1 ===== 1 ===== 2 Smack 2 Smack 3 ===== 3 ===== 4 4 5 5 6 "Good for you, you've decided to clean the 6 "Good for you, you've decided to clean the elevator!" 7 - The Elevator, from Dark Star 7 - The Elevator, from Dark Star 8 8 9 Smack is the Simplified Mandatory Access Contr 9 Smack is the Simplified Mandatory Access Control Kernel. 10 Smack is a kernel based implementation of mand 10 Smack is a kernel based implementation of mandatory access 11 control that includes simplicity in its primar 11 control that includes simplicity in its primary design goals. 12 12 13 Smack is not the only Mandatory Access Control 13 Smack is not the only Mandatory Access Control scheme 14 available for Linux. Those new to Mandatory Ac 14 available for Linux. Those new to Mandatory Access Control 15 are encouraged to compare Smack with the other 15 are encouraged to compare Smack with the other mechanisms 16 available to determine which is best suited to 16 available to determine which is best suited to the problem 17 at hand. 17 at hand. 18 18 19 Smack consists of three major components: 19 Smack consists of three major components: 20 20 21 - The kernel 21 - The kernel 22 - Basic utilities, which are helpful but n 22 - Basic utilities, which are helpful but not required 23 - Configuration data 23 - Configuration data 24 24 25 The kernel component of Smack is implemented a 25 The kernel component of Smack is implemented as a Linux 26 Security Modules (LSM) module. It requires net 26 Security Modules (LSM) module. It requires netlabel and 27 works best with file systems that support exte 27 works best with file systems that support extended attributes, 28 although xattr support is not strictly require 28 although xattr support is not strictly required. 29 It is safe to run a Smack kernel under a "vani 29 It is safe to run a Smack kernel under a "vanilla" distribution. 30 30 31 Smack kernels use the CIPSO IP option. Some ne 31 Smack kernels use the CIPSO IP option. Some network 32 configurations are intolerant of IP options an 32 configurations are intolerant of IP options and can impede 33 access to systems that use them as Smack does. 33 access to systems that use them as Smack does. 34 34 35 Smack is used in the Tizen operating system. P 35 Smack is used in the Tizen operating system. Please 36 go to http://wiki.tizen.org for information ab 36 go to http://wiki.tizen.org for information about how 37 Smack is used in Tizen. 37 Smack is used in Tizen. 38 38 39 The current git repository for Smack user spac 39 The current git repository for Smack user space is: 40 40 41 git://github.com/smack-team/smack.git 41 git://github.com/smack-team/smack.git 42 42 43 This should make and install on most modern di 43 This should make and install on most modern distributions. 44 There are five commands included in smackutil: 44 There are five commands included in smackutil: 45 45 46 chsmack: 46 chsmack: 47 display or set Smack extended attribut 47 display or set Smack extended attribute values 48 48 49 smackctl: 49 smackctl: 50 load the Smack access rules 50 load the Smack access rules 51 51 52 smackaccess: 52 smackaccess: 53 report if a process with one label has 53 report if a process with one label has access 54 to an object with another 54 to an object with another 55 55 56 These two commands are obsolete with the intro 56 These two commands are obsolete with the introduction of 57 the smackfs/load2 and smackfs/cipso2 interface 57 the smackfs/load2 and smackfs/cipso2 interfaces. 58 58 59 smackload: 59 smackload: 60 properly formats data for writing to s 60 properly formats data for writing to smackfs/load 61 61 62 smackcipso: 62 smackcipso: 63 properly formats data for writing to s 63 properly formats data for writing to smackfs/cipso 64 64 65 In keeping with the intent of Smack, configura 65 In keeping with the intent of Smack, configuration data is 66 minimal and not strictly required. The most im 66 minimal and not strictly required. The most important 67 configuration step is mounting the smackfs pse 67 configuration step is mounting the smackfs pseudo filesystem. 68 If smackutil is installed the startup script w 68 If smackutil is installed the startup script will take care 69 of this, but it can be manually as well. 69 of this, but it can be manually as well. 70 70 71 Add this line to ``/etc/fstab``:: 71 Add this line to ``/etc/fstab``:: 72 72 73 smackfs /sys/fs/smackfs smackfs defaults 0 73 smackfs /sys/fs/smackfs smackfs defaults 0 0 74 74 75 The ``/sys/fs/smackfs`` directory is created b 75 The ``/sys/fs/smackfs`` directory is created by the kernel. 76 76 77 Smack uses extended attributes (xattrs) to sto 77 Smack uses extended attributes (xattrs) to store labels on filesystem 78 objects. The attributes are stored in the exte 78 objects. The attributes are stored in the extended attribute security 79 name space. A process must have ``CAP_MAC_ADMI 79 name space. A process must have ``CAP_MAC_ADMIN`` to change any of these 80 attributes. 80 attributes. 81 81 82 The extended attributes that Smack uses are: 82 The extended attributes that Smack uses are: 83 83 84 SMACK64 84 SMACK64 85 Used to make access control decisions. 85 Used to make access control decisions. In almost all cases 86 the label given to a new filesystem ob 86 the label given to a new filesystem object will be the label 87 of the process that created it. 87 of the process that created it. 88 88 89 SMACK64EXEC 89 SMACK64EXEC 90 The Smack label of a process that exec 90 The Smack label of a process that execs a program file with 91 this attribute set will run with this 91 this attribute set will run with this attribute's value. 92 92 93 SMACK64MMAP 93 SMACK64MMAP 94 Don't allow the file to be mmapped by 94 Don't allow the file to be mmapped by a process whose Smack 95 label does not allow all of the access 95 label does not allow all of the access permitted to a process 96 with the label contained in this attri 96 with the label contained in this attribute. This is a very 97 specific use case for shared libraries 97 specific use case for shared libraries. 98 98 99 SMACK64TRANSMUTE 99 SMACK64TRANSMUTE 100 Can only have the value "TRUE". If thi 100 Can only have the value "TRUE". If this attribute is present 101 on a directory when an object is creat 101 on a directory when an object is created in the directory and 102 the Smack rule (more below) that permi 102 the Smack rule (more below) that permitted the write access 103 to the directory includes the transmut 103 to the directory includes the transmute ("t") mode the object 104 gets the label of the directory instea 104 gets the label of the directory instead of the label of the 105 creating process. If the object being 105 creating process. If the object being created is a directory 106 the SMACK64TRANSMUTE attribute is set 106 the SMACK64TRANSMUTE attribute is set as well. 107 107 108 SMACK64IPIN 108 SMACK64IPIN 109 This attribute is only available on fi 109 This attribute is only available on file descriptors for sockets. 