Note: I think I mixed up people's voices today, so apologies for that. Feel free to correct me if I mentioned you said something you actually didn't

09/18/2006 lspp Meeting Minutes:
===============================
  Attendees

  Robin Redden (IBM) - RR
  George Wilson (IBM) - GW
  Loulwa Salem (IBM) - LS
  Michael Thompson (IBM) - MT
  Thiago Bauermann (IBM) - TB
  Al Viro (Red Hat) - AV
  Irina Boverman (Red Hat) - IB
  Steve Grubb (Red Hat) - SG
  Dan Walsh (Red Hat) - DW
  Linda Knippers (HP) - LK
  Amy Griffis (HP) - AG
  Matt Anderson (HP) - MA
  Paul Moore (HP) - PM
  Klaus Weidner (Atsec) - KW
  Darrel Goeddel (TCS) - DG
  Chad Hanson (TCS) - CH
  Venkat Yekkirala (TCS) - VY
  Joe Nall - JN
  Ted Toth - TT
  Bill O'Donnel - BO

Tentative Agenda:

Kernel / Rawhide update
------------------------
    GW: Al, anything we need to know about the kernel?
    AV: no. there have been final patches given for hookups on targets into
        mainline kernel. All arch dependant changes are in mainline now. One
        question, do we care about stuff like solaris binaries?
    KW: yes we do care. if there is a way to disable these binaries. Main thing
        we don't want a user to run them without the admin able to stop them.
    AV: yes, there is a way to disable it
    KW: how do you recommend we do that?
    AV: disable them at build time
    KW: the problem is that people running the evaluated system don't build
        their own kernel.
    AV: there was alot of use for the binaries. there has been some support to 
at
        least a subset of syscalls.
    KW: is there an easy way to tell at run time which personalities are
        available for  binaries?
    AV: yeah probably
    KW: ok, thanks
    AV: if we do implement this at some point, we'll need to think about adding
        those new audit fields. right now there is a constant for architecture
        and they really should be different. creation is not different, they
        should be just treated as separate archs.
    KW: I agree with treating them separate. main question is if people have
        interest. it's up to arch maintainer to see that audit works, so it
        might be a similar logic for this one.
    AV: this can be interesting. keep in mind it is not just kernel; user land
        has to understand those as well.
    GW: is this going to be an issue on rhel. can we prove to evaluator that
        binaries are not enabled?
    AV: This is not an immediate concern, maybe for future. really we'll best
        make sure those are disabled. I'll put it that way, I wouldn't rely on
        correctness of code.
    KW: maybe if people start adding this to the kernel then it'll be good to
        have one place to control it.
    AV: I don't think so. It is not a real concern. I don't believe anybody is
        using that on a production type system
    KW: what I was saying is that if it ever gets to a state where it is used,
        it would be good to have run time option to turn it on/off.
    GW: klaus we need to demonstrate that to evaluator?
    AV: which archs?
    GW: s390 and ...
    KW: RH doesn't ship with binary compatibility enabled.
    AV: we'll have support ...
    LK: the support for 32/64 is not in kernel by default
    AV: for audit enablement it shouldn't be a problem
    KW: it's not easy to test it actually works
    AV: handling of binaries is concerned on alpha, sparc and ... as far as I
        know.
    GW: sounds like we don't have a problem since these are not part of TOE.
        good news.
    AV: the kernel should be basically done
    GW: ok great. Any one has any more issue
    JN: I was having a problem with (a package?), what kernel is it in. Stephen
        smalley was saying it'll be in 2.6.19, but that's not the naming
        convention rhel is using?
    SG: those are release candidates, sort of mislabeled. it really is the
        2.6.19 release candidate 7.
    JN: Ok, I was a bit confused and was trying to figure it out.
    SG: because of rpm, it is one version behind
    JN: when you ship it'll be 2.6.18?
    SG: yes. speaking of kernel, we have one bug (the audit by ppid problem).
    GW: does it still look like a user land problem?
    SG: can't tell. I ran pid and ppid value and it looks like it's builidng the
        same packages. other than that it's the kernel that evaluates that rule.
        As far as I can tell, user space is acting correctly, and so is the
        kernel
    AV: .....
    SG: audit by ppid is only thing that doesn't work.
    AV: pid works?
    SG: audit by pid works, audit by ppid doesn't seem to work
    LK: is there a bugzilla for that
    SG: I asked mike to submit one
    MT: I submitted one, I'll check if it is on issue tracker
    SG: just so we get it, you can file against rawhide. as of Friday it is in
        sync with lspp kernel. I am looking for this bug, but it would help to
        have another set of eyes searching for it as well.
    AV: if you add negation which test does it take
    SG: if I negate it, it takes the proper one. It's really strange. I am
        building a new kernel to see how it gets evaluated
    AV: yeah, that's what I would do, to see what happens
    SG: yup
    GW: does this happen on all arch
    SG: on x86_64
    MT: and ppc64
    GW: alright, as for IPsec, I don't know if Joy had another ipsec patch out.
    MT: I have update from Joy, she said she sent a status update to lspp list
        about racoon. also a patch for ipsec, there is a bug in it, so she is
        currently working on fixing that and will send an updated patch.
    GW: has she posted a right up about that?
    MT: she said she'll add docs to what venkat sent out once she is done
        working on the bug. Not sure if that is what you were looking for?
    GW: It is .. great. ok, any other kernel issues? I know we need that
        networking section to test for bugs there as well.




