04/02/2007 lspp Meeting Minutes:
===============================
Attendees
Robin Redden (IBM) - RR
Lawrence Wilson (IBM) - LW
George Wilson (IBM) - GW
Kris Wilson (IBM) - KEW
Loulwa Salem (IBM) - LS
Debora Velarde (IBM) - DV
Michael Thompson (IBM) - MT
Joy Latten (IBM) - JL
Klaus Kiwi (IBM) - KK
Trevor Highland (IBM) - TH
Steve Grubb (Red Hat) - SG
Dan Walsh (Red Hat) - DW
Eric Paris (Red Hat) - EP
Lisa Smith (HP) - LMS
Linda Knippers (HP) - LK
Amy Griffis (HP) - AG
Matt Anderson (HP) - MA
Paul Moore (HP) - PM
Klaus Weidner (Atsec) - KW
Chad Hanson (TCS) - CH
Joe Nall - JN
Agenda:
General Issues
Bug Discussion
Repo: http://people.redhat.com/sgrubb/files/lspp/
RHEL 5+ Packages
acl-2.2.39-2.1.el5
* aide-0.12-8.el5
audit-1.3.1-3.el5
audit-libs-1.3.1-3.el5
audit-libs-devel-1.3.1-3.el5
audit-libs-python-1.3.1-3.el5
cups-1.2.4-11.8.el5
cups-devel-1.2.4-11.8.el5
cups-libs-1.2.4-11.8.el5
ipsec-tools-0.6.5-6.2.el5
kernel-2.6.18-8.1.1.lspp.72.el5
kernel-devel-2.6.18-8.1.1.lspp.72.el5
kernel-doc-2.6.18-8.1.1.lspp.72.el5
libacl-2.2.39-2.1.el5
libacl-devel-2.2.39-2.1.el5
libselinux-1.33.4-4.el5
libselinux-devel-1.33.4-4.el5
libselinux-python-1.33.4-4.el5
mcstrans-0.2.3-1.el5
openssh-4.3p2-20.el5
openssh-askpass-4.3p2-20.el5
openssh-clients-4.3p2-20.el5
openssh-server-4.3p2-20.el5
* pam-0.99.6.2-3.18.el5
* pam-devel-0.99.6.2-3.18.el5
selinux-policy-2.4.6-45.el5
selinux-policy-devel-2.4.6-45.el5
selinux-policy-mls-2.4.6-45.el5
selinux-policy-strict-2.4.6-45.el5
selinux-policy-targeted-2.4.6-45.el5
vixie-cron-4.1-67.el5
lspp-eal4-config-ibm-0.25-1 (likely 26 for *'d above)
rbac-self-test (TBD in config RPM)
Tracker Bug:
https://bugzilla.redhat.com/bugzilla/showdependencytree.cgi?id=224041
Query:
https://bugzilla.redhat.com/bugzilla/buglist.cgi?cmdtype=runnamed&namedcmd=RHEL%205.0%20LSPP&[EMAIL PROTECTED]&order=bugs.bug_id
GW: Someone saw a lockup I think
LS: that was Joe, he sent out an email to the list.
JN: yeah. I saw a lockup, I sent the dmesg output where you see the lockup.
If I stress it I see
where it hangs and is not responsive at all. I am not sure how to debug
it
GW: is this on .72?
JN: both 72 and 71. I am trying to get another machine since mine right now
has all these user space applications on it as well
EP: when it's hung, does the magic sys-request key work?
JN: I can't get what you're saying. but it just hangs
MA: for final kernel are we disabling that?
GW: it's usually disabled through proc. Ok, any general issue before we get
started on the bug list. We were discussing the lockup Joe was seeing,
he is running in a virtualized environment is that 32 bit kernel?
JN: yes
GW: ok, other issues .. I'll note there are at least 3 bugs I know of that
we need to add to the list.
SG: I think I also took three bugs off the list
GW: we are down to 9. very good
Bug List:
218386 med nor pow [EMAIL PROTECTED] ASSI LSPP: labeled ipsec does not
work over loopback
JL: I think I have it working. I prefer to have one more day of stress for
my peace of mind. So far no problems. I'll ifdef all our changes. I
think it'll be better chance to get them upstream that way.
JN: are we gonna package configurations that set local ipaddress for ipsec?
or will it be manual configs later
KW: good idea to add that to configuration script.
JN: It's dramatically slow with initial sockets now when you make connection
PM: I'd be nervous about turning ipsec on unless we have to
KW: So we can add the sysctl to the kickstart script
JN: My question is are we gonna have labeled sockets by default
KW: no, but if people activate ipsec, that should work then.
JL: you mean in the script to have it on by default?
