SELinux Symposium

HOME

Participants
FAQ

Symposium Committees

Previous Meetings
2007 Symposium
2006 Symposium
2005 Symposium
2004 Meeting

Sponsors

Sponsorship opportunities

Contact Us

News


2007 SELinux Symposium Abstracts



The Design and Implementation of a Guard Installation and Administration Framework

Boyd Fletcher and Christopher Roberts, United States Joint Forces Command J9

The Guard Installation and Administration Framework is a set of applications and processes to reduce the develop- ment costs for building installation and maintenance subsystems for SE Linux based cross domain guarding solu- tions. This paper discusses the issues with the development a SE Linux based guards and our solutions to them.


FCGlob: A new SELinux file context syntax

Donald Miner, UMBC


James Athey, Tresys Technology

A new syntax designed to replace the usage of regular expressions in SELinux\'s file contexts is proposed, named FCGlob. There are several major problems with using regular expressions for file contexts, such as an approximated sorting, ambiguous declarations, common user er rors, obfuscation due to cleverness and the difficulty in finding set relationships. FCGlob is designed to address all of these problems by using a simpler syntax that is more tailored to matching UNIX file paths. The new syntax encourages clear and simple patterns, discourages cleverness and laziness and makes it easy for a computer to analyze. In addition to fixing several problems, FCGlob also opens the door to several enhancements. The basis for most enhancements is the use of a tree data structure as apposed to a linear list that that is used in the current implementation of file contexts. Several benefits result from the usage of a tree structure, such as a faster matchpathcon and the possibility for many new features. Implementing the FCGlob prototype can be done without making any changes to libselinux by converting all the FCGlobs into regular expressions and ordering them in a linear list. This way not too much work has to be done to demonstrate the advantages of FCGlob. If the prototype is successful and accepted it can then be integrated into libselinux as a complete replacement.


Setroubleshoot: A User Friendly Tool to Diagnose AVC Denials

John Dennis, Red Hat

Practical experience with the deployment of SELinux has shown it is often disabled in the field negating its promise. Anecdotal evidence suggests software developers and end users consider it difficult to use, comprehend, and the root cause of mysterious failures. Perceived as productivity barrier the expedient solution is to disable it. A new tool has been developed which exposes AVC denials in real time and interacts with a user presenting information in a friendly manner explaining the current denial and suggesting possible solutions. Replacing the hidden, often obscure failures in software which only occur when SELinux is enabled with friendly notification of SELinux\'s actions will improve the use experience fostering adoption.


Integrating SELinux with Securiy-typed Languages

Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, Pennsylvania State University

Recent advances in the area of security-typed languages have enabled the development of realistic applications aware of information flow security. Traditionally, operat- ing systems have enforced MAC with minimal dependence on application programs. Although these approaches have common goals, they have progressed independently. How- ever, there are many cases where systems depend on user- level programs to enforce information flows, so integration of information flow enforcement between the operating sys- tems and security-typed applications would be beneficial. In this paper, we examine what it takes to integrate information flow enforcement of a security-typed extension of Java with SELinux. We find that SELinux has most of the necessary features to build a proof-of-concept system, but other ser- vices are necessary, such as verifying compliance between information flow policies. Ultimately, we are optimistic that the comprehensive access control enforcement of SELinux will be ideal for integration with these security-typed applications.


Integrating X.Org with Security-Enhanced Linux

Eamon Walsh, National Security Agency

The proposed paper will outline the progress that has been made on adding Security-Enhanced Linux policy support to the X Window System, a major component of the Linux desktop. The work consists of two modifications to the X.Org X server implementation, as well as supporting infrastructure in libselinux. The first modification is the replacement of the existing X server Security extension with a more general framework of hook functions and security state, similar to the Linux Security Module. The second modification is a new X server extension which provides trusted path input and window labeling, and acts as an SELinux object manager, extending the enforcement of a kernel-based security policy to the X server in userspace.


Using GConf as an Example of How to Create an Userspace Object Manager

James Carter, National Security Agency

It has become apparent that many people want some of the benefits of MLS but in a way that is easier to use than the full MLS implementation.

There are various strategies that can be used to provide security controls over an application under SELinux. One strategy is to turn the program into a userspace object manager. Since the SELinux kernel object managers cannot control objects that are only visible in userspace, creating userspace object managers is a natural part of implementing the flask architecture on Linux. GConf is a configuration system for GNOME and controls configuration keys and values which are not visible to the kernel. This paper discusses the general process of providing SELinux controls over a program and the specific steps taken to provide SELinux controls over GConf.


Porting Legacy Multilevel Secure Applications to Security Enhanced Linux

Andy Suchoski and Rick Supplee, Hewlett Packard Company

This paper reflects a work in progress and will discuss issues in migrating applications from legacy Multilevel Secure (MLS) systems to Security Enhanced Linux (SELinux). Initially, security architectural similarities and differences will be discussed. This will provide a basis for discussing the actual migration of code from Trusted Solaris to SELinux. Although the examples in the paper are simple, they illustrate basic principles that will be used in porting code and performing policy work in moving applications from Trusted Solaris to SELinux. The areas covered are not exhaustive but do discuss how the main security features of sensitivity labels, process privileges, roles, and authorizations in Trusted Solaris map to SELinux. Additionally, areas where functionality does not currently exist in SELinux will be noted. Finally, conclusions will be offered and direction for further work.


Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls

Machon Gregory and Peter Loscocco, National Security Agency

Risk Adaptable Access Control is an important emerging technology tha t has gained the attention of many people as a way to change the current information dissemination policies. Systems implementing Risk Adaptable Access Controls have the ability to enforce a flexible mandatory access control policy based on various changing factors, such as situational and environmental factors. Unfortunately, commonly deployed systems are unable to the reliably support this type of access control, but by using existing technology the desired capable could be built. Applications of the Flask Security Architecture is such use of existing technology. This paper describes Risk Adaptable Access Controls and how the Flask Security Architecture can be used to provide the desired functionality. It describes how this was done in the creation of a prototype RAdAC system.


Security-Enhanced Darwin: Porting SELinux to Mac OS X

Christopher Vance, Todd Miller, and Rob Dekelbaum, SPARTA, Inc.

Security-Enhanced Darwin (SEDarwin) is a port of access control elements derived from NSA\'s Security Enhanced Linux (SELinux) to Darwin, the Open Source core of Apple\'s Mac OS X operating system. Apple\'s Mac OS X operating system combines both Open Source and proprietary technologies into a widely-used, production-quality UNIX-based workstation. Because Darwin is available under an Open Source license, it is possible to add mandatory access controls while still maintaining compatibility with the large base of user space applications, proprietary graphical components, and programming frameworks. While it was straightforward to port many of the SELinux components, Darwin\'s unique architecture meant significant new engineering was necessary in order to provide SELinux-style access controls consistently across the entire system. This paper will describe the component technologies in Darwin, the areas of significant new development, and provide comparisons to SELinux.


Madison: A New Approach to Automated Policy Generation

Karl MacMillan, Red Hat

This paper introduces a new library and associated tools, called Madison, for automatic policy generation. Madison includes features that address all aspects of fully automated and user guided policy generation, but has a particular focus on the generation of policy statements similar in form to hand-written reference policy modules. This focus allows Madison to compliment the existing tools that perform automatic policy generation. The policy modules generated by Madison use reference policy interface calls and allow rules in accordance with the encapsulation rules of the reference policy. Producing these interface calls requires infrastructure to parse reference policy headers, analysis routines to determine the access allowed by each interface, and a novel approach to optimizing the set of interface calls for a module that is computationally tractable.


Enforcing flexible access control in a networked policy domain

Joshua Brindle, Karen Vance, and Chad Sellers, Tresys Technology

Significant progress toward general acceptance of applying mandatory access control to systems has been made recently. Security Enhanced Linux (SELinux), in particular, has been enabled by default in some Linux distributions for several years. However, current SELinux deployments only effectively control a single system. Inter-system and remote resource access control capabilities are starting to appear in SELinux, but extending policy management capabilities to cover these networked systems remains an open problem. This paper discusses issues that must be addressed to support security policies distributed across a network, including policy development changes needed to be able to express a coherent security policy for a network of systems, managing the distribution of a multi-system policy, and synchronizing policy updates, and presents a distributed policy management architecture.


Securing Inter-process Communications in SELinux

Spencer Shimko and Joshua Brindle, Tresys Technology

In the modern computing world, a secure system is best implemented with mandatory access control (MAC) mecha-nisms. One aspect of secure system design is the careful definition of information flows between processes - inter-process communications (IPC). System designers, when weighing the security risks and functionality of different types of IPC, have had to rely on intuition and experience because of the lack of documentation regarding the secu-rity properties of the IPC mechanisms. This paper explores the security functionality that the underlying operating system must support to facilitate secure communication between processes in a Linux operating system. Security Enhanced Linux (SELinux) provides the MAC mechanisms used to support and ensure secure communication be-tween processes, as is illustrated through the example secure IPC mechanism presented in this paper. This example is achieved through a combination of SELinux policy and traditional Linux IPC mechanisms, and presents the best combination of security and throughput available in SELinux.


Towards Intuitive Tools for Managing SELinux: Hiding the Details but Retaining the Power

James Athey, Christopher Ashworth, Frank Mayer, and Don Miner, Tresys Technology

The details of the SELinux access control mechanisms lead to the perception that SELinux is too complex for non-expert users to manage. We present techniques that bridge the gap between the comprehensive, low-level SELinux access controls and the intuitive, high-level abstractions familiar to system administrators. These techniques shield the user from SELinux implementation details without sacrificing the power and flexibility of the SELinux policy language.


Extending Linux for Multi-Level Security

Klaus Weidner, atsec, George Wilson, IBM, and Loulwa Salem, IBM

Linux distributions have received numerous Common Criteria certifications in the last few years. Building on the recent Controlled Access Protection Profile (CAPP) certifications, an open source development effort to make Linux compliant with the Labeled Security Protection Profile (LSPP) and Role-Based Access Control Protection Profile (RBACPP) has been ongoing for almost 2 years. Development included adding and augmenting features of SELinux and other Linux components. This paper explores the evolution of and rationale behind the features developed to meet LSPP and RBACPP, and discusses the current state of development and lessons learned.


SELinux Case Studies

Case studies are an opportunity to present information about the use and application of SELinux and present lessons-learned, success, and areas of growth for SELinux. Information about deployed, production systems are of particular interest. These presentations will be brief (15 - 20 minutes) and no formal paper is required. Interested parties can submit case studies to chair@selinux-symposium.org. Please include a title, brief description of the case study, and contact information for the presenter. Presenters will be notified of the acceptance by email and the final schedule will be placed on the website and posted at the conference.


©Copyright 2005-2006 SELinux Symposium, LLC
Privacy Statement