110 Use the Smack label in this attribute 110 Use the Smack label in this attribute for access control 111 decisions on packets being delivered t 111 decisions on packets being delivered to this socket. 112 112 113 SMACK64IPOUT 113 SMACK64IPOUT 114 This attribute is only available on fi 114 This attribute is only available on file descriptors for sockets. 115 Use the Smack label in this attribute 115 Use the Smack label in this attribute for access control 116 decisions on packets coming from this 116 decisions on packets coming from this socket. 117 117 118 There are multiple ways to set a Smack label o 118 There are multiple ways to set a Smack label on a file:: 119 119 120 # attr -S -s SMACK64 -V "value" path 120 # attr -S -s SMACK64 -V "value" path 121 # chsmack -a value path 121 # chsmack -a value path 122 122 123 A process can see the Smack label it is runnin 123 A process can see the Smack label it is running with by 124 reading ``/proc/self/attr/current``. A process 124 reading ``/proc/self/attr/current``. A process with ``CAP_MAC_ADMIN`` 125 can set the process Smack by writing there. 125 can set the process Smack by writing there. 126 126 127 Most Smack configuration is accomplished by wr 127 Most Smack configuration is accomplished by writing to files 128 in the smackfs filesystem. This pseudo-filesys 128 in the smackfs filesystem. This pseudo-filesystem is mounted 129 on ``/sys/fs/smackfs``. 129 on ``/sys/fs/smackfs``. 130 130 131 access 131 access 132 Provided for backward compatibility. T 132 Provided for backward compatibility. The access2 interface 133 is preferred and should be used instea 133 is preferred and should be used instead. 134 This interface reports whether a subje 134 This interface reports whether a subject with the specified 135 Smack label has a particular access to 135 Smack label has a particular access to an object with a 136 specified Smack label. Write a fixed f 136 specified Smack label. Write a fixed format access rule to 137 this file. The next read will indicate 137 this file. The next read will indicate whether the access 138 would be permitted. The text will be e 138 would be permitted. The text will be either "1" indicating 139 access, or "0" indicating denial. 139 access, or "0" indicating denial. 140 140 141 access2 141 access2 142 This interface reports whether a subje 142 This interface reports whether a subject with the specified 143 Smack label has a particular access to 143 Smack label has a particular access to an object with a 144 specified Smack label. Write a long fo 144 specified Smack label. Write a long format access rule to 145 this file. The next read will indicate 145 this file. The next read will indicate whether the access 146 would be permitted. The text will be e 146 would be permitted. The text will be either "1" indicating 147 access, or "0" indicating denial. 147 access, or "0" indicating denial. 148 148 149 ambient 149 ambient 150 This contains the Smack label applied 150 This contains the Smack label applied to unlabeled network 151 packets. 151 packets. 152 152 153 change-rule 153 change-rule 154 This interface allows modification of 154 This interface allows modification of existing access control rules. 155 The format accepted on write is:: 155 The format accepted on write is:: 156 156 157 "%s %s %s %s" 157 "%s %s %s %s" 158 158 159 where the first string is the subject 159 where the first string is the subject label, the second the 160 object label, the third the access to 160 object label, the third the access to allow and the fourth the 161 access to deny. The access strings may 161 access to deny. The access strings may contain only the characters 162 "rwxat-". If a rule for a given subjec 162 "rwxat-". If a rule for a given subject and object exists it will be 163 modified by enabling the permissions i 163 modified by enabling the permissions in the third string and disabling 164 those in the fourth string. If there i 164 those in the fourth string. If there is no such rule it will be 165 created using the access specified in 165 created using the access specified in the third and the fourth strings. 166 166 167 cipso 167 cipso 168 Provided for backward compatibility. T 168 Provided for backward compatibility. The cipso2 interface 169 is preferred and should be used instea 169 is preferred and should be used instead. 170 This interface allows a specific CIPSO 170 This interface allows a specific CIPSO header to be assigned 171 to a Smack label. The format accepted 171 to a Smack label. The format accepted on write is:: 172 172 173 "%24s%4d%4d"["%4d"]... 173 "%24s%4d%4d"["%4d"]... 174 174 175 The first string is a fixed Smack labe 175 The first string is a fixed Smack label. The first number is 176 the level to use. The second number is 176 the level to use. The second number is the number of categories. 177 The following numbers are the categori 177 The following numbers are the categories:: 178 178 179 "level-3-cats-5-19 3 179 "level-3-cats-5-19 3 2 5 19" 180 180 181 cipso2 181 cipso2 182 This interface allows a specific CIPSO 182 This interface allows a specific CIPSO header to be assigned 183 to a Smack label. The format accepted 183 to a Smack label. The format accepted on write is:: 184 184 185 "%s%4d%4d"["%4d"]... 185 "%s%4d%4d"["%4d"]... 186 186 187 The first string is a long Smack label 187 The first string is a long Smack label. The first number is 188 the level to use. The second number is 188 the level to use. The second number is the number of categories. 189 The following numbers are the categori 189 The following numbers are the categories:: 190 190 191 "level-3-cats-5-19 3 2 5 191 "level-3-cats-5-19 3 2 5 19" 192 192 193 direct 193 direct 194 This contains the CIPSO level used for 194 This contains the CIPSO level used for Smack direct label 195 representation in network packets. 195 representation in network packets. 196 196 197 doi 197 doi 198 This contains the CIPSO domain of inte 198 This contains the CIPSO domain of interpretation used in 199 network packets. 199 network packets. 