Re: Security patches

2004-01-03 Thread Russell Coker
On Sun, 4 Jan 2004 07:53, martin f krafft <[EMAIL PROTECTED]> wrote: > also sprach Russell Coker <[EMAIL PROTECTED]> [2003.12.19.0229 +0100]: > > In terms of LSM protection against this, if you use SE Linux then > > all aspects of file access and module loading are controlled by > > the policy. I

Re: Security patches

2004-01-03 Thread Russell Coker
On Sun, 4 Jan 2004 07:53, martin f krafft <[EMAIL PROTECTED]> wrote: > also sprach Russell Coker <[EMAIL PROTECTED]> [2003.12.19.0229 +0100]: > > In terms of LSM protection against this, if you use SE Linux then > > all aspects of file access and module loading are controlled by > > the policy. I

Re: Security patches

2004-01-03 Thread martin f krafft
Please excuse the delayed response... better ever than never... Thanks for all comments so far, while LSM/SELinux has been losing points with me for a while, it is now on the upswing again... A couple of comments or questions follow: also sprach Henrique de Moraes Holschuh <[EMAIL PROTECTED]> [20

Re: Security patches

2004-01-03 Thread martin f krafft
Please excuse the delayed response... better ever than never... Thanks for all comments so far, while LSM/SELinux has been losing points with me for a while, it is now on the upswing again... A couple of comments or questions follow: also sprach Henrique de Moraes Holschuh <[EMAIL PROTECTED]> [20

Re: Security patches

2003-12-19 Thread Russell Coker
On Fri, 19 Dec 2003 20:18, Henrique de Moraes Holschuh <[EMAIL PROTECTED]> wrote: > On Fri, 19 Dec 2003, Russell Coker wrote: > > In terms of LSM protection against this, if you use SE Linux then all > > aspects of file access and module loading are controlled by the policy. > > I am going to wri

Re: Security patches

2003-12-19 Thread Russell Coker
On Fri, 19 Dec 2003 20:18, Henrique de Moraes Holschuh <[EMAIL PROTECTED]> wrote: > On Fri, 19 Dec 2003, Russell Coker wrote: > > In terms of LSM protection against this, if you use SE Linux then all > > aspects of file access and module loading are controlled by the policy. > > I am going to writ

Re: Security patches

2003-12-19 Thread Henrique de Moraes Holschuh
On Fri, 19 Dec 2003, Russell Coker wrote: > In terms of LSM protection against this, if you use SE Linux then all aspects > of file access and module loading are controlled by the policy. I am going > to write a policy that implements something similar to BSD secure levels so > that you can put

Re: Security patches

2003-12-19 Thread Henrique de Moraes Holschuh
On Fri, 19 Dec 2003, Russell Coker wrote: > In terms of LSM protection against this, if you use SE Linux then all aspects > of file access and module loading are controlled by the policy. I am going > to write a policy that implements something similar to BSD secure levels so > that you can put

Re: Security patches

2003-12-18 Thread Russell Coker
On Fri, 19 Dec 2003 08:02, martin f krafft <[EMAIL PROTECTED]> wrote: > I would be very interested, Russel, to hear your opinion about the > claim that the LSM hooks are dangerous in terms of root kit > exploits. Do you agree? If not, then please tell us what LSM > precautions take care to prevent

Re: Security patches

2003-12-18 Thread Russell Coker
On Fri, 19 Dec 2003 08:02, martin f krafft <[EMAIL PROTECTED]> wrote: > I would be very interested, Russel, to hear your opinion about the > claim that the LSM hooks are dangerous in terms of root kit > exploits. Do you agree? If not, then please tell us what LSM > precautions take care to prevent

Re: Security patches

2003-12-18 Thread Henrique de Moraes Holschuh
On Thu, 18 Dec 2003, martin f krafft wrote: > I would be very interested, Russel, to hear your opinion about the > claim that the LSM hooks are dangerous in terms of root kit > exploits. Do you agree? If not, then please tell us what LSM > precautions take care to prevent that. Given the patch-the

Re: Security patches

2003-12-18 Thread martin f krafft
also sprach Russell Coker <[EMAIL PROTECTED]> [2003.11.30.1324 +0100]: > LSM was not invented by the SE Linux people, it was requested by > Linus as a way of enabling the integration of multiple security > systems into the kernel. It's a pity that the developers of other > security systems didn't

Re: Security patches

2003-12-18 Thread Henrique de Moraes Holschuh
On Thu, 18 Dec 2003, martin f krafft wrote: > I would be very interested, Russel, to hear your opinion about the > claim that the LSM hooks are dangerous in terms of root kit > exploits. Do you agree? If not, then please tell us what LSM > precautions take care to prevent that. Given the patch-the

Re: Security patches

2003-12-18 Thread martin f krafft
also sprach Russell Coker <[EMAIL PROTECTED]> [2003.11.30.1324 +0100]: > LSM was not invented by the SE Linux people, it was requested by > Linus as a way of enabling the integration of multiple security > systems into the kernel. It's a pity that the developers of other > security systems didn't

Re: Security patches

2003-12-01 Thread Amon Ott
On Montag, 1. Dezember 2003 15:56, Colin Walters wrote: > On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > > > - It needs an extra account ("security officer" with UID 400) which is > > a pretty bad idea IMHO. Since once you are SO (cracked/sniffed > > password etc.), you can alter anything w

Re: Security patches

2003-12-01 Thread Amon Ott
On Samstag, 29. November 2003 11:08, Russell Coker wrote: > On Sat, 29 Nov 2003 20:05, Martin Pitt <[EMAIL PROTECTED]> wrote: > > SELinux only uses LSM which makes it easy to port, but seems > > impractical and even dangerous for real-world use [1][2]. Minor issues > > [1] and [2] are matters of o

Re: Security patches

2003-12-01 Thread Colin Walters
On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > - It needs an extra account ("security officer" with UID 400) which is > a pretty bad idea IMHO. Since once you are SO (cracked/sniffed > password etc.), you can alter anything which seems like a giant > security risk to me. If the password

Re: Security patches

2003-12-01 Thread Amon Ott
On Montag, 1. Dezember 2003 15:56, Colin Walters wrote: > On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > > > - It needs an extra account ("security officer" with UID 400) which is > > a pretty bad idea IMHO. Since once you are SO (cracked/sniffed > > password etc.), you can alter anything w

Re: Security patches

2003-12-01 Thread Amon Ott
On Samstag, 29. November 2003 11:08, Russell Coker wrote: > On Sat, 29 Nov 2003 20:05, Martin Pitt <[EMAIL PROTECTED]> wrote: > > SELinux only uses LSM which makes it easy to port, but seems > > impractical and even dangerous for real-world use [1][2]. Minor issues > > [1] and [2] are matters of o

Re: Security patches

2003-12-01 Thread Colin Walters
On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > - It needs an extra account ("security officer" with UID 400) which is > a pretty bad idea IMHO. Since once you are SO (cracked/sniffed > password etc.), you can alter anything which seems like a giant > security risk to me. If the password

Re: Security patches

2003-12-01 Thread Amon Ott
On Samstag, 29. November 2003 10:05, Martin Pitt wrote: > RSBAC has a lot of nice features and seems pretty well designed, but I > do not use it because of the following: > > - Security policies (ACLs etc.) are altered by calling command line > programs which modify binary files. I don't quite l

Re: Security patches

2003-12-01 Thread Amon Ott
On Samstag, 29. November 2003 10:05, Martin Pitt wrote: > RSBAC has a lot of nice features and seems pretty well designed, but I > do not use it because of the following: > > - Security policies (ACLs etc.) are altered by calling command line > programs which modify binary files. I don't quite l

Re: Security patches

2003-11-30 Thread Russell Coker
On Mon, 1 Dec 2003 07:46, Andreas Barth <[EMAIL PROTECTED]> wrote: > * Russell Coker ([EMAIL PROTECTED]) [031130 21:40]: > > On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > > > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > > > > It's a pity that the devel

Re: Security patches

2003-11-30 Thread Russell Coker
On Mon, 1 Dec 2003 07:46, Andreas Barth <[EMAIL PROTECTED]> wrote: > * Russell Coker ([EMAIL PROTECTED]) [031130 21:40]: > > On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > > > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > > > > It's a pity that the devel

