03/12/2007 lspp Meeting Minutes:
===============================
  Attendees

  Lawrence Wilson (IBM) - LW
  George Wilson (IBM) - GW
  Kris Wilson (IBM) - KEW
  Loulwa Salem (IBM) - LS
  Debora Velarde (IBM) - DV
  Joy Latten (IBM) - JL
  Kylene J Hall (IBM) - KH
  Irina Boverman (Red Hat) - IB
  Steve Grubb (Red Hat) - SG
  Eric Paris (Red Hat) - EP
  Lisa Smith (HP) - LMS
  Linda Knippers (HP) - LK
  Amy Griffis (HP) - AG
  Matt Anderson (HP) - MA
  Paul Moore (HP) - PM
  Klaus Weidner (Atsec) - KW


Agenda:

                 Bug Discussion
                 Around the Room

RHEL 5+ Packages:

                 acl-2.2.39-2.el5
                 audit-1.3.1-2.el5
                 audit-libs-1.3.1-2.el5
                 audit-libs-devel-1.3.1-2.el5
                 audit-libs-python-1.3.1-2.el5
                 kernel-2.6.18-8.el5.lspp.67
                 kernel-devel-2.6.18-8.el5.lspp.67
                 kernel-doc-2.6.18-8.el5.lspp.67
                 libacl-2.2.39-2.el5
                 libacl-devel-2.2.39-2.el5
                 mcstrans-0.2.3-1.el5
                 openssh-4.3p2-18.el5
                 openssh-askpass-4.3p2-18.el5
                 openssh-clients-4.3p2-18.el5
                 openssh-server-4.3p2-18.el5
                 pam-0.99.6.2-3.17.el5
                 pam-devel-0.99.6.2-3.17.el5
                 selinux-policy-2.4.6-42.el5
                 selinux-policy-devel-2.4.6-42.el5
                 selinux-policy-mls-2.4.6-42.el5
                 selinux-policy-strict-2.4.6-42.el5
                 selinux-policy-targeted-2.4.6-42.el5
                 vixie-cron-4.1-66.2.el5

                 lspp-eal4-config-ibm-0.20-1
                 rbac-self-test (TBD in config RPM)
        cups (New package pending)


Tracker Bug: 
https://bugzilla.redhat.com/bugzilla/showdependencytree.cgi?id=224041

Query: https://bugzilla.redhat.com/bugzilla/buglist.cgi?cmdtype=runnamed&namedcmd=RHEL%205.0%
20LSPP&[EMAIL PROTECTED]

