Also unsupported: The "no-security" model -- where all security
is thrown out (to save memory space and cycles) that was desired for embedded work.
LSM also doesn't support standard LSPP-B1 style graded security
where mandatory access checks are logged as security violations before
DAC checks are even looked at for an object.
At one point a plan was proposed (by Casey Schaufler, SGI) and
_\implemented\_ (team members & prjct lead Linda Walsh) to move all
security checks out of the kernel into a 'default policy' module.
The code to implement this was submitted to the LSM list in June 1991.
This plan was shot down as "too radical". It wasn't what the "kernel
programmers" wanted. "They" would never accept it and therefore, LSM wouldn't accept it without prior approval from the "kernel
programmers".
When such approval was sought, the seeking party was drawn and quartered
for having the temerity to actually ask the question (since asking the question pointed out the failings of LSM to meet its original
design
goals).
>
> >The real problem is adding mess to the kernel.
> >
> Christoph's problem is likely that he doesn't like the design. Fair
> enough, can't please everyone, but a lot of effort went into that
> design.
--- True...alot of effort went into building the Titanic as well.The modular security model was implemented via macros and cleaned up the logic of the kernel code by moving toward single exit points that could allow consistent release of acquired data structures and locks depending on where failure occurred. That alone made the code more readily understandable and maintainable. Removing security policy from the code into separate modules also made validation of security considerably easier.
So...of course, it wasn't wanted.
LSM may implement some number of policies, but it is neither robust nor easy to use. Only recently was it decided not to require that every security module to know about every hook. That was also suggested almost 2 years ago because the current setup makes the implementation of security policies *MUCH* more complicated...and, theoretically, inherently less provably secure.
l. walsh
- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/