Re: Security patches

2003-11-30 Thread Milan P. Stanic
On Mon, Dec 01, 2003 at 07:23:18AM +1100, Russell Coker wrote: > On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > > > It's a pity that the developers of other security systems didn't get > > > involved, it wo

Re: Security patches

2003-11-30 Thread Andreas Barth
* Russell Coker ([EMAIL PROTECTED]) [031130 21:40]: > On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > > > It's a pity that the developers of other security systems didn't get > > > involved, it would be good

Re: Security patches

2003-11-30 Thread Milan P. Stanic
On Mon, Dec 01, 2003 at 07:23:18AM +1100, Russell Coker wrote: > On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > > > It's a pity that the developers of other security systems didn't get > > > involved, it wo

Re: Security patches

2003-11-30 Thread Russell Coker
On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > > It's a pity that the developers of other security systems didn't get > > involved, it would be good to have a choice of LIDS, HP's system, DTE, > > and others

Re: Security patches

2003-11-30 Thread Andreas Barth
* Russell Coker ([EMAIL PROTECTED]) [031130 21:40]: > On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > > > It's a pity that the developers of other security systems didn't get > > > involved, it would be good

Re: Security patches

2003-11-30 Thread Russell Coker
On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > > It's a pity that the developers of other security systems didn't get > > involved, it would be good to have a choice of LIDS, HP's system, DTE, > > and others

Re: Security patches

2003-11-30 Thread Milan P. Stanic
On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > It's a pity that the developers of other security systems didn't get > involved, it would be good to have a choice of LIDS, HP's system, DTE, and > others in the standard kernel. LIDS uses LSM in 2.5/2.6 kernel series, IIRC.

Re: Security patches

2003-11-30 Thread Milan P. Stanic
On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > It's a pity that the developers of other security systems didn't get > involved, it would be good to have a choice of LIDS, HP's system, DTE, and > others in the standard kernel. LIDS uses LSM in 2.5/2.6 kernel series, IIRC. --

Re: Security patches

2003-11-30 Thread Russell Coker
On Sun, 30 Nov 2003 22:33, Martin Pitt <[EMAIL PROTECTED]> wrote: > On 2003-11-29 21:08 +1100, Russell Coker wrote: > > It's not a question of how difficult it is to get the grsec patch to > > apply and work correctly on a Debian kernel. It's a question of whether > > anyone is prepared to do it.

Re: Security patches

2003-11-30 Thread Martin Pitt
Hi together! On 2003-11-29 21:08 +1100, Russell Coker wrote: > It's not a question of how difficult it is to get the grsec patch to apply > and > work correctly on a Debian kernel. It's a question of whether anyone is > prepared to do it. If using a Debian-patched kernel is a requirement th

Re: Security patches

2003-11-30 Thread Russell Coker
On Sun, 30 Nov 2003 22:33, Martin Pitt <[EMAIL PROTECTED]> wrote: > On 2003-11-29 21:08 +1100, Russell Coker wrote: > > It's not a question of how difficult it is to get the grsec patch to > > apply and work correctly on a Debian kernel. It's a question of whether > > anyone is prepared to do it.

Re: Security patches

2003-11-30 Thread Martin Pitt
Hi together! On 2003-11-29 21:08 +1100, Russell Coker wrote: > It's not a question of how difficult it is to get the grsec patch to apply and > work correctly on a Debian kernel. It's a question of whether anyone is > prepared to do it. If using a Debian-patched kernel is a requirement then

Re: Security patches

2003-11-29 Thread Russell Coker
On Sun, 30 Nov 2003 15:32, Colin Walters <[EMAIL PROTECTED]> wrote: > However, this is not such a bad idea, if you don't try to be too formal > about it. If maintainers shipped English descriptions (say, > README.Security) of what the security implications of their programs > were, it could be ver

Re: Security patches

2003-11-29 Thread Russell Coker
On Sun, 30 Nov 2003 14:53, Colin Walters <[EMAIL PROTECTED]> wrote: > On Sat, 2003-11-29 at 22:47, David Spreen wrote: > > of their programs. the system could use a db of installed-package > > resources. Therefore we would need to create a common language that > > could be translated to any acl-for

