.09.32.01; Sun, 08 Apr 2018 09:32:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752239AbeDHPvR (ORCPT + 99 others); Sun, 8 Apr 2018 11:51:17 -0400 Received: from h2.hallyn.com ([78.46.35.8]:32964 "EHLO mail.hallyn.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751770AbeDHPvQ (ORCPT ); Sun, 8 Apr 2018 11:51:16 -0400 Received: by mail.hallyn.com (Postfix, from userid 1001) id 12909120281; Sun, 8 Apr 2018 10:51:15 -0500 (CDT) Date: Sun, 8 Apr 2018 10:51:15 -0500 From: "Serge E. Hallyn" To: shinya1.takumi@toshiba.co.jp Cc: serge@hallyn.com, jmorris@namei.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC v3 0/2] WhiteEgret LSM module Message-ID: <20180408155114.GE9715@mail.hallyn.com> References: <20180330083031.2199-1-masanobu2.koike@toshiba.co.jp> <20180401200827.GA28101@mail.hallyn.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Quoting shinya1.takumi@toshiba.co.jp (shinya1.takumi@toshiba.co.jp): > I am one of developers of WhiteEgret. > > > regardling the last one, do you have a plan for handling it? > Yes, we have a plan to release WhiteEgret v4 patch with a WEUA sample of access control for script programs. Do you have a target date for posting that? > The latest WhiteEgret cannot control script programs since script files read by an interpreter are not hooked by the execve system call. > We consider that script programs can be controlled by controlling the files inputted by interpreters, accordingly. > We consider that the control can be realized using the read system call hooking. So you have a design for being able to differentiate the interpreters reading versus reading with the intent to execute? With or without their help? > Now, we are developing WhiteEgret with the read system call hooking and WEUA which controls the script files to be read to interpreters using information from the read system call hooking and white list. -serge