Rich access control lists
Rich access control lists
Posted Oct 21, 2015 21:16 UTC (Wed) by dlang (guest, #313)In reply to: Rich access control lists by dlang
Parent article: Rich access control lists
Posted Oct 21, 2015 21:24 UTC (Wed)
by fandingo (guest, #67019)
[Link] (15 responses)
Not everything is centralized either. Additionally, you'd use this exact same append-only policy on the files that syslog does write, making your point moot. I don't know about you, but I don't run my applications or centralized syslog systems on a file server.
Posted Oct 21, 2015 21:31 UTC (Wed)
by dlang (guest, #313)
[Link] (14 responses)
Posted Oct 21, 2015 22:02 UTC (Wed)
by fandingo (guest, #67019)
[Link] (13 responses)
Posted Oct 21, 2015 22:38 UTC (Wed)
by Cyberax (✭ supporter ✭, #52523)
[Link] (12 responses)
And there are much better ways to do it already, anyway.
Do you have less contrived examples? Preferably not involving a "mainframe shared among faculty and students" textbook scenario that is pretty much irrelevant right now.
Posted Oct 21, 2015 23:03 UTC (Wed)
by fandingo (guest, #67019)
[Link] (11 responses)
> A compromised application can just spam the log files with 2Mb zero-filled data pages. It will scramble other writers and make analysis difficult.
That's better than a 0B file that was maliciously truncated...
Posted Oct 21, 2015 23:19 UTC (Wed)
by dlang (guest, #313)
[Link] (3 responses)
Anything important like that sort of log data, I want off on a separate machine.
Posted Oct 22, 2015 0:04 UTC (Thu)
by fandingo (guest, #67019)
[Link] (2 responses)
I already addressed this in a previous comment.
>> Additionally, you'd use this exact same append-only policy on the files that syslog does write, making your point moot.
Wherever that data hits disk, it's advantageous to be able to restrict to `append_data`, even when that writing is happening on a separate system.
Posted Oct 22, 2015 0:09 UTC (Thu)
by dlang (guest, #313)
[Link] (1 responses)
advantageous, yes
but worth how much in the face of the added complications, bugs and performance hit?
Also, to make use of this, the applications are going to have to be modified in linux-only ways. Some apps won't care, but others try to be cross platform, so this sort of churn won't be welcome.
Posted Oct 22, 2015 0:56 UTC (Thu)
by fandingo (guest, #67019)
[Link]
It's worth 42. I don't know how to answer the obviously loaded, rhetorical question. You'll need to offer data about performance implications before I'll get into that topic; it's just FUD otherwise.
> Also, to make use of this, the applications are going to have to be modified in linux-only ways. Some apps won't care, but others try to be cross platform, so this sort of churn won't be welcome.
For the most part, this isn't something that applications will interact with at all. (I suppose beyond EACCESS when there is a violation, but they have to deal with that anyways.) It will be handled just like SELinux policy: The Linux distribution writes and maintains it.
There is specialized software that may need to interact with Richacl specifically, but I just don't see it being a major problem. The only places where it may cause a problem is when a project is sloppy with it's open(2) mode flags, which should be tightened regardless of Richacl. If a piece of software is diligent, writing a policy for that software package isn't any challenge.
Posted Oct 22, 2015 0:17 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link] (6 responses)
Append-only mode also does not guarantee atomicity, so I'm curious to see the actual systems that depend on it. I'm not aware of anything non-trivial.
Posted Oct 22, 2015 0:27 UTC (Thu)
by smckay (guest, #103253)
[Link] (1 responses)
Posted Oct 22, 2015 0:29 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link]
Posted Oct 22, 2015 1:13 UTC (Thu)
by fandingo (guest, #67019)
[Link] (3 responses)
> so I'm curious to see the actual systems that depend on it.
I'm not sure any piece of software itself could "depend" on it. From the software's perspective, it's just eliminating extraneous syscalls and mode flags. It's the software distribution's (or perhaps the adventurous sys admin's) job to write and distribute a policy. The policy separation and delegation to distributions is same as SELinux.
Posted Oct 22, 2015 1:30 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link] (2 responses)
Of course, some people might also forbid any file activity on Sundays, so we need a special permission for that as well.
Posted Oct 22, 2015 1:50 UTC (Thu)
by fandingo (guest, #67019)
[Link] (1 responses)
Nonetheless, I doubt you'd have many people in such a scheme. But, let's dial it back from absurdity.
Posted Oct 22, 2015 22:58 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link]
At least with modebits I can understand what's happening immediately. With Windows ACLs you can't do that - you have to carefully evaluate the rules, keeping their order in mind. POSIX ACLs are ok-ish, they at least play nicely with the regular Unix permissions.
And your examples are so far extremely poor. If you need to constrain a daemon to use only O_APPEND - then write an LSM module for that. No need at all to rape file permissions. And if you are doing it over NFS then get a proper rsyslog, for FSM's sake.
So what are other examples, apart from the contrived O_APPEND?
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
If you want real WORM for auditing purposes then file permissions are not enough.
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists