Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp4554006imm; Mon, 17 Sep 2018 16:26:01 -0700 (PDT) X-Google-Smtp-Source: ANB0Vdax+aHIsOLTLcusElFN92JU4LUZ/RKk9dCcTwT1vUP4zgBTubpbKUzRcqg/l9uZEptziJ3R X-Received: by 2002:a17:902:d917:: with SMTP id c23-v6mr26695622plz.65.1537226761735; Mon, 17 Sep 2018 16:26:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537226761; cv=none; d=google.com; s=arc-20160816; b=De0e5mSZbn2vTElUj2WnFd92uF4xUuu+XroNeoMgT5sEPOeKKfrRTbdUtKkwqQikXt aE4WnSjHkd5jdOR96Zf/Sf/Bd99+NTkcuiMGSvdzHqoNFHbgoA8ufoVA+kCyHNc0fkbB WB5/zhBcAFiTiqOQbXOB/qvVcG5J3REPTS8Af5upEP622308f18t2HisretyQDfAIzuX MtiGCDHYF7vMHzeTDpv2JGkqXiScpmqgu2vQJ0s66kBIEJH7CLLOyebKC2Tjp7G+jDbb eHIei15tKmiZEIuvCsx3pAjmBwqNAP9VxD9edOSTWnrNN5ZVuVJXPKRqq5lzICV1RE61 WayQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=Qs2IP/vQi7UQX8tEFg1N2YXBvZuT6EhRTgksqHi2IG8=; b=mrS2xOfXohguUO/ATscGcsCPOoDcu+IUHH17r278WFEXJeKpFFo+2qmA3zbrmAqJL9 O1WrPF4f76gxazMUuJWEJ6fSDDsyTI4N7hn/MjNFG3kIbhEF04GO/LdL0boTkogi6LBL e8nFmFKa8xIv/76BktZSVC61m39OpUteWBftDFNdGwY6DgbMBR37EI855T3z+meOP11l 1mXTWWVJwjr+zq5o5PEnWCGfZtHR4Y7oMFWTAHWjuxjZA/pvQShhY1SwT5mFouvye8EV P8AwWaprSE+wirwg2J0GyDpas/S2Pq9+485iJ8EmNAXwkEEx1niilqBrbrWdNZdDpkzZ AK2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yahoo.com header.s=s2048 header.b=cK3nEdC6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id be5-v6si16837742plb.67.2018.09.17.16.25.46; Mon, 17 Sep 2018 16:26:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@yahoo.com header.s=s2048 header.b=cK3nEdC6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728689AbeIREzR (ORCPT + 99 others); Tue, 18 Sep 2018 00:55:17 -0400 Received: from sonic304-18.consmr.mail.bf2.yahoo.com ([74.6.128.41]:42219 "EHLO sonic304-18.consmr.mail.bf2.yahoo.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728387AbeIREzQ (ORCPT ); Tue, 18 Sep 2018 00:55:16 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1537226740; bh=Qs2IP/vQi7UQX8tEFg1N2YXBvZuT6EhRTgksqHi2IG8=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From:Subject; b=cK3nEdC6DMxt5OI3DxqwqZtHDv6XBUtDCXZS+lBOhDCKZi9QH4vO8DFRnqsiDODrQI4gYAZyNrs+3Pt6xgBj1A9fhJSD2glFW4jTBaN0tE/m91ASEah6hcpL2WwggOT5TYtiAHQionaRQudvL7DIFtJjqhnGAfLBBcdFpMNyfVu1ZYhFg8fV0zUuihLdb/LPy1J+YJm+AcMI9AL1gAjZwWpjiitKWWv5N6X4/Qss8OtBUgrHDP4j1tZOl+j2QDm8huqiy78Co/wQrDRJ5I1g/yNtkT2+VlujdzpznVHlMAaHweK06/77YQuTq4R78l3ZpbS0dot2HOeuqEWmQctBmg== X-YMail-OSG: KuQ8mv4VM1k7BAodMIV1cJAfrw7ppfbg4yxIXiNGSCs.j3mP4k10ZbR6CiaWfZ7 gS5BdTA1xZ6qrH_jzEWyc8kKcoMijsDPZxe4pKvPhaOpRKwFsU.zpeHqQYrbdOu1wxQkBR3Uv_D_ HzDQa.6ynpHWuZ2leOi3XbplbPEETik.ZTkgyTm82dRrM0D2GRGgsR8D4NK_8ElJBsluVajsF7l0 5jmSNK1LDddptCQg2nj9JOM56bH6OKwhzhyrwvjSYR4SwSVlTUstyjOE5madGyk49ckpre1jVqa. itWEPXF7teUTE_ZWUR1m32S7UIahl3Jqgyt9K1iAk435RwL9hprxhkW2h7xIU0fFs5DORK3zRXyL Nchf9QE.jz6CHdtJwK_WncFCcMvMJ0_q0SqykW1Xfvc8fthvdehlMDJoPmvUzJWNHu39bXS3o4Mp zhpZ.b1s.B.uy7MkCD_H5RTkfwCeECAG5vud.rc3OQ0RgeyyT1f.yn1ai1X5Gbx6fLNlD.zhyYAM G.u3yWLOOgvjYQ2C0ELhiRtr6HPcVemtEKol6kDs7WBgvx8Xc7ko3AcTqPkyPbWCsfzXyhKGYVhg OCXKdfDpUOfkPuC1HljvcPXLnCxB9sRRmPxJvoo_lPi748DRnuW4BOKXc_kdABB3AEXwlMpgDv5V 0Ot39ioxVY4t5JedRNYRP.6.Z1atOENmMt4Mt7uYCXfWe1wlyKsxhZXMUAuY5njXrizRRgBVXZP5 RxkRAif1F0W5BvQYA8yFFSQEgNKB6aQC8eJQA9KejQIa4sEFQhM_Bl3MXytHTLl2bROaa13b4XvM pgov4REMr3bn9NwwL.Y8NiUZGCxyALF020A3JAKh4ULh4QcrAcKqHrKfGLV252OkXmoEeOb6pAf2 7W17aeAJI4ZDqvJ9sKpobHF.IxHqqlUyQGgatxEgNwKjYI4Qzqmr4GEeDgC85EjBzSfzjo4CvMlu U0kPtHula8RxDJQkU6KcYmnmRSwmG8_IrcVu4t5mPypvyJJqcrYgxJr2fbbTo9OCg.zBGLdyStk2 niwn1p72mJSHWbCGA Received: from sonic.gate.mail.ne1.yahoo.com by sonic304.consmr.mail.bf2.yahoo.com with HTTP; Mon, 17 Sep 