Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2574387imm; Thu, 16 Aug 2018 11:45:05 -0700 (PDT) X-Google-Smtp-Source: AA+uWPzsIS1Ygux3ulMaYlNJQFzUs5A/TS2b44rbjqxx00o8ge1oCMQyi26yP4q21/v8WXApnhpL X-Received: by 2002:a62:87ce:: with SMTP id i197-v6mr33466601pfe.62.1534445105701; Thu, 16 Aug 2018 11:45:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534445105; cv=none; d=google.com; s=arc-20160816; b=krEGdbJsxzfjHWJ4DK53FAuFXEBIBedpIqPDAQFOMgW2YRqlRiRGgRSgenslXw8e2i YwOEdychlkg2fXQoofEu5SEBFddyC0v6oJEiZwux+ZmxnZTEUzHxejfOJFbJeyL05H04 edTfrojUpXKh+POoGlM6rsdhKivk0DitwHkryh36U9QrxxqjZfQqgLi1lwty96dtaxEV wQ7xjCo6tG0R+z//Otu3ObtpGYHJvJMlWv4SAkaS97Ds5dvPA2lEFyt6yS/YzZWi012j bKWs7ZGv+2hxk6vcrmts2NnRb/Nqrz9CoUNF//rMrCnEOaURTpZ8jRhnqQzi2lL9ecFP H1HA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=5bGffriBfOvZbbpbez0EejMsP42nbElVz2EjmUZoLAw=; b=TOJlDKugXTtx1e87nmXgd09WfcmPkmT60BWGFu4j6eLKyvz/PlYQHrIibs4AC41Ge4 /LPfHl/pyNXoaKYRD9thrQRl5njRUIS54swRlwXMuKs6wT9GA2QfYpUWLjMfXSHxRTbP MGS/Bb6VYsRJKc79npW0afJ+Q3dVIA8HfDfg7zJbDSy4vALTsWVZiYOL6zhh5PbZy9Qj FEoHazPE8nxScQKmCtiBzabaEYqKpY4X9NwM65MXtEScMl8TVxVwxZVwWLczoWffw6JN ueIxtsc8L8WZfKzIHK7LRGTMypnzPqJoPWMIxlPYc0kXihO7ar06wTFszJuFYtKC6euy 8yww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jOZZnybO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z73-v6si32474pgd.484.2018.08.16.11.44.49; Thu, 16 Aug 2018 11:45:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jOZZnybO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392181AbeHPTFb (ORCPT + 99 others); Thu, 16 Aug 2018 15:05:31 -0400 Received: from mail-ua1-f67.google.com ([209.85.222.67]:45523 "EHLO mail-ua1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2392167AbeHPTFa (ORCPT ); Thu, 16 Aug 2018 15:05:30 -0400 Received: by mail-ua1-f67.google.com with SMTP id k8-v6so3954891uaq.12; Thu, 16 Aug 2018 09:06:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=5bGffriBfOvZbbpbez0EejMsP42nbElVz2EjmUZoLAw=; b=jOZZnybOfrKvaACY5N96ORWW6x7YtukxxlDCnfCIeVJ+fYAXlCfYFQ8prVUBUNI6ya itllwNhO7hcZigFPtB1i0JzYTgCFQKHS945gRoHlKjF6DALBqg32Cn57RPY+Zgsu3ZH7 LtbgmOrEwNylEjneFPzlfug++02GEQGXw69IjFczJd1VJuHyEX/wcq29YzLYR5mKyLDb KJKJJqAaaOr7nJevIN70BWxA35cB6sZUrWyzA2x6XT8SWBcOkvFqSC2Azsu79iqqQjRX TkGWRLfagncEYMI0aaKR93KowPiQoF0/IHMSE62CvZ9zr9BrYAqKtLW6/czmEj3GYkzb P+QA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=5bGffriBfOvZbbpbez0EejMsP42nbElVz2EjmUZoLAw=; b=nrgPEs0i9cz2sktei79W25YcaCzN/IN5URItOcDq44wRwsMP1F2w6BzwSHb2uU2YxP 1QNx8lO3LLVMWaQwhL25SMOPA7TuSmkS7+WMpaGFdDfs6A7diPF54Z67iGuVxxE5iTNT bXsm9vtzHOoq1azvUKQEuRP0DlAve1uSqtvIv48POtzP4VqKRRC0JOqXLEOUfGYX5Cqn RQYfcXxJGP/oPXoqN7TYdim5Ej+HCi8xb+H0gxF2cj/C3Gdd5YA1cCzqoh7Ethn0dLCS sUZ8z311Dt1sbltqonJ8ErY/BmRfR2ZWLOqyitmzYb3x+tlLbkHPVKGQ7jsSZUyUjmaa +YGg== X-Gm-Message-State: AOUpUlEG+BBso9Q6K5HOWDbuCqT7Xw+145rZG8+Lp5WRxq+9IfadVZ8g rZhM06sAfqAc1PlmzoswikUNt3hbSSA4r2ivCqo= X-Received: by 2002:a9f:2745:: with SMTP id a63-v6mr19892984uaa.175.1534435567179; Thu, 16 Aug 2018 09:06:07 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a67:7cc8:0:0:0:0:0 with HTTP; Thu, 16 Aug 2018 09:05:46 -0700 (PDT) In-Reply-To: References: <8a325db8-e7eb-9581-2b77-fc987a165df7@schaufler-ca.com> <8e2bdc10-3142-9e8d-ff05-70fa4d862dd5@schaufler-ca.com> From: Salvatore Mesoraca Date: Thu, 16 Aug 2018 18:05:46 +0200 Message-ID: Subject: Re: [PATCH v1 00/22] LSM: Full security module stacking To: Kees Cook Cc: Casey Schaufler , Jordan Glover , Sargun Dhillon , LSM , LKLM , Paul Moore , Stephen Smalley , SE Linux , "SMACK-discuss@lists.01.org" , John Johansen , Tetsuo Handa , James Morris , "Schaufler, Casey" , =?UTF-8?B?TWlja2HDq2wgU2FsYcO8bg==?= Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 2018-08-15 7:19 GMT+02:00 Kees Cook : > On Tue, Aug 14, 2018 at 4:50 PM, Casey Schaufler wrote: >> On 8/14/2018 4:22 PM, Jordan Glover wrote: >>> On August 14, 2018 8:28 PM, Casey Schaufler wrote: >>> >>>> >>>>>> The blob management part (through "LSM: Sharing of security blobs") >>>>>> is ready for prime-time. These changes move the management of >>>>>> security blobs out of the security modules and into the security >>>>>> module infrastructure. With this change the proposed S.A.R.A, >>>>>> LandLock and PTAGS security modules could co-exist with any of >>>>>> the existing "major" security modules. The changes reduce some >>>>>> code duplication. >>>>>> Beyond the blob management there's a bit of clean-up. >>>>>> Mounting filesystems had to be changed so that options >>>>>> a security module doesn't recognize won't be considered >>>>>> a fatal error. The mount infrastructure is somewhat >>>>>> more complex than one might assume. >>>>> Casey, >>>>> Do you think you can break out 1 into its own patch? It seems like >>>>> that'd be valuable to everyone. >>>> Yes, I think that is a good idea. Landlock, S.A.R.A. and a couple >>>> other security modules could be added upstream if this part of the >>>> work was available. It would not provide everything needed to stack >>>> all the existing modules. I believe there is concern that if this >>>> much went upstream the work on finishing what's required to make >>>> everything work might be abandoned. >>>> >>> On the other hand there is concern that those security modules might >>> be abandoned if they have to wait until everything is finished :) >> >> There is some truth to that. If we can get commitment from the developers >> of those security module to push for getting upstream, a statement of >> intent to support additional modules (e.g. Landlock, S.A.R.A.) from a I'm the developer of S.A.R.A. I'm working on it in my free time, that is not so much, but I can confirm that my goal is to get it upstream as soon as possible. Not that I want to rush anyone. >> significant distribution (e.g. Fedora, Ubuntu, SuSE) and ACKs from the >> maintainers of the existing modules we should be able to breeze right in. >> >> Yeah, I think that's about all it would take. > > I would strongly recommend Landlock and SARA for every distro. They're > opt-in, and provide much-needed missing userspace defenses (and attack > surface reduction). Thank you very much for your support! Salvatore