Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp385095imm; Sat, 1 Sep 2018 06:06:45 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZbVUvIc1KT67t8jDspN3rXvDBDxR+WO81Dw+Z7sko9UKQ9ZPuLFVOd95+XvyuUdBZO98un X-Received: by 2002:a17:902:27a8:: with SMTP id d37-v6mr19958891plb.290.1535807205380; Sat, 01 Sep 2018 06:06:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535807205; cv=none; d=google.com; s=arc-20160816; b=S63JL/Negl3Snw5dgezXuJgTXR0m9bfh7lFR/6imJKbv5XvKnpOMecBmH7yqbuwIg9 RR58oazOE2ijKnY26eHKpPfW4YG2LiZ/X7UnyDJyBJE9kQjPExML6p+aITKZb1Kj78I9 fx8qt+I9u/4kvhqEOVbjW/sqARQ+74mAVYM1Jvuv7sy7LGWfx3GN4bSJhKmR5aKNfnly j8PMwuCA74hWh6MmGwSW1n+ie367WQb2s9bKBS1zzF35hmee7d0NLXDFm+5RWc1CyUd+ bS5Eedlo1/EabWZBfq48scUZwnProD5LB4jn4PbPkhIRZXtElTUc8M2u8EeneEpcu1kC etvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=mrGJzDovKKcybueb+7M49ryDSMhVfc8wsZbiZ6MdjOo=; b=PaOSXUrKf28aLYn9cKHCbepanQKlHl4b9o0EL30KkIoevz9CKG1ly+J3JgucCUwpGK 48fRRwl4Gqnh6rHY2RdxvdUYfviSzlj08IU8O5k0EQwIf8plnLyNobAYmOqOmpkE63vm 24LjVtm5kXimYSUo4dPKljXQcgwH0jDFmPXjEr2UiqfEb+uRNMGVriBub4/xMgvn3Oy7 +tQtaIVTeLlFvp/EQXFjSc7J10uqbypV5linZScmsmaFkH63doKU8VHpPxbAd3JfhlUV oDGN0cqaaTU43oIerMK1wrRl33dBS5Cc2nQh1XZRyj+NOPqudNUetLEG7azHMXzM6xu9 m9sg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q26-v6si11190181pgl.556.2018.09.01.06.06.24; Sat, 01 Sep 2018 06:06:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727498AbeIARRH (ORCPT + 99 others); Sat, 1 Sep 2018 13:17:07 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:36590 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727159AbeIARRH (ORCPT ); Sat, 1 Sep 2018 13:17:07 -0400 Received: from fsav301.sakura.ne.jp (fsav301.sakura.ne.jp [153.120.85.132]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id w81D508B082553; Sat, 1 Sep 2018 22:05:00 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav301.sakura.ne.jp (F-Secure/fsigk_smtp/530/fsav301.sakura.ne.jp); Sat, 01 Sep 2018 22:05:00 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/530/fsav301.sakura.ne.jp) Received: from [192.168.1.8] (softbank060157066051.bbtec.net [60.157.66.51]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id w81D4ttP082393 (version=TLSv1.2 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 1 Sep 2018 22:05:00 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Subject: Re: [PATCH 0/8] CaitSith LSM module To: John Johansen Cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org References: <201611231531.DGH52135.QtFVOFJLOHFOSM@I-love.SAKURA.ne.jp> <2908442d-90f1-7fa2-24ff-0833f6bd2d95@canonical.com> <201705211359.BBE26079.LSJFOMHFOVQFOt@I-love.SAKURA.ne.jp> <8c6da617-3325-d60d-805f-5e5c1fa322c6@canonical.com> <201705211459.EGB48959.OFVFOSHtFJMLQO@I-love.SAKURA.ne.jp> <201710211959.CEC65165.SQJOLOFVOtFFHM@I-love.SAKURA.ne.jp> <7cab86a5-e115-0905-4d72-8cae7f6540b9@schaufler-ca.com> From: Tetsuo Handa Message-ID: Date: Sat, 1 Sep 2018 22:04:54 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <7cab86a5-e115-0905-4d72-8cae7f6540b9@schaufler-ca.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2017/10/22 2:17, Casey Schaufler wrote: >> As one year elapsed since I proposed CaitSith for upstream, I'd like to >> hear the status again. I looked at >> http://schd.ws/hosted_files/lss2017/8b/201709-LinuxSecuritySummit-Stacking.pdf . >> How is ETA for Security Module Stacking? Is it a half year or so? > > Assuming that I can keep working on stacking at my current level, > and that we can work out a couple issues with audit and networking > there is a possibility we're looking at mid 2018 for stacking. The > increased interest in security module namespaces for containers is > helping make stacking seem important to more people. > >> If it is likely take longer, should I resume proposing CaitSith for now >> as one of "Minor modules" except security_module_enable() check added >> until Security Module Stacking work completes? Or should I wait for >> completion of stacking work? I want to know it, for recent proposals are >> rather staying silent. > > I wouldn't wait if it was my project, but I have been known > to be more aggressive than is good for me from time to time. > It seems that stacking needs some more time. Manual with updated patch for current source code is available at https://caitsith.osdn.jp/index2.html . John, if you can resume reviewing, I'd like to propose CaitSith as one of "Minor modules" except security_module_enable() check. Regards.