Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp152105imm; Thu, 11 Oct 2018 17:27:42 -0700 (PDT) X-Google-Smtp-Source: ACcGV62+4/t6FkKCEByKv5ySXS0C8D4Q8KOwSRC5zv/mvJIKcdk9ulIN9wGFIHuU6kNjOJ2tLg1w X-Received: by 2002:a17:902:64c2:: with SMTP id y2-v6mr3615376pli.35.1539304061954; Thu, 11 Oct 2018 17:27:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539304061; cv=none; d=google.com; s=arc-20160816; b=ntAS/vFRS98F1hsXCVT51XwdmgNGXPJ888cKeBfoztomyXhc3uPiq5UCO9vx2XBE80 wWUxalx7vAc3pDhkEzCu6y27NFLqve7v/tDCAq+/RDmLPy/v5AUxB6UBeGe0JxCLU2P6 led6O/o8wvETtMDOEkoAiZ4EYmE34bxjaho1qhi4HjBmr7vooykrGSwybYOO/5y7AMQA kXW4ee8/u20T5NGlGih0VesDBBNELq+EBugP6XurmRTUc2AGhtppvwnrc5huhB65PPxL CEA/g+b4rhi2JFxhtbwkO5O3crCQbU3w8ky/d4tq6eBTy4vvXtpwplunN565W8rTdBbK UV2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:autocrypt:openpgp:from:references:cc:to :subject; bh=ICRymXL3cKyK0kNkYxy1QXVl59IybGJadDlAhPOUwGo=; b=vY9hrzeesboYsc0Tv2LXDPbqqfDDR8kfpeXMgF9xnwwcmRRKz/Xba1gDPIe8dSXOn8 Jrx1mx0b1YSN1dS3gSd4WLKtCh5DtoPJm3UApSQJOj3AhyiUn2xa4MxaX2UAskQwbQoU kYKe6XWTd98rH835b1hfctJiY4o8d0aVX44ppEgTpNuZUTcNbFy04xFCPNMi0ZwmJ0aR o5xmDIFrhXazRF/tmVOCk8hJLSnDYzJtVCyr+ICiX5Op5kRYzfc1dNCAHuhWt4xzVPX0 fJJNGM26Mbpn5ly2EiemSP60lz8uAkuIQzIX9Ov1JR+PDuZEhyR48J6+KkyG18x2gndG qBSg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s17-v6si29073099plq.339.2018.10.11.17.27.16; Thu, 11 Oct 2018 17:27:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727330AbeJLH4Z (ORCPT + 99 others); Fri, 12 Oct 2018 03:56:25 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:59182 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725913AbeJLH4Z (ORCPT ); Fri, 12 Oct 2018 03:56:25 -0400 Received: from static-50-53-48-205.bvtn.or.frontiernet.net ([50.53.48.205] helo=[192.168.192.153]) by youngberry.canonical.com with esmtpsa (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1gAlHs-0005ru-OV; Fri, 12 Oct 2018 00:26:40 +0000 Subject: Re: [PATCH security-next v5 00/30] LSM: Explict ordering To: Jordan Glover , Kees Cook Cc: James Morris , Casey Schaufler , Stephen Smalley , Paul Moore , Tetsuo Handa , Mimi Zohar , Randy Dunlap , LSM , "open list:DOCUMENTATION" , linux-arch , LKML References: <20181011001846.30964-1-keescook@chromium.org> <37rRa7F7i2XcwVPiT6gLC8cX8p0732iDiT6mGjstlbBi3mcJsQCLA6A8HcDMNjR0SGheErloJl8z-Z5c57XxtJRBF9-LO_fUTUf41EcAGC4=@protonmail.ch> From: John Johansen Openpgp: preference=signencrypt Autocrypt: addr=john.johansen@canonical.com; prefer-encrypt=mutual; keydata= xsFNBE5mrPoBEADAk19PsgVgBKkImmR2isPQ6o7KJhTTKjJdwVbkWSnNn+o6Up5knKP1f49E BQlceWg1yp/NwbR8ad+eSEO/uma/K+PqWvBptKC9SWD97FG4uB4/caomLEU97sLQMtnvGWdx rxVRGM4anzWYMgzz5TZmIiVTZ43Ou5VpaS1Vz1ZSxP3h/xKNZr/TcW5WQai8u3PWVnbkjhSZ PHv1BghN69qxEPomrJBm1gmtx3ZiVmFXluwTmTgJOkpFol7nbJ0ilnYHrA7SX3CtR1upeUpM a/WIanVO96WdTjHHIa43fbhmQube4txS3FcQLOJVqQsx6lE9B7qAppm9hQ10qPWwdfPy/+0W 6AWtNu5ASiGVCInWzl2HBqYd/Zll93zUq+NIoCn8sDAM9iH+wtaGDcJywIGIn+edKNtK72AM gChTg/j1ZoWH6ZeWPjuUfubVzZto1FMoGJ/SF4MmdQG1iQNtf4sFZbEgXuy9cGi2bomF0zvy