RSBAC 1.0.5 and mailing list

From: (A. Ott)
Subject: RSBAC 1.0.5 and mailing list
Date: 27 Oct 1998 11:31:00 +0200

Next Article (by Date): Problems with 1.0.5 (A. Ott)
Articles sorted by: [Date] [Author] [Subject]

Hello to you all! :)

RSBAC 1.0.5 for 2.1.125 is out and can be downloaded from RSBAC
homepage at
and received per mail via majordomo RSBAC mailing list archive at

subscribe rsbac
in the body of a mail to majordomo to join the list, or
index rsbac
to get the file list. Files will be sent uuencoded.
(Use help to get help on majordomo mailing lists).


RSBAC is mostly a big patch for current Linux kernels. It is based
on the Generalized Framework for Access Control (GFAC) by Abrams and
LaPadula and provides a flexible system of access control based on
several modules.

All security relevant system calls are extended by security
enforcement code. This code calls the central decision component,
which in turn calls all active decision modules and generates a
combined decision. This decision is then enforced by the system call  

Decisions are based on the type of access (request type), the access
target and on the values of attributes attached to the subject calling
and to the target to be accessed. Additional independent attributes
can be used by individual modules, e.g. the privacy module (PM). All  
attributes are stored in fully protected directories, one on each
mounted device. Thus changes to attributes require special system calls  

As all types of access decisions are based on general decision requests,
many different security policies can be implemented as a decision
module. In the current RSBAC version (1.0.3), six modules are included:

MAC: Bell-LaPadula Mandatory Access Control (compartements not yet
CWI: Clark-Wilson-Integrity (only basics implemented)
FC:  Functional Control. A simple role based model, restricting access
     to security information to security officers and access to system
     information to administrators.
SIM: Security Information Modification. Only security
     administrators are allowed to modify data labeled as security
PM:  Privacy Model. Simone Fischer-Huebner's Privacy Model in its first
MS:  Malware Scan. Scan all files for malware on execution
     (optionally on all read accesses), deny access if infected.
     Currently the Linux viruses Bliss.A and Bliss.B and a handfull of
     others are detected.

A general goal of RSBAC is to some day reach Orange Bool (TCSEC) B1
level. For this many special problems have been and will have to be  

RSBAC Changes in recent versions

       - Port via 2.1.115 and 2.1.124 to 2.1.125
       - IPC targets: changed ids for sockets from pid/fd combination
         to pointer to sock structure, including (many) changes in the
       - Added socket level scanning (tcp and udp) to module Malware Scan.
         This feature can stop malware while still being transferred to
         your system. Added new attributes for IPC, process and file/dir
         targets to manage socket scan.
       - Reordered configuration options
       - Added CONFIG_RSBAC_NO_WRITE to totally disable writing to disk
         for testing purposes and kernel parameter rsbac_debug_no_write
         to temporarily disable disk writing
       - Added CONFIG_RSBAC_*_ROLE_PROTection for all role dependant
         modules: Now change-owner (setuid etc.) can be restricted
         between users with special roles - see configuration help for
       - Some more bugfixes, mostly to decision modules

       - Rewrote most of attribute saving to disk. Now disk writing is
         never done with a spinlock held, increasing stability
         (is this a taboo? if yes, where is it documented?)
       - Changed write-to-disk behaviour: The old immediate write is no
         longer default, but optional (CONFIG_RSBAC_SYNC_WRITE). Instead,
         sys_rsbac_write can be used from user space or a kernel daemon
         can be activated to write changes automatically every n seconds
       - Added kernel param rsbac_debug_auto for the daemon - gives a
         good overview of attribute change rate
       - Added proc interface for statistics and many RSBAC settings
       - Added rsbac_adf_request calls MODIFY_SYSTEM_DATA to sysctl.c
       - Wrote man pages for all RSBAC syscalls
         (in Documentation/rsbac/man)
       - Added version information and check for all file/dir/dev aci
         and for log_levels
       - Added some more scan strings to Malware Scan module, had to
         change string representation to a more general way

Amon Ott.


To unsubscribe (A. Ott) from the rsbac list, send a mail to with
unsubscribe rsbac
as single line in the body.

Next Article (by Date): Problems with 1.0.5 (A. Ott)
Articles sorted by: [Date] [Author] [Subject]

Go to Compuniverse LWGate Home Page.