From: ao@morpork.shnet.org (A. Ott)
Subject: Plans with RSBAC
Date: 07 Oct 1999 14:43:00 +0200
Next Article (by Subject): Re: Plans with RSBAC Vadim Kogan
Previous Article (by Subject): Re: patch-2.2.13 ao@morpork.shnet.org (A. Ott)
Next in Thread: Re: Plans with RSBAC Vadim Kogan
Articles sorted by: [Date]
[Author]
[Subject]
Hi all! I'd like to discuss my current RSBAC wishlist with interested people like you. Please give comments and new wishes, if you need something else - this is another planning phase to keep me busy for a while... ;) I currently plan to add or change the following (in time order): - Add ACL groups: - Every user can define personal as well as global groups of users. - Groups have a group id (u_long), a name (16 chars), an owner (a uid) and a type (global or personal). - Every user can use every global, but only her own personal groups. - Every user can manage only groups owned by herself. - Group ownership can be changed (not sure yet), default is creator. - There is no overall group admin, because every user can do the job, e.g. secoff - One admin tool acl_group for all these functions. - Do we need ACL menu tools, or are the command line tools sufficient? - Enhance control of sysctrl access to prevent system configuration attacks - Change RSBAC socket identification and access control: - Current socket id is hardly usable outside kernel - Currently only the use of local sockets is checked, regardless of destination - New socket ID contains IP (0.0.0.0 for all), port, protocol - Target IDs for IPC/socket contain two IDs: local and remote - RSBAC Socket objects become persistent, they won't be deleted when the socket is destroyed. - When a socket is derived from another (e.g. accepting a connection), attributes are inherited (decision module dependent, in adf_set_attr() call as usual) - CREATE and *_OPEN requests are still used for local socket creation and address binding, but not for connections and sending/receiving - Three new requests are used for the latter: - CONNECT, target IPC/socket with local and remote ID, connection to/ from remote - SENDTO, target IPC/socket with local and remote ID, sending packets without connection - RECEIVE_FROM, target IPC/socket with local and remote ID, receiving packets without connection - Local loopback connections are treated like remote connections. - With this new structure, we get real access control for network communication, though still based on (rather insecure) IP and port. Difference to firewall packet filter: User, program and process state dependent. - Based on the new socket scheme: Add socket attribute transfer on connection/packet sending with IP options -- ## CrossPoint v3.11 ## - To unsubscribe from the rsbac list, send a mail to majordomo@morpork.shnet.org with unsubscribe rsbac as single line in the body.
Next Article (by Subject): Re: Plans with RSBAC Vadim Kogan
Previous Article (by Subject): Re: patch-2.2.13 ao@morpork.shnet.org (A. Ott)
Next in Thread: Re: Plans with RSBAC Vadim Kogan
Articles sorted by: [Date]
[Author]
[Subject]