SELinux base update
-------------------
    GW: any selinux updates
    KW: one issue, selinux users mention that 256 categories is not sufficient.
        Any thing happening in there?
    DW: what number do you want
    GW: I believe it was mentioned to raise it to 1024
    DW: we'll just update the policy, add the lines for the new categories.
    KW: I grepped for it, and found the limit mentioned in few places, so it is
        not only adding lines to policy I believe.
    DW: so we'll make it 1024.
    CH: great, because I currently exceeded that in some of my tests, so it's
        great that we are adding more categories.
    JN: I beleive there is a place where it is 239 limit in CIPSO.
    TT: you can have so many comparetments. The way netlabel gets around that,
        you can setup mapping, you can have one cipso DUI(?) that allows you to
        map certain ranges of levels. if you care about that, send me an e-mail
        and I'll show you examples.
    KW: what's the failure mode case. so that MLS restrictions are enforced?
    TT: if you can't guarantee labels on that. if you are doing accept it'll
        prevent you to write to that socket.
    KW: so it'll do the right things
    TT: hope so
    GW: looks like it need testing. I've seen a few other problems. There is no 
        
        login prompt on console. Has anyone seen that?
    DW: after coming back from suspend mode?
    GW: no, on a fresh instal with MLS policy
    KW: is there an AVC message?
    GW: I need to check that
    MT: I've seen it happen as well
    GW: I'll test more, but just wanted to check it is not something I am doing
        before I open a bug
    DW: so on a fresh install you see it. sounds like a bug.
    GW: Another thing, if I create a user and try to change thier password, then
        I get a pam error.
    KW: there is a problem because of using the passwdqc module. that has been
        changed recently.
    DW: it is not selinux related, happens even in disabled mode.
    KW: there is a bug for that, kris opened it. This is not a very debugging
        friendly problem, the message is not very indicative of what's going on.
    TT: did you use useradd -m, that works for me.
    KW: the bug number is ( RH - issue tracker # 102108 )
    GW: does every one have visibility to bugs
    IB: probably not, I only opened up one bug. I'll go through them and make
        them public.
    GW: ok, I have no objections to making them public
    IB: before we send them, I'll send list to IBM
    GW: Anyone sees more strange behavior?


MLS policy issues
-----------------


Audit userspace
----------------
    GW: Steve, is there an update for audit user space?
    SG: I'll push audit-1.2.7 out overnight. to match 2.6.18 kerenel and various
        fix ups
    GW: should we pick it up through rawhide, or will there be an update repo
    SG: should be update repo, but not sure
    GW: ok, so we'll pick through rawhide. Thanks Steve

Print
-----
    GW: Matt, how's print?
    MA: It's coming along. After seeing Rodrigo's message, I am a bit concerned,
        since previouly I didn't have access to usb printer. Now I have access
        to one, and I configured it through the graphical interface that came
        with rhel, so I am getting different info about the device. I am working
        on that, assuming all is cleared I plan to have an updated patch this
        week
    GW: great, thanks Matt.

CIPSO
------
    GW: Any CIPSO updates Paul?
    PM: working on finishing up a patch to change way of how net label uses
        netlink, to make it more consistent with kernel. all the code is
        basically written, but still looking through to debug. Few things popped
        up last week and I'll submit those fixes. also there is talk that I
        need to add audit messages to some places in the code to satisfy
        evaluation requirements.
    GW: what type will these be?
    PM: These will be  shown when you configure netlabel.
    GW: will these be of new audit types
    PM: I imagine so, but I didn't get a chance to look at it closely.
    LK: this is to any security related changes to netlabel?
    PM: yes
[Klaus came back with Pam bug number - conversation switched back to bugs 
tracking]
    IB: if you put lspp in subject line of the bug, then I'll pull it in my
        search and I'll make it public. if you are a member of our beta group,
        then you'll be able to see those bugs. Linda is a member, george is not
        for example. It's easier to make bugs public rather than to add everyone
        to the beta group
    GW: can you add me to beta group at least Irena, but I think it's good to
        make them public. My question, once there are change updates, how does
        the originator find out.
    IB: you won't get bug number, but you'll get the comments that people post.
    GW: Ok, that works