200 200 201 ipv6host 201 ipv6host 202 This interface allows specific IPv6 in 202 This interface allows specific IPv6 internet addresses to be 203 treated as single label hosts. Packets 203 treated as single label hosts. Packets are sent to single 204 label hosts only from processes that h 204 label hosts only from processes that have Smack write access 205 to the host label. All packets receive 205 to the host label. All packets received from single label hosts 206 are given the specified label. The for 206 are given the specified label. The format accepted on write is:: 207 207 208 "%h:%h:%h:%h:%h:%h:%h:%h label 208 "%h:%h:%h:%h:%h:%h:%h:%h label" or 209 "%h:%h:%h:%h:%h:%h:%h:%h/%d la 209 "%h:%h:%h:%h:%h:%h:%h:%h/%d label". 210 210 211 The "::" address shortcut is not suppo 211 The "::" address shortcut is not supported. 212 If label is "-DELETE" a matched entry 212 If label is "-DELETE" a matched entry will be deleted. 213 213 214 load 214 load 215 Provided for backward compatibility. T 215 Provided for backward compatibility. The load2 interface 216 is preferred and should be used instea 216 is preferred and should be used instead. 217 This interface allows access control r 217 This interface allows access control rules in addition to 218 the system defined rules to be specifi 218 the system defined rules to be specified. The format accepted 219 on write is:: 219 on write is:: 220 220 221 "%24s%24s%5s" 221 "%24s%24s%5s" 222 222 223 where the first string is the subject 223 where the first string is the subject label, the second the 224 object label, and the third the reques 224 object label, and the third the requested access. The access 225 string may contain only the characters 225 string may contain only the characters "rwxat-", and specifies 226 which sort of access is allowed. The " 226 which sort of access is allowed. The "-" is a placeholder for 227 permissions that are not allowed. The 227 permissions that are not allowed. The string "r-x--" would 228 specify read and execute access. Label 228 specify read and execute access. Labels are limited to 23 229 characters in length. 229 characters in length. 230 230 231 load2 231 load2 232 This interface allows access control r 232 This interface allows access control rules in addition to 233 the system defined rules to be specifi 233 the system defined rules to be specified. The format accepted 234 on write is:: 234 on write is:: 235 235 236 "%s %s %s" 236 "%s %s %s" 237 237 238 where the first string is the subject 238 where the first string is the subject label, the second the 239 object label, and the third the reques 239 object label, and the third the requested access. The access 240 string may contain only the characters 240 string may contain only the characters "rwxat-", and specifies 241 which sort of access is allowed. The " 241 which sort of access is allowed. The "-" is a placeholder for 242 permissions that are not allowed. The 242 permissions that are not allowed. The string "r-x--" would 243 specify read and execute access. 243 specify read and execute access. 244 244 245 load-self 245 load-self 246 Provided for backward compatibility. T 246 Provided for backward compatibility. The load-self2 interface 247 is preferred and should be used instea 247 is preferred and should be used instead. 248 This interface allows process specific 248 This interface allows process specific access rules to be 249 defined. These rules are only consulte 249 defined. These rules are only consulted if access would 250 otherwise be permitted, and are intend 250 otherwise be permitted, and are intended to provide additional 251 restrictions on the process. The forma 251 restrictions on the process. The format is the same as for 252 the load interface. 252 the load interface. 253 253 254 load-self2 254 load-self2 255 This interface allows process specific 255 This interface allows process specific access rules to be 256 defined. These rules are only consulte 256 defined. These rules are only consulted if access would 257 otherwise be permitted, and are intend 257 otherwise be permitted, and are intended to provide additional 258 restrictions on the process. The forma 258 restrictions on the process. The format is the same as for 259 the load2 interface. 259 the load2 interface. 260 260 261 logging 261 logging 262 This contains the Smack logging state. 262 This contains the Smack logging state. 263 263 264 mapped 264 mapped 265 This contains the CIPSO level used for 265 This contains the CIPSO level used for Smack mapped label 266 representation in network packets. 266 representation in network packets. 267 267 268 netlabel 268 netlabel 269 This interface allows specific interne 269 This interface allows specific internet addresses to be 270 treated as single label hosts. Packets 270 treated as single label hosts. Packets are sent to single 271 label hosts without CIPSO headers, but 271 label hosts without CIPSO headers, but only from processes 272 that have Smack write access to the ho 272 that have Smack write access to the host label. All packets 273 received from single label hosts are g 273 received from single label hosts are given the specified 274 label. The format accepted on write is 274 label. The format accepted on write is:: 275 275 276 "%d.%d.%d.%d label" or "%d.%d. 276 "%d.%d.%d.%d label" or "%d.%d.%d.%d/%d label". 277 277 278 If the label specified is "-CIPSO" the 278 If the label specified is "-CIPSO" the address is treated 279 as a host that supports CIPSO headers. 279 as a host that supports CIPSO headers. 280 280 281 onlycap 281 onlycap 282 This contains labels processes must ha 282 This contains labels processes must have for CAP_MAC_ADMIN 283 and ``CAP_MAC_OVERRIDE`` to be effecti 283 and ``CAP_MAC_OVERRIDE`` to be effective. If this file is empty 284 these capabilities are effective at fo 284 these capabilities are effective at for processes with any 285 label. The values are set by writing t 285 label. The values are set by writing the desired labels, separated 286 by spaces, to the file or cleared by w 286 by spaces, to the file or cleared by writing "-" to the file. 287 287 288 ptrace 288 ptrace 289 This is used to define the current ptr 289 This is used to define the current ptrace policy 290 290 291 0 - default: 291 0 - default: 292 this is the policy that relies on 292 this is the policy that relies on Smack access rules. 293 For the ``PTRACE_READ`` a subject 293 For the ``PTRACE_READ`` a subject needs to have a read access on 294 object. For the ``PTRACE_ATTACH`` 294 object. For the ``PTRACE_ATTACH`` a read-write access is required. 295 295 296 1 - exact: 296 1 - exact: 297 this is the policy that limits ``P 297 this is the policy that limits ``PTRACE_ATTACH``. Attach is 298 only allowed when subject's and ob 298 only allowed when subject's and object's labels are equal. 299 ``PTRACE_READ`` is not affected. C 299 ``PTRACE_READ`` is not affected. Can be overridden with ``CAP_SYS_PTRACE``. 