KW: this is based on a mail that paul sent to the mail list. My
understanding that this won't do anything unless you turn it on, which
will then enable negotiation with localhost.
PM: I misunderstood your initial statement Klaus, now I think that's an
excellent idea.
JL: I think it's a good idea too. it'll throw people off at first if they
think it is not working.
KW: if you have kind of labeled networking then people think it is not
protecting local host
JN: if you are not enabling by default, would domains talk to each other if
allow rules allow it
KW: yes
JN: how would you get lspp certification then?
KW: it says you have to enable ipsec or cipso for the evaluation. The
evaluator says it's ok that you have to choose one or other in
configuration to have the evaluated system
JN: so it's not on by default
KW: yes. you have to do the configuration
JN: we have been using an rpm that does our configuration for us for some
time
PM: once Joy posts this updated patch, would it be possible to spin an ipsec
tools package so we can test with it
SG: that would be the plan, question is how long it takes to happen? The
maintainer is in England so if we get it early on, we might be able to
get one in the same day, otherwise we might wait until next day
GW: So we're gonna carry an ipsec package, do we need a bug for that then?
SG: it has one
EP: is that bug still against kernel
JL: we need to change it against tools
GW: I'll change it now and I put a comment that joy will do another day of
testing.
225443 med nor ppc [EMAIL PROTECTED] ASSI LSPP: No
console login on first boot
SG: I closed it. Dan has that in a new policy.
GW: I have not verified it
LK: we want that open
GW: yeah, until we verify it at least
KW: did it work for Debbie? she sent me a note on Friday
SG: policy change that dan made was about 1 hour ago, and it's still not
pushed out
KW: ok, so probably she didn't have it then
DV: yeah, I'll try with the new policy
GW: Klaus.. by the way, I also sent you a patch for pam and aide.
SG: I'll push policy as soon as telecon is over
GW: I'll test with it
228366 med nor All [EMAIL PROTECTED] ASSI LSPP: audit does not log obj
label for signal recipient
SG: Eric, I think we need an update on that bugzilla. I think it was
included and it's status is awaiting test
EP: yes correct
GW: ok, I'm making note of that
231090 med urg ppc [EMAIL PROTECTED] ASSI LSPP: getattr
causes python Segfault
GW: needs to be retested, this was a bug opened by Kylie
KK: is it specific to s390?
GW: no, ppc
KK: Ok, I can test it, can you add me to CC list?
GW: yes, thank you
231392 hig med All [EMAIL PROTECTED] NEW LSPP: Misc soft-lockups in x86_64
lspp.67 kernel
EP: most of those were solved, but one was still seen. stephen Smalley and I
looked at it, and we are not sure what the problem is. I don't think it
is a blocking thing, since it shows that the cpu was slow getting back
to us. I'll look at it but if we and IBM can't reproduce it, I think
it'll fall to the side
231529 hig med All [EMAIL PROTECTED] ASSI [LSPP] bogus audit records with
cups printing
SG: I'm still working on it, I haven't decided one way or another on that
one yet
GW: putting note in bug.
233153 med med x86 [EMAIL PROTECTED] ASSI LSPP: semanage not always
removing entry from /etc/selinu...
LS: joy and I are looking at it, we are trying to figure out how the test
case is functioning. It seems like the test case is not cleaning up
properly. We will run it and see if we still see the same behavior.
GW: noting that in the bug
234077 med med ppc [EMAIL PROTECTED] NEW LSPP: ppc 32-bit pread not
correctly auditing 4th arg (of...
EP: that one looks like it's not lspp blocker so I can take it off the list.
It is working as designed and I just need to explain that
MT: ok, can you please explain it.
EP: we were passing 64 bit offset and since we are in 32 bit in userspace,
it gets broken into registers, so we always get 0 for the upper
registers.
MT: have you tried logging in something that will show a value
EP: I'll work on that today if I get chance. It looks like pwrite will also
have this problem. All the calls that have this 32/64 issue will, and
possible they always did but no one noticed before. I sent a message to
David Woodhouse who is the ppc/audit guy asking if he has ideas on how
to log this. Looks like that one will likely get explained in there as
not
a bug
MT: klaus you also said that it is not a security bug as well.
234485 med med All [EMAIL PROTECTED] ASSI LSPP: when searching for larval
SAs check the protocol too
JL: It's done. I tested and it's been accepted into upstream kernel.
GW: I am updating the bug
SG: was that in .72 kernel?
JL: I put a note in the bug in .. it was in the .70 kernel
EP: this fix has been in there for quite a number of releases
JL: I don't know if I have power to change states in RH bugs, so I am adding
notes to them
EP: that's what you should be doing. thanks
234491 med med All [EMAIL PROTECTED] ASSI LSPP: kernel sends additional
ACQUIRES that racoon is not...
