PERFORCE change 20064 for review
Robert Watson
rwatson at freebsd.org
Thu Oct 24 19:17:28 GMT 2002
Note that this is arguably incorrect for all policies but LOMAC, since
"fail stop" is the desired behavior for Biba, MLS, SELinux, and others.
This is why I changed the default for cow to off. We should look into a
way to provide both what LOMAC and the other policies need, perhaps by
having two entry points: one for the purpose of downgrading with COW, one
without. In particular, pay attention to cases like:
LOMAC wants to downgrade write to read-only
Biba wants to remove write entirely
The desired composition in this case is probably the Biba result.
Robert N M Watson FreeBSD Core Team, TrustedBSD Projects
robert at fledge.watson.org Network Associates Laboratories
On Thu, 24 Oct 2002, Brian Feldman wrote:
> http://perforce.freebsd.org/chv.cgi?CH=20064
>
> Change 20064 by green at green_laptop_2 on 2002/10/24 11:42:34
>
> Change default MAC VM permissions to:
>
> security.mac.enforce_vm: 1
> security.mac.mmap_revocation: 0
> security.mac.mmap_revocation_via_cow: 1
>
> Affected files ...
>
> .. //depot/projects/trustedbsd/mac/sys/kern/kern_mac.c#327 edit
>
> Differences ...
>
> ==== //depot/projects/trustedbsd/mac/sys/kern/kern_mac.c#327 (text+ko) ====
>
> @@ -142,7 +142,7 @@
> &mac_enforce_sysctl, 0, "Enforce MAC policy on sysctl operations");
> TUNABLE_INT("security.mac.enforce_sysctl", &mac_enforce_sysctl);
>
> -static int mac_enforce_vm = 0;
> +static int mac_enforce_vm = 1;
> SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
> &mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
> TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
> @@ -157,7 +157,7 @@
> SYSCTL_INT(_security_mac, OID_AUTO, mmap_revocation, CTLFLAG_RW,
> &mac_mmap_revocation, 0, "Revoke mmap access to files on subject "
> "relabel");
> -static int mac_mmap_revocation_via_cow = 0;
> +static int mac_mmap_revocation_via_cow = 1;
> SYSCTL_INT(_security_mac, OID_AUTO, mmap_revocation_via_cow, CTLFLAG_RW,
> &mac_mmap_revocation_via_cow, 0, "Revoke mmap access to files via "
> "copy-on-write semantics, or by removing all write access");
>
To Unsubscribe: send mail to majordomo at trustedbsd.org
with "unsubscribe trustedbsd-cvs" in the body of the message
More information about the trustedbsd-cvs
mailing list