300 300 301 2 - draconian: 301 2 - draconian: 302 this policy behaves like the 'exac 302 this policy behaves like the 'exact' above with an 303 exception that it can't be overrid 303 exception that it can't be overridden with ``CAP_SYS_PTRACE``. 304 304 305 revoke-subject 305 revoke-subject 306 Writing a Smack label here sets the ac 306 Writing a Smack label here sets the access to '-' for all access 307 rules with that subject label. 307 rules with that subject label. 308 308 309 unconfined 309 unconfined 310 If the kernel is configured with ``CON 310 If the kernel is configured with ``CONFIG_SECURITY_SMACK_BRINGUP`` 311 a process with ``CAP_MAC_ADMIN`` can w 311 a process with ``CAP_MAC_ADMIN`` can write a label into this interface. 312 Thereafter, accesses that involve that 312 Thereafter, accesses that involve that label will be logged and 313 the access permitted if it wouldn't be 313 the access permitted if it wouldn't be otherwise. Note that this 314 is dangerous and can ruin the proper l 314 is dangerous and can ruin the proper labeling of your system. 315 It should never be used in production. 315 It should never be used in production. 316 316 317 relabel-self 317 relabel-self 318 This interface contains a list of labe 318 This interface contains a list of labels to which the process can 319 transition to, by writing to ``/proc/s 319 transition to, by writing to ``/proc/self/attr/current``. 320 Normally a process can change its own 320 Normally a process can change its own label to any legal value, but only 321 if it has ``CAP_MAC_ADMIN``. This inte 321 if it has ``CAP_MAC_ADMIN``. This interface allows a process without 322 ``CAP_MAC_ADMIN`` to relabel itself to 322 ``CAP_MAC_ADMIN`` to relabel itself to one of labels from predefined list. 323 A process without ``CAP_MAC_ADMIN`` ca 323 A process without ``CAP_MAC_ADMIN`` can change its label only once. When it 324 does, this list will be cleared. 324 does, this list will be cleared. 325 The values are set by writing the desi 325 The values are set by writing the desired labels, separated 326 by spaces, to the file or cleared by w 326 by spaces, to the file or cleared by writing "-" to the file. 327 327 328 If you are using the smackload utility 328 If you are using the smackload utility 329 you can add access rules in ``/etc/smack/acces 329 you can add access rules in ``/etc/smack/accesses``. They take the form:: 330 330 331 subjectlabel objectlabel access 331 subjectlabel objectlabel access 332 332 333 access is a combination of the letters rwxatb 333 access is a combination of the letters rwxatb which specify the 334 kind of access permitted a subject with subjec 334 kind of access permitted a subject with subjectlabel on an 335 object with objectlabel. If there is no rule n 335 object with objectlabel. If there is no rule no access is allowed. 336 336 337 Look for additional programs on http://schaufl 337 Look for additional programs on http://schaufler-ca.com 338 338 339 The Simplified Mandatory Access Control Kernel 339 The Simplified Mandatory Access Control Kernel (Whitepaper) 340 ============================================== 340 =========================================================== 341 341 342 Casey Schaufler 342 Casey Schaufler 343 casey@schaufler-ca.com 343 casey@schaufler-ca.com 344 344 345 Mandatory Access Control 345 Mandatory Access Control 346 ------------------------ 346 ------------------------ 347 347 348 Computer systems employ a variety of schemes t 348 Computer systems employ a variety of schemes to constrain how information is 349 shared among the people and services using the 349 shared among the people and services using the machine. Some of these schemes 350 allow the program or user to decide what other 350 allow the program or user to decide what other programs or users are allowed 351 access to pieces of data. These schemes are ca 351 access to pieces of data. These schemes are called discretionary access 352 control mechanisms because the access control 352 control mechanisms because the access control is specified at the discretion 353 of the user. Other schemes do not leave the de 353 of the user. Other schemes do not leave the decision regarding what a user or 354 program can access up to users or programs. Th 354 program can access up to users or programs. These schemes are called mandatory 355 access control mechanisms because you don't ha 355 access control mechanisms because you don't have a choice regarding the users 356 or programs that have access to pieces of data 356 or programs that have access to pieces of data. 357 357 358 Bell & LaPadula 358 Bell & LaPadula 359 --------------- 359 --------------- 360 360 361 From the middle of the 1980's until the turn o 361 From the middle of the 1980's until the turn of the century Mandatory Access 362 Control (MAC) was very closely associated with 362 Control (MAC) was very closely associated with the Bell & LaPadula security 363 model, a mathematical description of the Unite 363 model, a mathematical description of the United States Department of Defense 364 policy for marking paper documents. MAC in thi 364 policy for marking paper documents. MAC in this form enjoyed a following 365 within the Capital Beltway and Scandinavian su 365 within the Capital Beltway and Scandinavian supercomputer centers but was 366 often sited as failing to address general need 366 often sited as failing to address general needs. 367 367 368 Domain Type Enforcement 368 Domain Type Enforcement 369 ----------------------- 369 ----------------------- 370 370 371 Around the turn of the century Domain Type Enf 371 Around the turn of the century Domain Type Enforcement (DTE) became popular. 372 This scheme organizes users, programs, and dat 372 This scheme organizes users, programs, and data into domains that are 373 protected from each other. This scheme has bee 373 protected from each other. This scheme has been widely deployed as a component 374 of popular Linux distributions. The administra 374 of popular Linux distributions. The administrative overhead required to 375 maintain this scheme and the detailed understa 375 maintain this scheme and the detailed understanding of the whole system 376 necessary to provide a secure domain mapping l 376 necessary to provide a secure domain mapping leads to the scheme being 377 disabled or used in limited ways in the majori 377 disabled or used in limited ways in the majority of cases. 