[rsbac] Re: Security patches
Amon Ott
ao at rsbac.org
Mon Dec 1 14:25:18 CET 2003
On Samstag, 29. November 2003 10:05, Martin Pitt wrote:
> RSBAC has a lot of nice features and seems pretty well designed, but I
> do not use it because of the following:
>
> - Security policies (ACLs etc.) are altered by calling command line
> programs which modify binary files. I don't quite like that, I'm
> more fond of keeping everything in a single human-readable
> configuration file. But that is really a matter of taste.
To make it clear: Of course, no binary executables get touched, rather the
persistent configuration is stored in fully protected binary files, which are
thus safe from tampering.
> - It needs an extra account ("security officer" with UID 400) which is
> a pretty bad idea IMHO. Since once you are SO (cracked/sniffed
> password etc.), you can alter anything which seems like a giant
> security risk to me.
You are only talking about the default configuration here, which is meant to
get you going. Several of the implemented security models in the RSBAC
framework support real separation of duty, e.g. with RC model you can
distribute administration over many different roles for many different
accounts.
Additionally, how would you become uid 400, if you are not allowed to setuid
to this id? Or what would it help you, if the administrative rights got
removed? This is an important difference to root - the system starts as root,
so there is no way to protect the uid.
Now, in contrast, think of global configuration files: Once you are allowed to
alter them, there is absolutely no control over what you do to them - this is
what I call really dangerous. You cannot even remove the files, because you
need them. So complete kernel level administration control is necessary for
separation of duty, not some fancy thing.
Amon.
--
http://www.rsbac.org - GnuPG: 2048g/5DEAAA30 2002-10-22
More information about the rsbac
mailing list