2018 23:25:40 +0000 Received: from c-67-169-65-224.hsd1.ca.comcast.net (EHLO [192.168.0.102]) ([67.169.65.224]) by smtp411.mail.bf1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID af76c28a3e504afe1c321d7484acae76; Mon, 17 Sep 2018 23:25:38 +0000 (UTC) Subject: Re: [PATCH 16/18] LSM: Allow arbitrary LSM ordering To: John Johansen , Kees Cook Cc: James Morris , Tetsuo Handa , Paul Moore , Stephen Smalley , "Schaufler, Casey" , LSM , LKLM References: <20180916003059.1046-1-keescook@chromium.org> <20180916003059.1046-17-keescook@chromium.org> <84e1a5a8-8997-829f-cf09-1d29895a3f99@schaufler-ca.com> <35b0af5b-e37e-e192-73b5-0d0b37d9e37f@schaufler-ca.com> <8f0bd39b-29a6-325d-4558-d9f484249c22@schaufler-ca.com> <53377892-695f-6336-8574-54c7aa0a4201@schaufler-ca.com> <7ecfffc3-d2a4-3ff7-4bf5-db3029d73c59@canonical.com> From: Casey Schaufler Message-ID: <32938bc9-1bb7-f857-e264-30bb6400fc31@schaufler-ca.com> Date: Mon, 17 Sep 2018 16:25:34 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/17/2018 3:36 PM, John Johansen wrote: > On 09/17/2018 02:57 PM, Casey Schaufler wrote: >> On 9/17/2018 12:55 PM, John Johansen wrote: >>> On 09/17/2018 12:23 PM, Casey Schaufler wrote: >>>> On 9/17/2018 11:14 AM, Kees Cook wrote: >>>>>> Keep security=$lsm with the existing exclusive behavior. >>>>>> Add lsm=$lsm1,...,$lsmN which requires a full list of modules >>>>>> >>>>>> If you want to be fancy (I don't!) you could add >>>>>> >>>>>> lsm.add=$lsm1,...,$lsmN which adds the modules to the stack >>>>>> lsm.delete=$lsm1,...,$lsmN which deletes modules from the stack >>>>> We've got two issues: ordering and enablement. It's been strongly >>>>> suggested that we should move away from per-LSM enable/disable flags >>>>> (to which I agree). >>>> I also agree. There are way too many ways to turn off some LSMs. >>>> >>> I wont disagree, but its largely because we didn't have this discussion >>> when we should have. >> True that. >> >> >>>>> If ordering should be separate from enablement (to >>>>> avoid the "booted kernel with new LSM built in, but my lsm="..." line >>>>> didn't include it so it's disabled case), then I think we need to >>>>> split the logic (otherwise we just reinvented "security=" with similar >>>>> problems). >>>> We could reduce the problem by declaring that LSM ordering is >>>> not something you can specify on the boot line. I can see value >>>> in specifying it when you build the kernel, but your circumstances >>>> would have to be pretty strange to change it at boot time. >>>> >>> if there is LSM ordering the getting >>> >>> lsm=B,A,C >>> >>> is not the behavior I would expect from specifying >>> >>> lsm=A,B,C >> Right. You'd expect that they'd be used in the order specified. >> > and yet you argue for something different ;) A foolish consistency is the hobgoblin of little minds. Or, more to the point in this case, I don't see a way to accomplish the ends well, so I'm casting about for something that no one hates too badly. >>>>> Should "lsm=" allow arbitrary ordering? (I think yes.) >>>> I say no. Assume you can specify it at build time. When would >>>> you want to change the order? Why would you? >>>> >>> because maybe you care about the denial message from one LSM more than >>> you do from another. Since stacking is bail on first fail the order >>> could be important from an auditing POV >> I understand that a distribution would want to specify the order >> for support purposes and that a developer would want to specify >> the order to ensure reproducible behavior. But they are going to >> be controlling their kernel