378 378 379 Smack 379 Smack 380 ----- 380 ----- 381 381 382 Smack is a Mandatory Access Control mechanism 382 Smack is a Mandatory Access Control mechanism designed to provide useful MAC 383 while avoiding the pitfalls of its predecessor 383 while avoiding the pitfalls of its predecessors. The limitations of Bell & 384 LaPadula are addressed by providing a scheme w 384 LaPadula are addressed by providing a scheme whereby access can be controlled 385 according to the requirements of the system an 385 according to the requirements of the system and its purpose rather than those 386 imposed by an arcane government policy. The co 386 imposed by an arcane government policy. The complexity of Domain Type 387 Enforcement and avoided by defining access con 387 Enforcement and avoided by defining access controls in terms of the access 388 modes already in use. 388 modes already in use. 389 389 390 Smack Terminology 390 Smack Terminology 391 ----------------- 391 ----------------- 392 392 393 The jargon used to talk about Smack will be fa 393 The jargon used to talk about Smack will be familiar to those who have dealt 394 with other MAC systems and shouldn't be too di 394 with other MAC systems and shouldn't be too difficult for the uninitiated to 395 pick up. There are four terms that are used in 395 pick up. There are four terms that are used in a specific way and that are 396 especially important: 396 especially important: 397 397 398 Subject: 398 Subject: 399 A subject is an active entity on the c 399 A subject is an active entity on the computer system. 400 On Smack a subject is a task, which is 400 On Smack a subject is a task, which is in turn the basic unit 401 of execution. 401 of execution. 402 402 403 Object: 403 Object: 404 An object is a passive entity on the c 404 An object is a passive entity on the computer system. 405 On Smack files of all types, IPC, and 405 On Smack files of all types, IPC, and tasks can be objects. 406 406 407 Access: 407 Access: 408 Any attempt by a subject to put inform 408 Any attempt by a subject to put information into or get 409 information from an object is an acces 409 information from an object is an access. 410 410 411 Label: 411 Label: 412 Data that identifies the Mandatory Acc 412 Data that identifies the Mandatory Access Control 413 characteristics of a subject or an obj 413 characteristics of a subject or an object. 414 414 415 These definitions are consistent with the trad 415 These definitions are consistent with the traditional use in the security 416 community. There are also some terms from Linu 416 community. There are also some terms from Linux that are likely to crop up: 417 417 418 Capability: 418 Capability: 419 A task that possesses a capability has 419 A task that possesses a capability has permission to 420 violate an aspect of the system securi 420 violate an aspect of the system security policy, as identified by 421 the specific capability. A task that p 421 the specific capability. A task that possesses one or more 422 capabilities is a privileged task, whe 422 capabilities is a privileged task, whereas a task with no 423 capabilities is an unprivileged task. 423 capabilities is an unprivileged task. 424 424 425 Privilege: 425 Privilege: 426 A task that is allowed to violate the 426 A task that is allowed to violate the system security 427 policy is said to have privilege. As o 427 policy is said to have privilege. As of this writing a task can 428 have privilege either by possessing ca 428 have privilege either by possessing capabilities or by having an 429 effective user of root. 429 effective user of root. 430 430 431 Smack Basics 431 Smack Basics 432 ------------ 432 ------------ 433 433 434 Smack is an extension to a Linux system. It en 434 Smack is an extension to a Linux system. It enforces additional restrictions 435 on what subjects can access which objects, bas 435 on what subjects can access which objects, based on the labels attached to 436 each of the subject and the object. 436 each of the subject and the object. 437 437 438 Labels 438 Labels 439 ~~~~~~ 439 ~~~~~~ 440 440 441 Smack labels are ASCII character strings. They 441 Smack labels are ASCII character strings. They can be up to 255 characters 442 long, but keeping them to twenty-three charact 442 long, but keeping them to twenty-three characters is recommended. 443 Single character labels using special characte 443 Single character labels using special characters, that being anything 444 other than a letter or digit, are reserved for 444 other than a letter or digit, are reserved for use by the Smack development 445 team. Smack labels are unstructured, case sens 445 team. Smack labels are unstructured, case sensitive, and the only operation 446 ever performed on them is comparison for equal 446 ever performed on them is comparison for equality. Smack labels cannot 447 contain unprintable characters, the "/" (slash 447 contain unprintable characters, the "/" (slash), the "\" (backslash), the "'" 448 (quote) and '"' (double-quote) characters. 448 (quote) and '"' (double-quote) characters. 449 Smack labels cannot begin with a '-'. This is 449 Smack labels cannot begin with a '-'. This is reserved for special options. 450 450 451 There are some predefined labels:: 451 There are some predefined labels:: 452 452 453 _ Pronounced "floor", a single u 453 _ Pronounced "floor", a single underscore character. 454 ^ Pronounced "hat", a single cir 454 ^ Pronounced "hat", a single circumflex character. 455 * Pronounced "star", a single as 455 * Pronounced "star", a single asterisk character. 456 ? Pronounced "huh", a single que 456 ? Pronounced "huh", a single question mark character. 457 @ Pronounced "web", a single at 457 @ Pronounced "web", a single at sign character. 458 458 459 Every task on a Smack system is assigned a lab 459 Every task on a Smack system is assigned a label. The Smack label 460 of a process will usually be assigned by the s 460 of a process will usually be assigned by the system initialization 461 mechanism. 461 mechanism. 462 462 463 Access Rules 463 Access Rules 464 ~~~~~~~~~~~~ 464 ~~~~~~~~~~~~ 465 465 466 Smack uses the traditional access modes of Lin 466 Smack uses the traditional access modes of Linux. These modes are read, 467 execute, write, and occasionally append. There 467 execute, write, and occasionally append. There are a few cases where the 468 access mode may not be obvious. These include: 468 access mode may not be obvious. These include: 469 469 470 Signals: 470 Signals: 471 A signal is a write operation from the 471 A signal is a write operation from the subject task to 472 the object task. 472 the object task. 473 473 474 Internet Domain IPC: 474 Internet Domain IPC: 475 Transmission of a packet is considered 475 Transmission of a packet is considered a 476 write operation from the source task t 476 write operation from the source task to the destination task. 477 477 478 Smack restricts access based on the label atta 478 Smack restricts access based on the label attached to a subject and the label 479 attached to the object it is trying to access. 