BJSANpxlKNBDYKzN6Kz09HUAkjlFMNgomL/cjqgABtAx59L+dVIZfaF281pIcUZzwvh5+JoG eOW5uBSMbE7L38nszooykIJ5XrAchkJxNfz7k+FnQeKEkNzEd2LWc3QF4BQZYRT6PHHga3Rg ykW5+1wTMqJILdmtaPbXrF3FvnV0LRPcv4xKx7B3fGm7ygdoowARAQABzR1Kb2huIEpvaGFu c2VuIDxqb2huQGpqbXgubmV0PsLBegQTAQoAJAIbAwULCQgHAwUVCgkICwUWAgMBAAIeAQIX gAUCTo0YVwIZAQAKCRAFLzZwGNXD2LxJD/9TJZCpwlncTgYeraEMeDfkWv8c1IsM1j0AmE4V tL+fE780ZVP9gkjgkdYSxt7ecETPTKMaZSisrl1RwqU0oogXdXQSpxrGH01icu/2n0jcYSqY KggPxy78BGs2LZq4XPfJTZmHZGnXGq/eDr/mSnj0aavBJmMZ6jbiPz6yHtBYPZ9fdo8btczw P41YeWoIu26/8II6f0Xm3VC5oAa8v7Rd+RWZa8TMwlhzHExxel3jtI7IzzOsnmE9/8Dm0ARD 5iTLCXwR1cwI/J9BF/S1Xv8PN1huT3ItCNdatgp8zqoJkgPVjmvyL64Q3fEkYbfHOWsaba9/ kAVtBNz9RTFh7IHDfECVaToujBd7BtPqr+qIjWFadJD3I5eLCVJvVrrolrCATlFtN3YkQs6J n1AiIVIU3bHR8Gjevgz5Ll6SCGHgRrkyRpnSYaU/uLgn37N6AYxi/QAL+by3CyEFLjzWAEvy Q8bq3Iucn7JEbhS/J//dUqLoeUf8tsGi00zmrITZYeFYARhQMtsfizIrVDtz1iPf/ZMp5gRB niyjpXn131cm3M3gv6HrQsAGnn8AJru8GDi5XJYIco/1+x/qEiN2nClaAOpbhzN2eUvPDY5W 0q3bA/Zp2mfG52vbRI+tQ0Br1Hd/vsntUHO903mMZep2NzN3BZ5qEvPvG4rW5Zq2DpybWc7B TQROZqz6ARAAoqw6kkBhWyM1fvgamAVjeZ6nKEfnRWbkC94L1EsJLup3Wb2X0ABNOHSkbSD4 pAuC2tKF/EGBt5CP7QdVKRGcQzAd6b2c1Idy9RLw6w4gi+nn/d1Pm1kkYhkSi5zWaIg0m5RQ Uk+El8zkf5tcE/1N0Z5OK2JhjwFu5bX0a0l4cFGWVQEciVMDKRtxMjEtk3SxFalm6ZdQ2pp2 822clnq4zZ9mWu1d2waxiz+b5Ia4weDYa7n41URcBEUbJAgnicJkJtCTwyIxIW2KnVyOrjvk QzIBvaP0FdP2vvZoPMdlCIzOlIkPLgxE0IWueTXeBJhNs01pb8bLqmTIMlu4LvBELA/veiaj j5s8y542H/aHsfBf4MQUhHxO/BZV7h06KSUfIaY7OgAgKuGNB3UiaIUS5+a9gnEOQLDxKRy/ a7Q1v9S+Nvx+7j8iH3jkQJhxT6ZBhZGRx0gkH3T+F0nNDm5NaJUsaswgJrqFZkUGd2Mrm1qn KwXiAt8SIcENdq33R0KKKRC80Xgwj8Jn30vXLSG+NO1GH0UMcAxMwy/pvk6LU5JGjZR73J5U LVhH4MLbDggD3mPaiG8+fotTrJUPqqhg9hyUEPpYG7sqt74Xn79+CEZcjLHzyl6vAFE2W0kx lLtQtUZUHO36afFv8qGpO3ZqPvjBUuatXF6tvUQCwf3H6XMAEQEAAcLBXwQYAQoACQUCTmas +gIbDAAKCRAFLzZwGNXD2D/XD/0ddM/4ai1b+Tl1jznKajX3kG+MeEYeI4f40vco3rOLrnRG FOcbyyfVF69MKepie4OwoI1jcTU0ADecnbWnDNHpr0SczxBMro3bnrLhsmvjunTYIvssBZtB 4aVJjuLILPUlnhFqa7fbVq0ZQjbiV/rt2jBENdm9pbJZ6GjnpYIcAbPCCa/ffL4/SQRSYHXo hGiiS4y5jBTmK5ltfewLOw02fkexH+IJFrrGBXDSg6n2Sgxnn++NF34fXcm9piaw3mKsICm+ 0hdNh4afGZ6IWV8PG2teooVDp4dYih++xX/XS8zBCc1O9w4nzlP2gKzlqSWbhiWpifRJBFa4 WtAeJTdXYd37j/BI4RWWhnyw7aAPNGj33ytGHNUf6Ro2/jtj4tF1y/QFXqjJG/wGjpdtRfbt UjqLHIsvfPNNJq/958p74ndACidlWSHzj+Op26KpbFnmwNO0psiUsnhvHFwPO/vAbl3RsR5+ 0Ro+hvs2cEmQuv9r/bDlCfpzp2t3cK+rhxUqisOx8DZfz1BnkaoCRFbvvvk+7L/fomPntGPk qJciYE8TGHkZw1hOku+4OoM2GB5nEDlj+2TF/jLQ+EipX9PkPJYvxfRlC6dK8PKKfX9KdfmA IcgHfnV1jSn+8yH2djBPtKiqW0J69aIsyx7iV/03paPCjJh7Xq9vAzydN5U/UA== Organization: Canonical Message-ID: <1a8ac9f4-8f82-5d3b-46ef-08801793443e@canonical.com> Date: Thu, 11 Oct 2018 17:26:35 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <37rRa7F7i2XcwVPiT6gLC8cX8p0732iDiT6mGjstlbBi3mcJsQCLA6A8HcDMNjR0SGheErloJl8z-Z5c57XxtJRBF9-LO_fUTUf41EcAGC4=@protonmail.ch> Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/11/2018 04:53 PM, Jordan Glover wrote: > ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ > On Friday, October 12, 2018 1:09 AM, Kees Cook wrote: > >> We've had things sort of