Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752342AbZLaOIu (ORCPT ); Thu, 31 Dec 2009 09:08:50 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752141AbZLaOIt (ORCPT ); Thu, 31 Dec 2009 09:08:49 -0500 Received: from mail-pw0-f42.google.com ([209.85.160.42]:49675 "EHLO mail-pw0-f42.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752015AbZLaOIr (ORCPT ); Thu, 31 Dec 2009 09:08:47 -0500 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=doyRIJcd//XTyX0GiD6+g0YrBurwUEArAGyDqMEzGdUYQ+55pmYzn6PF7nBlROSPzV po77PPthUXjCfdvZa1MS5qSh38ICNO49hFXMnAllCAabyalyqSJ8HM6xa8nVgLbhdJTa DUQk6XtefBpm74IQg+vNhYfzK+aZ62DZ0GseY= MIME-Version: 1.0 In-Reply-To: References: <551280e50912300652r1007dee0j8de750bf33af9b3c@mail.gmail.com> <20091230183513.GC14493@us.ibm.com> <20091230201712.GA23999@us.ibm.com> <20091230212931.233003b9@lxorguk.ukuu.org.uk> <20091230230042.5d2e78ac@lxorguk.ukuu.org.uk> Date: Fri, 1 Jan 2010 00:08:44 +1000 Message-ID: Subject: Re: [RFC][PATCH v3] Unprivileged: Disable raising of privileges From: Peter Dolding To: Samir Bellabes Cc: Alan Cox , "Eric W. Biederman" , "Serge E. Hallyn" , "Andrew G. Morgan" , Bryan Donlan , Benny Amorsen , Michael Stone , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Herbert Xu , Valdis Kletnieks , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?ISO-8859-1?Q?Am=E9rico_Wang?= , Tetsuo Handa , Casey Schaufler , Pavel Machek , Al Viro Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1596 Lines: 40 On Thu, Dec 31, 2009 at 11:00 PM, Samir Bellabes wrote: > Alan Cox writes: > >> Well to be fair its random regurgitated security idea of every year or >> two. > > true, last year the same kind of discussion occurs with the 'personal > firewall' aka a network MAC. > http://marc.info/?t=123247387500003&r=3&w=2 > http://marc.info/?t=123187029200001&r=2&w=2 Lets step back for a moment. What is the common issue with both. The issue is simple. "How to I generically tell the secuirty system want particular restrictions." There is no generic LSM API for application or users to talk to the LSM and say I want the following restricted. Of course the restrictions have to be tighter than what the profiles already say. To control the LSM the applications are expected to know what the LSM. This has caused items like chrome major issues. Also by providing a generic LSM API there would be a base set of requirements for a LSM to provide to meet the requirements of the generic interfaces. Basically until a generic interface to talk to LSM module is provided these requests are going to keep coming. Maybe assign secuirty ops string values that applications can say disable the following secuirty operations from me. Application does not need to be informed what is disabled from it. Peter Dolding -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/