479 attached to the object it is trying to access. The rules enforced are, in 480 order: 480 order: 481 481 482 1. Any access requested by a task labe 482 1. Any access requested by a task labeled "*" is denied. 483 2. A read or execute access requested 483 2. A read or execute access requested by a task labeled "^" 484 is permitted. 484 is permitted. 485 3. A read or execute access requested 485 3. A read or execute access requested on an object labeled "_" 486 is permitted. 486 is permitted. 487 4. Any access requested on an object l 487 4. Any access requested on an object labeled "*" is permitted. 488 5. Any access requested by a task on a 488 5. Any access requested by a task on an object with the same 489 label is permitted. 489 label is permitted. 490 6. Any access requested that is explic 490 6. Any access requested that is explicitly defined in the loaded 491 rule set is permitted. 491 rule set is permitted. 492 7. Any other access is denied. 492 7. Any other access is denied. 493 493 494 Smack Access Rules 494 Smack Access Rules 495 ~~~~~~~~~~~~~~~~~~ 495 ~~~~~~~~~~~~~~~~~~ 496 496 497 With the isolation provided by Smack access se 497 With the isolation provided by Smack access separation is simple. There are 498 many interesting cases where limited access by 498 many interesting cases where limited access by subjects to objects with 499 different labels is desired. One example is th 499 different labels is desired. One example is the familiar spy model of 500 sensitivity, where a scientist working on a hi 500 sensitivity, where a scientist working on a highly classified project would be 501 able to read documents of lower classification 501 able to read documents of lower classifications and anything she writes will 502 be "born" highly classified. To accommodate su 502 be "born" highly classified. To accommodate such schemes Smack includes a 503 mechanism for specifying rules allowing access 503 mechanism for specifying rules allowing access between labels. 504 504 505 Access Rule Format 505 Access Rule Format 506 ~~~~~~~~~~~~~~~~~~ 506 ~~~~~~~~~~~~~~~~~~ 507 507 508 The format of an access rule is:: 508 The format of an access rule is:: 509 509 510 subject-label object-label access 510 subject-label object-label access 511 511 512 Where subject-label is the Smack label of the 512 Where subject-label is the Smack label of the task, object-label is the Smack 513 label of the thing being accessed, and access 513 label of the thing being accessed, and access is a string specifying the sort 514 of access allowed. The access specification is 514 of access allowed. The access specification is searched for letters that 515 describe access modes: 515 describe access modes: 516 516 517 a: indicates that append access should 517 a: indicates that append access should be granted. 518 r: indicates that read access should b 518 r: indicates that read access should be granted. 519 w: indicates that write access should 519 w: indicates that write access should be granted. 520 x: indicates that execute access shoul 520 x: indicates that execute access should be granted. 521 t: indicates that the rule requests tr 521 t: indicates that the rule requests transmutation. 522 b: indicates that the rule should be r 522 b: indicates that the rule should be reported for bring-up. 523 523 524 Uppercase values for the specification letters 524 Uppercase values for the specification letters are allowed as well. 525 Access mode specifications can be in any order 525 Access mode specifications can be in any order. Examples of acceptable rules 526 are:: 526 are:: 527 527 528 TopSecret Secret rx 528 TopSecret Secret rx 529 Secret Unclass R 529 Secret Unclass R 530 Manager Game x 530 Manager Game x 531 User HR w 531 User HR w 532 Snap Crackle rwxatb 532 Snap Crackle rwxatb 533 New Old rRrRr 533 New Old rRrRr 534 Closed Off - 534 Closed Off - 535 535 536 Examples of unacceptable rules are:: 536 Examples of unacceptable rules are:: 537 537 538 Top Secret Secret rx 538 Top Secret Secret rx 539 Ace Ace r 539 Ace Ace r 540 Odd spells waxbeans 540 Odd spells waxbeans 541 541 542 Spaces are not allowed in labels. Since a subj 542 Spaces are not allowed in labels. Since a subject always has access to files 543 with the same label specifying a rule for that 543 with the same label specifying a rule for that case is pointless. Only 544 valid letters (rwxatbRWXATB) and the dash ('-' 544 valid letters (rwxatbRWXATB) and the dash ('-') character are allowed in 545 access specifications. The dash is a placehold 545 access specifications. The dash is a placeholder, so "a-r" is the same 546 as "ar". A lone dash is used to specify that n 546 as "ar". A lone dash is used to specify that no access should be allowed. 547 547 548 Applying Access Rules 548 Applying Access Rules 549 ~~~~~~~~~~~~~~~~~~~~~ 549 ~~~~~~~~~~~~~~~~~~~~~ 550 550 551 The developers of Linux rarely define new sort 551 The developers of Linux rarely define new sorts of things, usually importing 552 schemes and concepts from other systems. Most 552 schemes and concepts from other systems. Most often, the other systems are 553 variants of Unix. Unix has many endearing prop 553 variants of Unix. Unix has many endearing properties, but consistency of 554 access control models is not one of them. Smac 554 access control models is not one of them. Smack strives to treat accesses as 555 uniformly as is sensible while keeping with th 555 uniformly as is sensible while keeping with the spirit of the underlying 556 mechanism. 556 mechanism. 557 557 558 File system objects including files, directori 558 File system objects including files, directories, named pipes, symbolic links, 559 and devices require access permissions that cl 559 and devices require access permissions that closely match those used by mode 560 bit access. To open a file for reading read ac 560 bit access. To open a file for reading read access is required on the file. To 561 search a directory requires execute access. Cr 561 search a directory requires execute access. Creating a file with write access 562 requires both read and write access on the con 562 requires both read and write access on the containing directory. Deleting a 563 file requires read and write access to the fil 563 file requires read and write access to the file and to the containing 564 directory. It is possible that a user may be a 564 directory. It is possible that a user may be able to see that a file exists 565 but not any of its attributes by the circumsta 565 but not any of its attributes by the circumstance of having read access to the 566 containing directory but not to the differentl 566 containing directory but not to the differently labeled file. This is an 567 artifact of the file name being data in the di 567 artifact of the file name being data in the directory, not a part of the file. 568 568 569 If a directory is marked as transmuting (SMACK 569 If a directory is marked as transmuting (SMACK64TRANSMUTE=TRUE) and the 570 access rule that allows a process to create an 570 access rule that allows a process to create an object in that directory 571 includes 't' access the label assigned to the 571 includes 't' access the label assigned to the new object will be that 572 of the directory, not the creating process. Th 572 of the directory, not the creating process. This makes it much easier 573 for two processes with different labels to sha 573 for two processes with different labels to share data without granting 574 access to all of their files. 574 access to all of their files. 575 575 576 IPC objects, message queues, semaphore sets, a 576 IPC objects, message queues, semaphore sets, and memory segments exist in flat 577 namespaces and access requests are only requir 577 namespaces and access requests are only required to match the object in 578 question. 578 question. 579 579 580 Process objects reflect tasks on the system an 580 Process objects reflect tasks on the system and the Smack label used to access 581 them is the same Smack label that the task wou 581 them is the same Smack label that the task would use for its own access 582 attempts. Sending a signal via the kill() syst 582 attempts. Sending a signal via the kill() system call is a write operation 583 from the signaler to the recipient. Debugging 583 from the signaler to the recipient. Debugging a process requires both reading 584 and writing. Creating a new task is an interna 584 and writing. Creating a new task is an internal operation that results in two 585 tasks with identical Smack labels and requires 585 tasks with identical Smack labels and requires no access checks. 586 586 587 Sockets are data structures attached to proces 587 Sockets are data structures attached to processes and sending a packet from 588 one process to another requires that the sende 588 one process to another requires that the sender have write access to the 589 receiver. The receiver is not required to have 589 receiver. The receiver is not required to have read access to the sender. 590 590 591 Setting Access Rules 591 Setting Access Rules 592 ~~~~~~~~~~~~~~~~~~~~ 592 ~~~~~~~~~~~~~~~~~~~~ 593 593 594 The configuration file /etc/smack/accesses con 594 The configuration file /etc/smack/accesses contains the rules to be set at 595 system startup. The contents are written to th 595 system startup. The contents are written to the special file 596 /sys/fs/smackfs/load2. Rules can be added at a 596 /sys/fs/smackfs/load2. Rules can be added at any time and take effect 597 immediately. For any pair of subject and objec 597 immediately. For any pair of subject and object labels there can be only 598 one rule, with the most recently specified ove 598 one rule, with the most recently specified overriding any earlier 599 specification. 599 specification. 600 600 601 Task Attribute 601 Task Attribute 602 ~~~~~~~~~~~~~~ 602 ~~~~~~~~~~~~~~ 603 603 604 The Smack label of a process can be read from 604 The Smack label of a process can be read from /proc/<pid>/attr/current. A 605 process can read its own Smack label from /pro 605 process can read its own Smack label from /proc/self/attr/current. A 606 privileged process can change its own Smack la 606 privileged process can change its own Smack label by writing to 607 /proc/self/attr/current but not the label of a 607 /proc/self/attr/current but not the label of another process. 608 608 609 File Attribute 609 File Attribute 610 ~~~~~~~~~~~~~~ 610 ~~~~~~~~~~~~~~ 611 611 612 The Smack label of a filesystem object is stor 612 The Smack label of a filesystem object is stored as an extended attribute 613 named SMACK64 on the file. This attribute is i 613 named SMACK64 on the file. This attribute is in the security namespace. It can 614 only be changed by a process with privilege. 614 only be changed by a process with privilege. 615 615 616 Privilege 616 Privilege 617 ~~~~~~~~~ 617 ~~~~~~~~~ 618 618 619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADM 619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged. 620 CAP_MAC_OVERRIDE allows the process access to 620 CAP_MAC_OVERRIDE allows the process access to objects it would 621 be denied otherwise. CAP_MAC_ADMIN allows a pr 621 be denied otherwise. CAP_MAC_ADMIN allows a process to change 622 Smack data, including rules and attributes. 622 Smack data, including rules and attributes. 623 623 624 Smack Networking 624 Smack Networking 625 ~~~~~~~~~~~~~~~~ 625 ~~~~~~~~~~~~~~~~ 626 626 627 As mentioned before, Smack enforces access con 627 As mentioned before, Smack enforces access control on network protocol 628 transmissions. Every packet sent by a Smack pr 628 transmissions. Every packet sent by a Smack process is tagged with its Smack 629 label. This is done by adding a CIPSO tag to t 629 label. This is done by adding a CIPSO tag to the header of the IP packet. Each 630 packet received is expected to have a CIPSO ta 630 packet received is expected to have a CIPSO tag that identifies the label and 631 if it lacks such a tag the network ambient lab 631 if it lacks such a tag the network ambient label is assumed. Before the packet 632 is delivered a check is made to determine that 632 is delivered a check is made to determine that a subject with the label on the 633 packet has write access to the receiving proce 633 packet has write access to the receiving process and if that is not the case 634 the packet is dropped. 634 the packet is dropped. 635 635 636 CIPSO Configuration 636 CIPSO Configuration 637 ~~~~~~~~~~~~~~~~~~~ 637 ~~~~~~~~~~~~~~~~~~~ 638 638 639 It is normally unnecessary to specify the CIPS 639 It is normally unnecessary to specify the CIPSO configuration. The default 640 values used by the system handle all internal 640 values used by the system handle all internal cases. Smack will compose CIPSO 641 label values to match the Smack labels being u 641 label values to match the Smack labels being used without administrative 642 intervention. Unlabeled packets that come into 642 intervention. Unlabeled packets that come into the system will be given the 643 ambient label. 