More Clarifications: Fine-grained file access

Chad Sellers posted some thoughtful comments about my previous posting. So this posting is my reply.

1) Concerning fine-grained labeling:
I believe Josh's point was that you didn't have fine-grained labeling on files. And using a loopback filesystem (bind mount to us Linux users) or network filesystem is a hack that becomes necessary when you don't have this sort of per-file labeling.

Actually, I tend to view per-file labeling as a hack.

After years of experience with extended file attributes in Trusted Solaris, we decided that fine-grained file labeling created a false sense of security. The labeling of files was easily bypassed. For example, if you mounted a multilevel UFS file system from Trusted Solaris 8 on a standard Solaris system, the labels were ignored. Similarly, an all-privileged subject could ignore labels.  Operating with unlabeled NFS servers was problematic and error prone. Customers were forced to use our special version of UFS instead of their preferred file systems.

Then there was the issue of complexity. Not only were there performance issues with performing MAC checks on file access, but there was the complexity of archiving the labeled filesystems. In Trusted Solaris we required customized archival tools which were not supported by major vendors. Non-standard NFS protocol extensions were required. Privileged users could change the labels of files in ways that prevented the system from working correctly. Pathname traversals would fail because directories had a higher label than the files they contained. Applications needed to be analyzed to determine if they needed multilevel directories or special labeling privileges.

Finally there was the issue of multilevel databases and documentation systems. These environments maintain finer-grained labeling than we could provide at the file system level.

When we realized that we could build multilevel environments without creating customized file systems we saw this as an elegant solution, not a hack. There was still significant engineering required to make the labeling policy robust and automatic. There were many small leaks to stop. But any lingering doubt was removed when we first ran ZFS with Trusted Extensions. It worked properly with no customization, and provided the reliability, scalability, and convenience that we were lacking in Trusted Solaris 8. Now each zone (domain for you SELinux users) has its own file system, and we can clone zones instantaneouly via ZFS snapshots. It's very cool.


2) Concerning constraining the global zone: Josh's point was that the global zone wasn't constrained by the zone infrastructure. I realize that all processes (even those in the global zone) are constrained by privileges (seem to be analogous to capabilities in the Linux world), but from what I can tell these are coarse-grained privileges that are not bound to a particular object (please correct me if I'm wrong). So, as soon as a privileged process needs to write one file it doesn't own, you grant it file_dac_write and it can write to any file it doesn't own. This is why you need per-file labeling (which TSOL had) to begin with. Privileges are not sufficient.

It's true that privileges by themselves can be fairly coarse. But modern file systems provide Access Control Lists which are sufficiently granular. While this is an example of a DAC policy, not MAC, it is robust when applied to root-owned files. To prevent privilege escalation, Solaris 10 doesn't honor privileges like file_dac_write when applied to root-owned objects. And there are no privileges to override the mount policy thus ensuring that label relationships are always correct. Lower-level files can only be mounted read-only.

Like all developement efforts, Trusted Extensions is a moving target. We are working with the ZFS team to provide file encryption based on zone labels. We feel that this is ultimately more secure than extended file attributes.
Comments:

How is the label based encryption coming? Is there a good location to view the latest adventures? Thanks

Posted by Robert Bailey on February 27, 2007 at 08:13 AM PST #

The upcoming label-based encryption is one of the outcomes of the ZFS on-disk encryption project: http://www.opensolaris.org/os/project/zfs-crypto/

Posted by Glenn Faden on March 08, 2007 at 03:48 AM PST #

Post a Comment:
  • HTML Syntax: NOT allowed
About

This blog explores some of the security features of Oracle Solaris. In particular, topics such as Role-Based Access Control and Labeled Security are my special interests.

Search

Categories
Archives
« April 2014
SunMonTueWedThuFriSat
  
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
   
       
Today
Bookmarks