>       OK then ;-)  I'll be posting a summary of the issues discussed
>       and responses shortly so we're all on the same page.

During this case discussion a few points were raised.  In order to work
towards convergence of the case the project team would like to respond to those
issues in summary.  An updated spec will follow the convergence of the case.

Gary..
======

* PSARC/2007/315 Extensible Attribute Interfaces was referenced as a
  dependency.  The ZFS project team pointed out this was not a relevant
  reference and that PSARC/2002/240 ZFS (Zettabyte Filesystem) was the
  only case dependency required.

        References to PSARC/2007/315 have been removed.

* What is the inheritance characteristic of the slabel property?

        The slabel property is inherited just the same as the other
        data set properties.  Modifying the slabel's value requires
        the specified privilege.

* How does zfs send deal with the slabel property?

        send (and receive) preserve the slabel property.   Making the
        received data set available (mount) is restricted as specified
        in the case materials mount policy.

* How is the slabel property related to delegation (zfs allow)?

        Delegation deals with owner rights (Discretionary Policy as in
        Discretionary Access Control, DAC), slabel is a Mandatory Policy
        attribute.  It deals with label based Mandatory Access Control,
        MAC, thus unlike other zfs properties, additional policy applies
        to the slabel property.  In addition to having DAC rights to
        modify the slabel property, the specified policy (privileges,
        or setting to the label of the zone in which it is mounted
        Read/Write) is required.

* Why have all three none/admin_low/admin_high; what is the relationship
  between them?

        The intent of this case is to prevent inadvertent access to labeled
        data.  The default slabel value (including when not present), none,
        implies the data has not been labeled, thus default access is
        allowed.  admin_low and admin_high are "administrative" labels
        associated with system, rather than user, data.  They are only
        set explicitly by Trusted Extensions administrators to indicate 
        how they wish system data to be protected.  As opposed to other
        labels in a Trusted Extensions configuration, they are not
        automatically set when mounted.  Trusted Extensions administrators
        have to explicitly specify how they want system data protected.
        When mounted in the global zone, admin_low data sets must not have
        the existing zoned property set and must be mounted read only.
        labeled-(non-global)-zone admin_low data sets must be mounted read
        only.  admin_high labeled data sets, must not have the zoned property
        set and may only be mounted in the global zone.  This allows the
        Trusted Extensions administrator to ensure that such labeled data
        sets will not be unintentionally mounted in ways that could cause
        inadvertent data access or modification.

* Why must zfs set slabel= and zfs get slabel only deal with internally
  formatted labels?

        There is no reason.  The case will be updated to allow human
        readable as well as internally formatted labels.  Internally
        formatted labels will be stored as the string value of the
        slabel property.  The zfs command will do the translation
        using the standard Trusted Extensions interfaces which take
        into account the calling user's rights to view/set human
        readable label strings.

* What is the interaction between the zfs crypto project and this case?
  
        The on disk format of the slabel string is public information
        (unclassified) and requires no protection.

Reply via email to