JL: already submitted patch to ipsec tools but they didn't pick it up yet
SG: did you attach bug to bugzilla
JL: let me check ..
GW: would you please attach the patch?
SG: if we can get that one along with the other patch, we can probably put
them in the same release.
JL: I sent the patch out on the list at some point, but I'll attach it to
the bug
GW: I'll make a not in the bug
234781 incorrect info in pam selinux audit record
GW: linda reported this one
LK: I had a conversation with our evaluator. It's not blocking anything.
it's just wrong
SG: we should make sure it's fixed and pushed out so it's not lost in the
cracks. It sounds likes it's simple to fix
LK: If it was simple I would make a patch, but it seems the info is not
available to the audit record, so we either need to change where we
audit from or pass more info around
GW: I'll add it's not lspp blocking but good to fix to the bug
234885 aide pol causes ..
GW: just opened this, I attached a policy module to make aide work
correctly. one issue is the /var/log/aide directory is getting set to
low
DW: there is a bug in file context description, a "?" mark was missing. I
took most of your changes and added couple of extra ones. Hopefully the
-50 policy will fix the problem.
GW: ok.. thank you
234889 cups jobs with sysadm_r...
KK: I was talking with Matt and I wanted to hear klaus W and other's opinion
on this. Everyone on system has fileread perms to read up, but not true
for print jobs. This seems stricter than mls for me. just wanted to get
other people's opinion about it
KW: in general it is not a problem if you are being more strict .. but good
to have it
LK: my question, when did sysadm_t get the overrides?
DW: secadm used to have it, and then sysadm needed it to change level and
such
KW: I think late last year that happend when secadm got deprecated
DW: sysadm needed to do change con
KW: sysadm needed to do all that secadm used to do
LK: ok, I see. I remember that I just wanted to check.
DW: ..
KK: we need to change to lpr_t, and since lpr_t does not have the attribute,
it can't read up. It is just adding mlsfilereadup in the ldp_t
interface.
DW: I'll take a look at it
MA: as long as there is a note on there. it seems all they get is job title
which we don't consider it to be sensitive info.
KK: only role using this interface is sysadm .. so I think it is secure to
allow it to mlsfileread to lpr_t.
DW: I'll look at it
GW: Anything else
MT: I have question for steve and klaus. when you do autorelabel, is there
supposed to be audit message generated?
SG: yes, I've seen it before
KW: not a requirement to have it since this is not a normal system use
EP: Is audit even running then
SG: answer is yes and no .. It's auditing but it's not going to audit log
EP: probably going to the console then picked up later
SG: in the past we talked about having mode of audit daemon when it starts
up, it can queue everything and then dump it there, to make sure it is
not full.
KW: it's not critical to do that.
SG: if we do something on boot up and it gets AVC that don't get audited,
that might be a customer issue.
MT: second question; we are using pam_tally2 to record failed loging. when
you successfully log in it resets it.
KW: it is exactly what it should behave like
MT: ok we were not sure
KW: it is there to limit attempts you can make.
GW: anyone else has anything to talk about
KW: george qustion for you .. do you think self tests are ready to be
integrated?
GW: yes, it's close. Even if it is not 100% there, I think we should package
it and push it out anyway so people can run it and give me feedpack.
I'll try to make spec file changes and produce a patch for you
SG: at some point we also need to go over the audit lspp.conf file. I took a
short look at that couple of weeks ago, but I think we need to expand
watches considerably. so far we have not come up with what files are
security relevant.
GW: we have idea what they are
SG: I think we need to open a bugzilla for that to track it and as group we
can decide
GW: and I think those would be similar to what the aide policy is checking.
we might want to watch a significant subset of what we watch with aide
SG: is there an aide configurations separate than what is shipped
GW: I think it might be similar
SG: aide is directory oriented, but watches are based on file buy file so
audit system can be fine grained. I'll open a bugzilla. I wanted to wait
until the end, and it looks like we are close to the end. I wanted to
see what packages make it, for example printing and selinux subdirs that
we didn't worry about in CAPP need to be added now
GW: this aide has specific files in it too, I am just looking at
configuration now
SG: there is an overlap, but aide is directory oriented while audit system
can't do recursive auditing on directories so...
GW: we can harmonize audit configurations then. Any other issues. we are
getting near the end. What about things that need to make it into the
update. you said some need to make it in ..
SG: that was some internal milestones. all these lspp changes are in any new
development we are doing.
GW: ok. Anything else anyone wants to talk about. ok .. we'll adjourn ..
thanks everyone
--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp