07/31/2006 lspp Meeting Minutes:
===============================
  Attendees

  Janak Desai (IBM) - JD
  Loulwa Salem (IBM) - LS
  Joy Latten (IBM) - JL
  Debora Velarde (IBM) - DV
  Michael Thompson (IBM) - MT
  Thiago Bauermann (IBM) - TB
  Nikhil Gabdhi (IBM) - NG
  Fernando Medrano (IBM) - FM
  Al Viro (Red Hat) - AV
  Irina Boverman (Red Hat) - IB
  Steve Grubb (Red Hat) - SG
  Dan Walsh (Red Hat) - DW
  Lisa Smith (HP) - LMS
  Linda Knippers (HP) - LK
  Matt Anderson (HP) - MA
  Paul Moore (HP) - PM
  Klaus Weidner (Atsec) - KW
  Robert (Atsec) - ROB
  Darrel Goeddel (TCS) - DG
  Chad Hanson (TCS) - CH
  Venkat Yekkirala (TCS) - VY


Tentative Agenda:

Kernel update
-------------
    JD: George is not here this week so I am running the meeting in his place.
        Al would you please give us a kernel update
    AL: latest audit stuff seems to be working fine so I sent it to Linus
    SG: Is the lazy audit patch in the queue for Linus to take in for 2.6.18?
    AV: yes
    SG: I'll get together a .46 kernel today. I'll release that so everyone has
        something to sync up to. We'll do another one with net labels and ifsec
        patches.
    AV: anything new on the debugging of the audit string problem?
    SG: turned out to be user space problem, sorry about that. It was a bug in
        audit search parsing piece. I had it on my to do list, and didn't
        realize it was dropping text. Also I am working on getting -p option for
        syscalls into audit. As far as I can tell, the code associated with it
        is still untested since there is no option support for it in userspace.
        This is the highest priority I am working on; I don't expect problems
        but you never know. I am planning to get that working tomorrow, and send
        a new user space package tomorrow, the new package should take care
        of the untrusted string everyone was seeing. It should also have the -p
        option for people to test with. By end of this week we should be able to
        do real regression testing. I think -p is the only option that is not
        available in rhel5 that was in rhel4. This should cover the kernel and
        audit userspace discussion as well.


AuditFS/inotify
---------------
    JD: anything Lisa on this
    LS: Nothing on audit notify. Amy is not on the call so maybe you can ask her
        about that if she joins later.
    SG: I think these issues need to be taken from the agenda. Our work on them
        is done and if there is anything about them, then they are considered
        bugs.
    JD: Ok sounds reasonable.

LSPP kernel issues
------------------
Audit userspace
---------------
    JD: you already talked about that Steve, so we'll move on

Print
------
    JD: Matt, anything new?
    MA: last week, between Linda and I, we determined a method for rendering
        postscript to handle it properly. Using configuration files only, we can
        successfully render postscript to pdf and back and apply labels.
        unfortunately, while working on that, we found a problem printing to
        foomatic devices. Before we were using local printers and it wasn't
        using foomatic, so we didn't see this; now if you print anything that
        needs to call foomatic, the job just hangs, certainly not good. Once I
        debug and fix that, I plan on releasing a new patch based on the latest
        1.2.1-4. I also got good feedback from Tim and Klaus, I made these
        changes and just wanting to see if there are any software bugs that I
        need to take care of.
    KW: could you document those config entries you talked about in the
        postscript config man pages with the next patch please
    MA: I was also planning on documenting it in a web page, but I'll also
        include it in the patch.
    SG: I am wondering about the timing of the patch, any idea when it'll be
        available
    MA: as I said the bulk of it went in. Seems it missed rhel5 deadline, but we
        talked to Irena to check if it went in
    IB: Yes, it should be in.
    SG: We might have a short window maybe 24 hours or so that you can use to
        send incremental patches, so the beta test that goes to everyone is a
        little bit better. There is opportunity for maybe next day or two to get
        couple of updates in
    MA: All the suggestions I got, I put in so far. I am not sure if I should
        send one update, or many smaller ones. I don't think I'll have any code
        changes to the fix the foomatic problem but I'll see how things go, and
        maybe submit a patch soon
    SG: I don't think this is a problem
    MA: I'll try to get the fix out tonight
    SG: see if you can get it in beta.  also ask Tim to see if he can get it in
        fc6?


SELinux base update
-------------------
    JD: is Dan on?
    DW: yes .. I'm here. crontab is broken and I am fixing it now
    JD: yes, I had issues with it and needed to add few things to make it work.
        I thought maybe I was doing something wrong.
    DW: No, there are many issues with it. Right now, crontab writes to /tmp and
        creates files with wrong context. So I am working on it as we speak
    JD: There were another issues that were brought up last week, anything new
        with that?
    KW: The issue was about making policy more restrictive for MLS to disable
        multilevel objects for untrusted users. It is still apparently an issue.
        I posted a program to expose the problem using newrole scripts. Maybe
        there is a missing check in selinux that is causing the problem
    DG: I saw your post. I think these are two separate issues
    KW: I agree it is entirely possible they might be separate issues. The good
        thing is that making the policy more restrictive didn't break anything.
    DG: Biggest thing of concern are things in /var/run and daemon startup.
        There isn't a way to differentiate between privileged and unprivileged
        user from a trusted perspective
    KW: from an evaluation perspective, admins could be permitted to access
        multi-level objects, as long as the normal users do not have this
        privilege
    DW: Is there a patch available to turn this off
    KW: I have a patch included in the email I sent to the list.
    DW: to get rid of multilevel objects
    CH: ok, we'll test this more

MLS policy issues
-----------------

Roles
-----
    JD: Mike anything new on that. I've been using it and the separation seems
        to be working.
    MT: I have no news, I haven't been working much with policy lately, been
        more audit focused.
    DW: There is a change making newrole not a login shell and that change went
        in Friday. It's a nice thing and allows you to use /etc/profile to see
        what shell you are working on. Wonder if that might affect the behavior
        klaus was talking about earlier with scripting newrole.
    KW: what package do I need to pick up to try this
    JD: policycoreutils provides newrole I believe
    Kw: I'll try it, but my feeling is that it's different.