    GW: while we are waiting, has anyone tried running aide from command line. I
        can't get it to work. I am in the process of posting my self tests.
    KW: George, I tried running aide -i and I got permission error just now as
        well
    GW: need to open a bug on that. I'll post my self tests, and it also
        includes a manpage now since someone requested that.
    PM: I have question about ipsec. is there a magic setkey command to see
        selectors info
    JL: you mean the security context?
    PM: usually setkey -D to show you updates, is there way to get selector info
        as well
    JL: by selector you mean src, dst, spi ..
    PM: yeah, those are traditionally called selectors in ipsec
    JL: I am trying to remember if it is the ipsec protocols or upper layer
        protocols that shows up in there. When you input your policy, and you
        are not specific about the protocol, I believe you won't see anything
    PM: in this case, I am being specific, even specifying ports
    JL: I think that should show up, I'll take a look and see.
    PM: It's not an issue, just something I was wondering about.
    GW: we'll be using the query posted in the agenda, it was sent by Irena and
        that should contain all bugs of interest.
    IB: George, before we start should we set a time line first about when we
        want to finish as we talked about this last time
    GW: for each bug, we need to have a target date, I was hoping to drive for a
        date of the 23rd, but not all bugs may be fixed by then. I think there
        will be little disagreement that we need some completion date. There
        will be ideally no further code changes so we can go into formal
        testing. Any bugs that will come later will cause test re-spins. At this
        point everyone realizes that we need to shut down development. I
        proposed that date, and people can suggest others. Does that sound
        reasonable?
    LK: sounds good to me.
    GW: what date would be good for you Linda
    LK: happy with the date you proposed
    IB: now that we have a date, let's go through the bugs and see where we end
        up and maybe discuss it at the end more.
    GW: ofcourse, we don't want to discourage people from opening bugs, and we
        can decide per bug if it is required/not required for cert. So continue
        to open bugs
    SG: we need to file any bugs that need to be fixed. last time of rhel 4 we
        had problems on syscalls and we ended up doing documentation fix because
        we didn't get it early. that's my only caveat and it's based on my
        experience in rhel4. If real bugs come along, we need to document it
    GW: in particular if it affects our ability to have this in the field.
        absolutely write up everything
    KW: everybody is aware that what we have kinda works and is good to pass
        certification, but not necessarily in practical use. would RH be open to
        do aggressive changes that might break compatibility for people. If it
        turns out that some design decisions were un-practical?
    SG: We'll have to look at them individually, but in general we try to
        preserve compatibility at all times. I do plan on making lots of changes
        in audit, but keeping backwards compatibility
    KW: kind of thing I am thinking about is polyinstantiation and maybe keep it
        like it is now, but have different mechanism in the future if people
        choose to use it.
    SG: I think we would be open for something like that
    KW: document somewhere that it might change ... since it didn't get real
        world testing, it can be potential road block for future improvements if
        we decide to stick with initial designs
    GW: there needs to be migration paths also. We found a product in Software
        group that wrote some selinux policy but there was no way to migrate it
    SG: I think Dan volunteered to help if need be with migration. They really
        didn't think about good migration path for policy in the past
    GW: I think it gotten better, but something to keep an eye on
    KW: we don't expect binary policy modules people may have to work in future
        points anyway. source is possible though.


Bug List:

218386 nor nor pow [EMAIL PROTECTED] ASSI LSPP: labeled ipsec does not work over loopback
    JL: I haven't had good luck with this one. using the latest .67 kernel and
        the one before that had this patch fix in it, ever since I started
        running patch through racoon, I see stuff that I didn't see before.  I
        thought we will be wasting time and I figured we need to test with more
        updated kernels

223532 nor nor All [EMAIL PROTECTED] ASSI [LSPP] crontab manpages reference older environment variable
    SG: that one is built and in yum repo
    GW: needs verification
    EP: who will do that verification?
    GW: who opened the bug?
    EP: Matt
    MA: I'll do that

223840 hig nor All [EMAIL PROTECTED] NEW [LSPP] getfacl fails to correctly display all information...
    GW: that's the ancient one .. right?
    SG: I think there was man page update that needed to occur. looks like Tomas
        and klaus exchanged some info on that
    KW: there was still updates to be made that Tomas was working on.
    SG: I don't see a new package for acl.
    GW: we are waiting on new package then
    SG: I guess, I'll have to look at bugzilla to see how that's going.
    SG: so it looks like klaus asked a question last... so the discussion is not
        yet done on that one.

225328 nor nor All [EMAIL PROTECTED] ASSI LSPP: ipsec drops first packet when using IKE daemon
    JL: after testing, I am not happy with this changes so far. I sent patch to
        david miller. I've been seeing stuff like double and triple SA being
        created. It wasn't correct. when I investigated I saw two things going
        on. When I get double SA, the initiating guy was sending two acquires.
        When I saw triple SA, the initiating guy sent two acquires and responder
        guy sends one acquire. I sent patch to fix the initiating guy sending
        two acquires
    EP: I think we have half the patch in 2.6.18. the patch you sent to david
        miller? I am wondering if that's the one I commented at
    JL: yes
    EP: ok then, half of it that is applicable to 2.6.18 is in the .68 kernel
    JL: My patch eliminated one of the acquires. The other one, where responder
        sends one, I have no idea. it needs further debugging. I'll continue to
        investigate and see when I fix that and run stress test if things get
        better. I saw errors that I didn't see before so I don't feel it's the
        racoon patch, I feel it is kernel.
    GW: what is the target date
    JL: need more work.
    GW: this is pending on 218386
    JL: My question is "is it very important that we have ipsec not drop the
        first packet"?
    GW: I say it is important
    KW: It is not a requirement for certification, but it's a major usability
        issue.
    JL: I was wondering since it needs more work and it may have lots of holes
        that we need to check before it gets to the level we want it to be at.
    GW: is there anyone in community that we might contact to get help. maybe
        Venkat
    JL: I've been copying him on the mails, but I'll ask him individually
    GW: And I'll talk to chad in the symposium
    EP: if you can come up with everything that you know, put it in bugzilla or
        send it to me, I might know someone in RH that will be able to help with
        it.
    GW: ok, great .. thanks Eric