Re: Security patches

2003-11-29 Thread Colin Walters
On Sat, 2003-11-29 at 22:53, Colin Walters wrote: > > Nevertheless I again would like to suggest a policy that forces the > > maintainers of packages to deliver informations about used system > > resources > > of their programs. However, this is not such a bad idea, if you don't try to be too fo

Re: Security patches

2003-11-29 Thread Russell Coker
On Sun, 30 Nov 2003 15:32, Colin Walters <[EMAIL PROTECTED]> wrote: > However, this is not such a bad idea, if you don't try to be too formal > about it. If maintainers shipped English descriptions (say, > README.Security) of what the security implications of their programs > were, it could be ver

Re: Security patches

2003-11-29 Thread Colin Walters
[moved to debian-security, where it belongs] On Sat, 2003-11-29 at 22:47, David Spreen wrote: > Even if you're perfectly right with that, I consider it important to > provide our users the possibility to make their own choice regarding the > acl systems to use. You always have a choice to upload

Re: Security patches

2003-11-29 Thread Russell Coker
On Sun, 30 Nov 2003 14:53, Colin Walters <[EMAIL PROTECTED]> wrote: > On Sat, 2003-11-29 at 22:47, David Spreen wrote: > > of their programs. the system could use a db of installed-package > > resources. Therefore we would need to create a common language that > > could be translated to any acl-for

Re: Security patches

2003-11-29 Thread Colin Walters
On Sat, 2003-11-29 at 22:53, Colin Walters wrote: > > Nevertheless I again would like to suggest a policy that forces the > > maintainers of packages to deliver informations about used system > > resources > > of their programs. However, this is not such a bad idea, if you don't try to be too fo

Re: Security patches

2003-11-29 Thread Colin Walters
[moved to debian-security, where it belongs] On Sat, 2003-11-29 at 22:47, David Spreen wrote: > Even if you're perfectly right with that, I consider it important to > provide our users the possibility to make their own choice regarding the > acl systems to use. You always have a choice to upload

Re: Security patches

2003-11-29 Thread Colin Walters
On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > SELinux only uses LSM which makes it easy to port, but seems > impractical and even dangerous for real-world use [1][2]. The main complaint on those pages seems to be that LSM is only focused on access control. You may or may not regard that as a

Re: Security patches

2003-11-29 Thread Colin Walters
On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > SELinux only uses LSM which makes it easy to port, but seems > impractical and even dangerous for real-world use [1][2]. The main complaint on those pages seems to be that LSM is only focused on access control. You may or may not regard that as a

Re: Security patches

2003-11-29 Thread Russell Coker
On Sat, 29 Nov 2003 20:05, Martin Pitt <[EMAIL PROTECTED]> wrote: > > Conflicts with almost every other kernel patch, including the patches in > > the default kernel source. No-one has the skill and interest necessary > > to make it work with a default Debian kernel. > > It may be the hardest thin

Re: Security patches

2003-11-29 Thread Martin Pitt
Hi! (moving this thread to -security since both authors gave permission to quote) On 2003-11-29 18:06 +1100, Russell Coker wrote: > On Sat, 29 Nov 2003 14:21, Pablo Lorenzzoni <[EMAIL PROTECTED]> wrote: > > (1) RSBAC - http://www.rsbac.org - Used by Adamantix. It seems to be > > quite reliable an

Re: Security patches

2003-11-29 Thread Russell Coker
On Sat, 29 Nov 2003 20:05, Martin Pitt <[EMAIL PROTECTED]> wrote: > > Conflicts with almost every other kernel patch, including the patches in > > the default kernel source. No-one has the skill and interest necessary > > to make it work with a default Debian kernel. > > It may be the hardest thin

Re: Security patches

2003-11-29 Thread Martin Pitt
Hi! (moving this thread to -security since both authors gave permission to quote) On 2003-11-29 18:06 +1100, Russell Coker wrote: > On Sat, 29 Nov 2003 14:21, Pablo Lorenzzoni <[EMAIL PROTECTED]> wrote: > > (1) RSBAC - http://www.rsbac.org - Used by Adamantix. It seems to be > > quite reliable an