CIPSO
------
    JD: Any CIPSO news Paul?
    PM: Good news. I got feedback from David Miller and others, the feedback
        looked good. There are a couple minor changes. Dave Miller said once a
        few things are taken care of, he'll put the patch in 2.6.19. which is
        encouraging.
    JD: That's great. Paul, last week you said you were looking into a problem
        Joy was seeing, any progress on that, have you heard from her? or is
        there something I need to follow up on?
    PM: if you can follow up that would be great.
    JL: I am here. Paul, I never really got a chance to check the patch on the
        latest kernel. I think my problem was that I had 2 policies on my
        machine. I think that had something to do with it.
    PM: Ok, unless you narrowed it down, my recommendation is not to worry about
        it now, the code will be changing in the next few days anyway.
    JL: yeah, I thought I'll wait for the latest kernel, and test with latest
        kernel that has yours and Venkat's patch.
    PM: my push now is to get something for dave miller to put in his tree. once
        that is done, I'll work with steve grubb on porting the patch to lspp
        kernels

IPsec:  MLS, UNIX domain secpeer, xinetd
-----------------------------------------
    JD: anything new here?
    VY: mls patch went into 2.6.19 -mm tree
    JD: great. looks like things are falling into place


ipsec-tools:  SPD dump and racoon base + MLS
---------------------------------------------
    JD: joy do you report on this?
    JL: Venkat you need to send a racoon patch. ipsec picked up my patch, but
        not the racoon patch, and we need that. I'm gonna resend it and say it
        is needed for another patch and see if they take it.
    SG: who are you planning to send the patch to, Red Hat or upstream?
    JL: I'll send it to ipsec tools mailing list to the maintainers. I got the
        list from sourceforge, and that's the only way I know how to do that.
    SG: if the patch is in good shape, we might pull it in and get it in beta
        patch also. we have some time maybe 24 hours that we might be able to
        put a patch in.
    JL: ok sounds good.

Single-user mode
-----------------
    JD: Dan you mentioned last week creating a boot flag, did you work on that?
    DW: I talked to few people then dropped the ball. I'll get back to doing
        that. I was looking at the flag auditfs_chk(??), if set, then we check
        for an environment variable, that indicates a crash and then go into
        single user. That's what we agreed on .. right?
    KW: yup that would be fine

Self tests
----------
    JD: I believe George was going to send out a patch.
    SG: From an email he sent me on Friday, he didn't do anything.

VFS polyinstantiation
----------------------
    JD: pam namespace is upstream. I sent out a patch to newrole which was not
        using pam namepsace. The patch will make newrole use pam session
        management. As far as cron, I started testing, but ran into some of the
        problems we talked about earlier.
    SG: something about cron, turns out the maintainer of cron is no longer with
        RedHat. A new person will take over that work, I already talked to him
        just in case we have any issues, I'll send you his email address, he is
        also the maintainer of xinetd. Ok, so it turns out Jason never finished
        work to incorporate vixie cron. Maybe the at daemon needs a patch
        similar to the vixie cron, I think jason was gonna work on that, but
        there is no one who is knowledgeable enough to do the work. so if at
        daemon is going to be in the security target(ST) it will probably need
        polyinstantiation as well.
    JD: I thought that we were not gonna put it in ST because it is a wrapper
        for cron
    SG: but it is not going to be now
    JD: right, how much time do we have to submit a patch.
    SG: might be able to pull it by beta2. so we have about 2 weeks
    DW: why not drop it from ST, we have cron, why do we need at
    KW: that sounds reasonable. I wouldn't miss it
    KW: the issue is if there are certain users for at?
    LK: so you would drop it all together rather than having non mls at?
    KW: I would recommend dropping it all together
    LK: would we have packaging issues if we don't have at installed?
    KW: you can have it installed just not running


    JD: any other issues. if not, then we are done. we must be getting closer.
    KW: short comment on cron. Important thing is that the new level should
        dominate the lower level. you should not be able to put jobs at the cron
        tab that run at lower level than cron tab runs at. Doing it this way
        breaks integrity, since this is a kind of write up operations. it is ok
        with lspp but just not the way things are being run so far.
    JD: ok
    KW: so it's lspp compatible, but if you want additional integrity
        restrictions, I don't know how to do that.
    JD: ok
    KW: This is just for your information, but I don't think it will affect
        certification. one way to fix this is to request a password for cron
        just to make sure it is not invoked unintentionally.
    JD: it will be different from how cron operates and not sure if maintainers
        would like that.
    KW: this is just for additional paranoia and that's why I wanted to bring
        it up
    JD: ok, Thanks Klaus. Anymore issues? alright let's adjourn

Cron, tmpwatch, mail, etc.
--------------------------
More than 90% complete
Remaining tasks

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to