228107 nor nor All [EMAIL PROTECTED] ASSI [LSPP] Labels for labeled printing don't linewrap
    MA: this is the one that I was discussing with Linda earlier, it works fine
        in portrait mode but not landscape mode. I think it's fixed, just need
        to try few things.
    GW: when will we have new cups package
    MA: the next one is awaiting verification and there should be a cups package
        for that.
    LK: there is no cups package in lspp repo, so where is Tim putting these?
    GW: now that you mentioned it, I didn't see that either
    LK: might still make sense to wait for Matt's patches, but there are patches
        already available
    SG: anybody ever given Tim feedback if it works.
    LK: I tried to verify it but wasn't sure how to set it up. he sent me reply
        and hopefully I'll test in a day or so
    SG: I think he is waiting for feedback to push package
    LK: klaus kiwi can test as well, he opened the bug
    SG: when we get feedback, I think tim would be more inclined to run it
        through system and I can push it through repo.

228366 nor nor All [EMAIL PROTECTED] ASSI LSPP: audit does not log obj label for signal recipient
    SG: this is crashing., we took it out of kernel
    EP: was hoping for feedback from Amy as well.
    AG: I thought steve you were gonna talk to Al and was waiting. should I keep
        waiting or come up with alternate solution
    SG: we asked Al to get involved in this bug, so he said he will. I would
        expect to hear from him shortly.
    LK: is all info related to this bug actually in bugzilla?
    EP: I think the 2 problems I know about are in bugzilla.
    SG: the other day, I ran with .67 kernel and it finally died on me. It went
        through signal code, but oops was not captured. I would have to have a
        debugger setup, and at this machine I didn't have a serial port.
    EP: maybe use kdump.
    SG: it only takes an hour or so of running that kernel and it does all kind
        of weird things, if you take signal patch out it works just fine.
    GW: do we want to put target date on it
    SG: I don't know, I guess we are dependent on Al getting involved

228384 nor nor All [EMAIL PROTECTED] ASSI LSPP: audit does not log obj label for traced process
    SG: I think Al submitted patch this morning
    EP: there is a patch in .68 if Amy wants to check it
    SG: I am trying to get the user space to understand that type as well
    LS: is that going to be a new type Steve?
    SG: yes OBJ_TYPE

228409 med nor All [EMAIL PROTECTED] ASSI LSPP: regular ipsec in upstream kernel crashes
    GW: there is patch posted for that one

229527 med nor All [EMAIL PROTECTED] ASSI LSPP: flow cache entries remain valid even after selinux ...
    JL: Venkat and Eric sent me email about how to verify this one
    GW: so just needs verification

229673 urg nor All [EMAIL PROTECTED] ASSI [LSPP] cups is overriding mls when querying jobs with lpq...

229720 med nor All [EMAIL PROTECTED] ASSI LSPP: pfkey_spdget does not audit xrfm policy changes
    GW: it needs verification

229732 med nor All [EMAIL PROTECTED] ASSI LSPP: pfkey_delete and xfrm_del_sa audit hook is misplaced.
    JL: this one needs verification too

230255 med nor All [EMAIL PROTECTED] ASSI LSPP: cipso mapping settings prevents login into system
    EP: Patch is in .68, hopefully Paul can verify that.
    PM: I'll give it a shot but might not get to it until next week.

