Dear All,
   I am a student enrolled google summer code 2007. My job is to write
security regression testsuites for FreeBSD under the guidance of my mentor
Dr. Robert Watson. Under his encourage, I write following request for comments
RFC :-) 
//////////////////////////////////////////////////////////////
   What I plan to do:
1) to test the stability of Mandatory Access Control and Audit Subsystem
for FreeBSD and TrustedBSD.
Backgroud: 
  a) there are many other modules in FreeBSD such as PF、IPFW and 
IPSec and VIMAGE have had ignored the existance of Mandatory Access Control, 
they
generate mbuf without a tag for Mandatory Access Control. Many of these has been
corrected.
  b) The audit subsystem's handling of auditing disk full is wrong in locking
vnodes

2) to test the correct enforement of various of access control (Mandatory 
Access Control,
ACL, and priviledges in jail).
Goal:
   To prevent the access right violation of the designer's intension

3) the consistency between the Mandatory Access Control Label generated by 
userland 
application and the label kernel actually handles.


4) to test the various of Firewalls and IPSec

///////////////////////////////////////////////////////////////
   What I have done:
1) investigate the Linux Test Project, especially for SeLinux
2) investigate the stress2 package for FreeBSD
3) summary the reason and the settlement of the confliction between Mandatory 
Access Control 
and PF, IPFW, IPSEC and VIMAGE
4) write a pair of pseudo ethernet pairs following the idea of another Socer 
Dr. Nanjun Li and
Oreilly's <Linux Device Driver>, so that the network tests can be done in a 
single machine

///////////////////////////////////////////////////////////////
   Where I am still confused:
1) Which area and direction should I focus. The security subsystem in FreeBSD 
is large, which
area deserves a testsuite in higher priority.
2) The general structure of the testsuite:
Will it be a userland application package like stress2, or include a kernel 
module cooperation
(like security/mac_test)
3) How to write a testsuite that will prevent the furthor violation of security 
instead of test
the cases which are already corrected.
PF、IPFW and IPSec have already corrected their confliction with Mandatory 
Access Control, I think
the testcases for the already corrected problems will not discover the newly 
generated problems,
for example: 
test case  for the PF's synproxy state rule only verify PF have correctly add a 
correct tag for Mandatory 
access control in function pf_send_tcp, how we discover a problem which may 
create in the future 
by means of create a mbuf without a correct tag for Mandatory access control in 
a new function?

///////////////////////////////////////////////////////////////////

Finally 
I owe greatly thanks for
various kind of suggestions not limited to above

Sincerely yours
Zhouyi Zhou
Insitute of Software
Chinese Academy of Sciences
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to