builds. I'm not suggesting that the >> order shouldn't be capable of build time specification. What I >> don't see is a reason to rearrange it at boot time. >> > Because not all users have the same priority as the distro. It can > also aid in debugging and testing of LSMs in a stacked situation. My assumption is that specifying the LSM order on the boot line by hand is going to be pretty rare. So it doesn't have to be easy, it just needs to be sane. > ... >>>>> becomes >>>>> >>>>> capability,smack,yama,integrity >>>>> >>>>> and >>>>> >>>>> CONFIG_SECURITY_LOADPIN_DEFAULT_ENABLED=n >>>>> selinux.enable=0 lsm.add=loadpin lsm.disable=smack,tomoyo lsm=integrity >>>> Do you mean >>>> selinux.enable=0 lsm.enable=loadpin lsm.disable=smack,tomoyo lsm.enable=integrity >>>> selinux.enable=0 lsm.enable=loadpin,integrity lsm.disable=smack,tomoyo >>>> selinux.enable=0 lsm.enable=loadpin lsm.enable=integrity lsm.disable=smack lsm.disable=tomoyo >>>> >>>>> becomes >>>>> >>>>> capability,integrity,yama,loadpin,apparmor >>>>> >>>>> >>>>> If "lsm=" _does_ imply enablement, then how does it interact with >>>>> per-LSM disabling? i.e. what does "apparmor.enabled=0 >>>>> lsm=yama,apparmor" mean? If it means "turn on apparmor" how do I turn >>>>> on a CONFIG-default-off LSM without specifying all the other LSMs too? >>>> There should either be one option "lsm=", which is an explicit list or >>>> two, "lsm.enable=" and "lsm.disable", which modify the built in default. >>>> >>> maybe but this breaks with current behavior as their is a mismatch between >>> how the major lsms do selection/enablement and the minor ones. >> Which is why you have to continue supporting "security=". >> > I would argue that switching to lsm= isn't exactly a fix either as we have > the whole minor lsm problem that we are currently debating. I'm finding it hard to argue for "lsm=" because it's too clumsy. >>> I personally would prefer >>> >>> lsm= >>> >>> but that breaks how the minor lsms are currently enable >> I don't know if I'd say "breaks", but it would require change. >> > depends how you look at it. Its a change to how its interacted with but so > is switching to lsm= > > or making the minor module kconfig automatically add the current minor > lsms to a default lsm selection list, and making $lsm.disable behave > like apparmor or selinux=0. > > we got it wrong early on, so now we have to live with something not > as clean as it could have been It's not the first time and won't be the last.   >>> ... >> The rules for modification are pretty obvious. The downside is, as >> you point out, that they don't address ordering. Maybe we address that >> directly: >> >> lsm.order=*,tomoyo >> >> TOMOYO should be last. >> >> lsm.order=apparmor,* >> >> AppArmor should be first. >> >> >> lsm.order=*,sara,selinux,* >> >> SELinux should come directly after SARA but we otherwise don't care. >> >> lsm.order=smack,*,landlock,* >> >> Smack should be first and LandLock should come sometime later. >> >> lsm.order=*,yama,* >> >> Is meaningless. >> >> Modules not listed may go anywhere there is a "*" in the order. >> An lsm.order= without a "*" is an error, and ignored. >> If a module is specified in lsm.order but not built in it is ignored. >> If a module is specified but disabled it is ignored. >> The capability module goes first regardless. >> > I don't mind using lsm.order if we must but really do not like the '*' > idea. It makes this way more complicated than it needs to be We could arbitrarily say that anything unspecified goes after what shows up in lsm.order (like lsm.order=yama,smack,* )