230613 urg nor All [EMAIL PROTECTED] ASSI [LSPP] cups is allowing users to delete other user's job

230620  med     nor     All     [EMAIL PROTECTED]       NEW     LSPP: 
xfrm_add_sa_expire bug
    JL: needs to be verified
    EP: I just saw it today, so it's not built in anything. I'll build a .69
        this week and put it out there to be verified.

230663 med nor s39 [EMAIL PROTECTED] ASSI LSPP: random problems with the python rpm
    KH: I just added more info to the bug. There is more stuff in Issue tracker
        as well that Archana asked me for
    EP: that's the guy on vacation Steve was talking about.

231090  med     med     ppc     [EMAIL PROTECTED]       ASSI    LSPP: getattr 
causes python Segfault
    SG: check rpm -V of that package. sounds like something is breaking the
        files
    KW: rpm -V of which file
    SG: the python package. I wonder if something is corrupting the files since
        we didn't see this before.
    KH: this problem has been around for a while. I just got around to opening a
        bug and diagnosing it
    SG: check the package and have it verified
    KW: can you turn on corefile and capture the core dump
    KH: there should be no output from rpm -V right?
    SG: I think so, might be a time stamp.
    KH: I did rpm -V, and it didn't return anything
    SG: what about the attr package. sounds like there is a corruption of some
        files.
    KW: the two bugs are on 2 different platforms
    SG: so the libattr is the library python uses
    KH: my only concern is that I was not getting any updates on bug since last
        week.
    SG: in the one Jeremy was asking a question.
    KH: I've been trying to respond to questions that are asked
    KW: in segfault, it would help in doing backtrace to see the source code of
        what was last running
    GW: definitely when getattr segfaults, a core file would be great
    SG: I know why there has been no activity on the bug, the guy these are
        assigned to is on vacation, will be back next week

231178  urg     med     s39     [EMAIL PROTECTED]       NEW     LSPP: setfattr 
Segfaults on s390x
    GW: we already talked about it

231371 med med pow [EMAIL PROTECTED] ASSI LSPP: audit=0 appears not to disable syscall auditing
    GW: steve dropped patch for that. I have faith that steve fixed it but I
        didn't try it yet.
    EP: patch is in .68 kernel.
    GW: great.

231522  urg     med     ppc     [EMAIL PROTECTED]       ASSI    [LSPP] cupsd 
crash
    MA: I think tim and klaus were working on it.
    GW: I see a new ppc64 package, but don't see testing results. I need to
        query klaus
    SG: I can push the new package to repo in few minutes
    EP: I think he was looking at debuginfo package
    SG: he made it public and was waiting on info.
    GW: I'll append to bug now and ask klaus to run with that package and post
        results
                