like this proposed, but if you can convince >> James and others, I'm all for it. I think the standing objection from >> James and John about this is that the results of booting with >> "lsm=something" ends up depending on CONFIG_LSM= for that distro. So >> you end up with different behaviors instead of a consistent behavior >> across all distros. >> > > Ok, I'll try :) > > The final lsm string contains two parts: Kconfig "CONFIG_LSM=" and boot > param "lsm=". Changing even only one of those parts also changes the > final string. > > In case of distros, it's the "CONFIG_LSM=" which changes. Even when "lsm=" > stays constant, the behavior will be different, example: > > Distro A has: CONFIG_LSM=loadpin,integrity,selinux > Distro B has CONFIG_LSM=yama,loadpin,integrity,selinux > > User on distro A wants to enable apparmor with: > > lsm=loadpin,integrity,apparmor > > which they do and add it to howto on wiki. > > User on distro B want to enable apparmor, they found info on some wiki and do: > > lsm=loadpin,integrity,apparmor > > > Puff, yama got disabled! > > Above example shows why I think "consistent behavior across all distros" > argument for current approach is flawed - because distros aren't > consistent. In my proposition the user will just use "lsm=apparmor" and > it will consistently enable apparmor on all distros which is what they > really wanted, but all pre-existing differences across distros will > remain unchanged. Are you sure about that? I have had more than one question about security=X resulting in a system with more than just X enabled. Ie why is yama enabled when I specifically set security to X. There will certainly be cases where what you describe is exactly what the user wants. The problem is an explosion of options isn't good for the user either. What I want at the moment is the discussion about different ways to enable LSMs to be split off so this work can move forward. > > The current approach requires that everyone who dares to touch "lsm=" > knows about existence of all lsm, their enabled/disabled status on > target distro and their order. I doubt there are many people other > than recipients of this mail who fit for the above. > Without having gotten a chance to review the current set of patches that was not what was discussed, it should only requires they know the set that they want. It is possible some of the LSMs in the list are not available for a given kernel, but that is a problem with even the additive approach. That is lsm=+apparmor will not add apparmor to the set of LSMs available at run time if apparmor has not been built into the kernel. > I it's better to assume that average user has rather vague knowledge > about lsm and don't delve deep into Kconfig's of their chosen distro. > If they want to use "lsm=" their goal is to disable/enable on or more > things. My proposition will work better for those. More advanced users > still will may pass any "lsm=" string as they like, this having full > control. > > Jordan >