IPsec
-----
    GW: so Micheal gave us Joy's status. Anyone from TCS or Venkat if on can
        give us further update.
    VY: I am on george. I am waiting on Joy's racoon patch to test that, then
        I'll send my kernel patch out. I heard that the version she sent out had
        a bug.
    CH: Venkat didn't hear what Mike said about Joy's status so I filled him in.
    MT: Joy said she had a patch, but it has a bug, that's what she is working
        on right now, she'll send an update to that patch with the fix
    VY: I'll test what I have and send my patch out. did she say when the fix
        will be sent?
    MT: She said "later" so I don't know exactly.
    GW: good idea to send what you have now. I'll talk to Joy and get a read on
        her status as well.
    IB: I am concerned how our fixes are going to make it to beta 2. Those
        patches need to be accepted by upstream and bugzillas opened so that
        they are managed by rhel as soon as possible in order for us to get them
        in. keep that in mind.
    GW: who need to open those
    IB: who ever is submitting those patches. maybe as soon as they submit to
        upstream, they need to create a bugzilla. so james morris knows what to
        look for and pull in.
    GW: Venkat, do you have an idea on when you'll be done
    VY: I am going to work on comments from Stephen smalley and I'll work on
        those and get those in next week or so. I'm planning that secmark
        patches being accepted. I'll get that in next couple of weeks. Need to
        get people to do design and docs. we had a question from Dan walch on
        how all of this is going to get integrated. I would guess in the next
        two to three weeks we'll have all those issues out of the way, and get
        buy in from people.
    SG: when you say couple of weeks, you mean 2 weeks?
    VY: I would say 2 to 3 weeks
    SG: we can't drag this after end of September, or they may not make it in
        beta 2
    VY: for secmark that's a big one, we have some useful feedback now that we
        can act on. once we go through feedback, it's a matter of integrating it
        in and sending another set upstream. I say we are close for secmark,
        within next week we'll have issue resolved. I'll send the ipsec fix out
        tonight.
    DW: are you working on performance on secmark
    VY: We didn't check performance, just looking at functional right now
    DW: I just have usability concerns. I don't find secmark very usable. I
        don't like the interaction between policy and secmark.
    VY: I guess in next couple of days there will be a good amount of
        discussion on these aspects.
    DW: I heard there will be a big performance problem with loading iptable
        rules. this secmark stuff really need to be looked at
    GW: should we be using the compatibility mode then. may save us all a lot of
        headaches if we use the compatibility flag.
    DW: I just see huge problems with this, it is not very well thought out. the
        tools that generate secmark rules, they go through all ports. we have
        about 400 rules and you go through all of them before you go through
        ipsec rule that might drop the packet
    GW: problem is that it is coming in late.
    DW: the other problem is I'd like to have a tool that admins can run to set
        this thing up.
    GW: we need to keep an eye on that and have compat as backup plan
    SG: I have a feeling there is real good chance it won't make it
    VY: we'll have discussion in next couple of days. Dan already sent out
        email.
    GW: sounds like we are heading to compat use
    SG: I'll take action item to look in RH to see where that is going.
    GW: thanks Steve, and I'll do some research. thanks Venkat for the update.

xinetd
-------
    GW: any issue with xinetd. anyone testing with it
    JN: we've been testing with it. the netlabel stuff doesn't work with
        unlabeled host just now
    CH: yes it does Joe.
    JN: in a reasonable plug it in and run, it's tough without policy
        modifications
    CH: yeah, you do need to do some policy work
    GW: sounds like we might need to make some testing on that. certainly need
        some end to end testing in our environment as well.

ipsec-tools:  SPD dump and racoon base + MLS
---------------------------------------------
    GW: I'll get hold of Joy and see what's happening with the bugs and get more
        documentation from her as well.


Single-user mode
-----------------
    GW: did single user mode make it?
    DW: I'll have to check


Self tests
-----------
    GW: I have done nothing on, had some personal issues to attend to.


VFS polyinstantiation
----------------------
    GW: don't know anything on those. anyone has update on newrole issue. there
        was debate on selinux, might have been resolved but I didn't follow it.
    DW: it is not resolved as far as I know.
    CH: folks are working on it are writing up their issues.
    GW: write bugzillas and submit to list. if we don't get visibility for bugs,
        then write a note to list. so we are not all hitting the same problem
        and writing same bugs. I appreciate you doing the testing. if they are
        minor issues, we might be able to bug janak with them.
    GW: any other issues, if not we'll adjourn meeting. Thanks everyone.

Cron, tmpwatch, mail, etc.
--------------------------


Bugs / remaining tasks
-----------------------



Final cutoff date
-----------------

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to