231529 hig med All [EMAIL PROTECTED] ASSI [LSPP] bogus audit records with cups printing
    SG: that one sorta mutated. I think there was patch created for logging in.
        wait a second ...
    LK: I think that's a different one
    SG: I think that's the one we still need to discuss
    MA: what this comes down to is there are things nice to know and put in
        audit, but there is no secure way of doing that
    SG: there is but not bullet proof way
    MA: that's what I meant by secure
    SG: tim was mentioning that cups is a network device and you can cat what
        you want in it.
    MA: last comment by tim is that would work over unix domain sockets to.
    SG: it is possible to put the file name that audit record is based on.
    MA: it is really not, you are getting back to assuming client is honest with
        you and you can't make that assumption
    KW: sounds like a design fault if server trusts what the client sends it
    LK: I don't think it trusts it, and that's why server doesn't know the name
        of file
    SG: I am also wondering about type.
    PM: we have to check the label of the data
    SG: is it the label of the user. I really think we still got issues in this
        one that we need to look into, probably no action on this bug until
        after symposium
    MA: I want to get feedback on this, when it was posted to mailing list, we
        got feedback asking for title of job, so tracking can be done. and
        stephen smalley wanted level and range. it was pointed to me, for some
        users it won't always be $1_lpr_t. it may seem for the way we are using
        it is not ideal. but based on feedback, it seems it is doing what they
        want.
    GW: need to meet lspp
    LK: we think it does
    SG: there are others like NISPOM that we need to meet as well.
    LK: but that's what you want for lspp
    SG: but you are not getting user's label
    LK: we are getting user level and in lspp we don't care about type
    MA: and you can get the type if you make policy changes
    LK: steve, if you are interested in meeting other standards, we can talk
        about it. it would probably require some changes to maybe the protocol
        and the cups code.
    MA: maybe it can't even be done with this
    IB: should we keep this open and say it is needed for others
    GW: it appears to meet the lspp requirements. I would vote to remove it from
        this list, but continue to work on it for other requirements.
    IB: I'll talk to steve and we can decide on it
    KW: one thing not acceptable, is requiring a password for each print job,
        since that will break test cases.
    LK: that's a different bug as well
    KW: oh, didn't realize that
    SG: I thought there is another way for that also
    MA: yes, there is a different authentication way
    SG: goes back to what klaus said, system will meet requirements but maybe
        not as good as it can be from user experience.
    SG: doesn't lspp have requirements for identifying resources used in audit?
    KW: specific requirement is if you do security relevant operation on object.
        and we have that covered. on unix style system doing that reliably is
        hard
    MA: that's why you audit the data
    KW: I think audit process works for that
    LK: yeah, that's what we decided long time ago
    GW: we need to discuss more on this

231656 med med All [EMAIL PROTECTED] NEW NetLabel and IPsec management tools fail to start at boot

231695 med med ppc [EMAIL PROTECTED] ASSI LSPP: user unable to ssh to system with user/role/level c...
    LS: basically we can't log in as sysadm_r with a level. This is causing our
        tests to break. It used to work before, but we are seeing it on all
        updated systems now. I was getting some context error messages in log
        file. they are all posted in bugzilla.
    GW: Dan says you need to update the types and contexts files
    LS: why doesn't it work now. it used to before without having to change
        those files?
    KH: and this is a sysadm_r too, so it's not a custom role
    LS: yeah, that too ..
    LK: maybe update the bug, dan might have misunderstood
    LS: I'll do that

231690 hig med x86 [EMAIL PROTECTED] ASSI LSPP: system hangs under audit stress testing
    EP: I believe that is a duplicate of 228409 and we are waiting on stress
        tests with .68
    SG: that was a memory leak, and we think it's the same function. what's
        happening in the other one, turn out that Al's patch he sent this
        morning fixes three bugzillas. not a real duplicate, but same patch
        fixes all of them
    GW: ok, great


    GW: looks like we have some indefinite completion dates for some of these,
        and may need thorough discussions before fix can be attempted
    PM: Eric, I just verified 230255 and it looks fine.
    EP: ok, great, I'll take it off the list
    GW: sounds like it'll be hard to achieve the date we talked about, but I
        think we can drive towards that and do our best since we all agree.
        That's it and we can discuss more at the symposium, particularly what we
        want to do in the future, what we want to work better, and improvements.
    KW: I just posted new version for kickstart script. the changes are little,
        mainly minor cleanups. please send me feedback, this should be getting
        close to final.
    GW: I also posted latest iteration of self test with man page and policy. I
        also need to open a bug for aide, I can't execute it from command line.
    KW: this is related issue, so far there is no RH package for RBACPP. easiest
        way is to have it installed through kickstart. would that be ok with
        everyone, or do you prefer it in separate package.
    LK: sounds good to me
    KW: it would be package, and policy and docs
    LK: be good to get the policy changes in
    GW: I'll work with klaus on getting it in there
    SG: sounds like a good way to go
    GW: and my python scripts are still to be improved, so I would appreciate
        feedback on my scripts. Ok everyone if there is nothing else we'll
        adjourn. Thank you.

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to