643 ambient label. 644 644 645 Smack requires configuration in the case where 645 Smack requires configuration in the case where packets from a system that is 646 not Smack that speaks CIPSO may be encountered 646 not Smack that speaks CIPSO may be encountered. Usually this will be a Trusted 647 Solaris system, but there are other, less wide 647 Solaris system, but there are other, less widely deployed systems out there. 648 CIPSO provides 3 important values, a Domain Of 648 CIPSO provides 3 important values, a Domain Of Interpretation (DOI), a level, 649 and a category set with each packet. The DOI i 649 and a category set with each packet. The DOI is intended to identify a group 650 of systems that use compatible labeling scheme 650 of systems that use compatible labeling schemes, and the DOI specified on the 651 Smack system must match that of the remote sys 651 Smack system must match that of the remote system or packets will be 652 discarded. The DOI is 3 by default. The value 652 discarded. The DOI is 3 by default. The value can be read from 653 /sys/fs/smackfs/doi and can be changed by writ 653 /sys/fs/smackfs/doi and can be changed by writing to /sys/fs/smackfs/doi. 654 654 655 The label and category set are mapped to a Sma 655 The label and category set are mapped to a Smack label as defined in 656 /etc/smack/cipso. 656 /etc/smack/cipso. 657 657 658 A Smack/CIPSO mapping has the form:: 658 A Smack/CIPSO mapping has the form:: 659 659 660 smack level [category [category]*] 660 smack level [category [category]*] 661 661 662 Smack does not expect the level or category se 662 Smack does not expect the level or category sets to be related in any 663 particular way and does not assume or assign a 663 particular way and does not assume or assign accesses based on them. Some 664 examples of mappings:: 664 examples of mappings:: 665 665 666 TopSecret 7 666 TopSecret 7 667 TS:A,B 7 1 2 667 TS:A,B 7 1 2 668 SecBDE 5 2 4 6 668 SecBDE 5 2 4 6 669 RAFTERS 7 12 26 669 RAFTERS 7 12 26 670 670 671 The ":" and "," characters are permitted in a 671 The ":" and "," characters are permitted in a Smack label but have no special 672 meaning. 672 meaning. 673 673 674 The mapping of Smack labels to CIPSO values is 674 The mapping of Smack labels to CIPSO values is defined by writing to 675 /sys/fs/smackfs/cipso2. 675 /sys/fs/smackfs/cipso2. 676 676 677 In addition to explicit mappings Smack support 677 In addition to explicit mappings Smack supports direct CIPSO mappings. One 678 CIPSO level is used to indicate that the categ 678 CIPSO level is used to indicate that the category set passed in the packet is 679 in fact an encoding of the Smack label. The le 679 in fact an encoding of the Smack label. The level used is 250 by default. The 680 value can be read from /sys/fs/smackfs/direct 680 value can be read from /sys/fs/smackfs/direct and changed by writing to 681 /sys/fs/smackfs/direct. 681 /sys/fs/smackfs/direct. 682 682 683 Socket Attributes 683 Socket Attributes 684 ~~~~~~~~~~~~~~~~~ 684 ~~~~~~~~~~~~~~~~~ 685 685 686 There are two attributes that are associated w 686 There are two attributes that are associated with sockets. These attributes 687 can only be set by privileged tasks, but any t 687 can only be set by privileged tasks, but any task can read them for their own 688 sockets. 688 sockets. 689 689 690 SMACK64IPIN: 690 SMACK64IPIN: 691 The Smack label of the task object. A 691 The Smack label of the task object. A privileged 692 program that will enforce policy may s 692 program that will enforce policy may set this to the star label. 693 693 694 SMACK64IPOUT: 694 SMACK64IPOUT: 695 The Smack label transmitted with outgo 695 The Smack label transmitted with outgoing packets. 696 A privileged program may set this to m 696 A privileged program may set this to match the label of another 697 task with which it hopes to communicat 697 task with which it hopes to communicate. 698 698 699 Smack Netlabel Exceptions 699 Smack Netlabel Exceptions 700 ~~~~~~~~~~~~~~~~~~~~~~~~~ 700 ~~~~~~~~~~~~~~~~~~~~~~~~~ 701 701 702 You will often find that your labeled applicat 702 You will often find that your labeled application has to talk to the outside, 703 unlabeled world. To do this there's a special 703 unlabeled world. To do this there's a special file /sys/fs/smackfs/netlabel 704 where you can add some exceptions in the form 704 where you can add some exceptions in the form of:: 705 705 706 @IP1 LABEL1 or 706 @IP1 LABEL1 or 707 @IP2/MASK LABEL2 707 @IP2/MASK LABEL2 708 708 709 It means that your application will have unlab 709 It means that your application will have unlabeled access to @IP1 if it has 710 write access on LABEL1, and access to the subn 710 write access on LABEL1, and access to the subnet @IP2/MASK if it has write 711 access on LABEL2. 711 access on LABEL2. 712 712 713 Entries in the /sys/fs/smackfs/netlabel file a 713 Entries in the /sys/fs/smackfs/netlabel file are matched by longest mask 714 first, like in classless IPv4 routing. 714 first, like in classless IPv4 routing. 715 715 716 A special label '@' and an option '-CIPSO' can 716 A special label '@' and an option '-CIPSO' can be used there:: 717 717 718 @ means Internet, any application 718 @ means Internet, any application with any label has access to it 719 -CIPSO means standard CIPSO networking 719 -CIPSO means standard CIPSO networking 720 720 721 If you don't know what CIPSO is and don't plan 721 If you don't know what CIPSO is and don't plan to use it, you can just do:: 722 722 723 echo 127.0.0.1 -CIPSO > /sys/fs/smackf 723 echo 127.0.0.1 -CIPSO > /sys/fs/smackfs/netlabel 724 echo 0.0.0.0/0 @ > /sys/fs/smackf 724 echo 0.0.0.0/0 @ > /sys/fs/smackfs/netlabel 725 725 726 If you use CIPSO on your 192.168.0.0/16 local 726 If you use CIPSO on your 192.168.0.0/16 local network and need also unlabeled 727 Internet access, you can have:: 727 Internet access, you can have:: 728 728 729 echo 127.0.0.1 -CIPSO > /sys/fs/s 729 echo 127.0.0.1 -CIPSO > /sys/fs/smackfs/netlabel 730 echo 192.168.0.0/16 -CIPSO > /sys/fs/s 730 echo 192.168.0.0/16 -CIPSO > /sys/fs/smackfs/netlabel 731 echo 0.0.0.0/0 @ > /sys/fs/s 731 echo 0.0.0.0/0 @ > /sys/fs/smackfs/netlabel 732 732 733 Writing Applications for Smack 733 Writing Applications for Smack 734 ------------------------------ 734 ------------------------------ 735 735 736 There are three sorts of applications that wil 736 There are three sorts of applications that will run on a Smack system. How an 737 application interacts with Smack will determin 737 application interacts with Smack will determine what it will have to do to 738 work properly under Smack. 738 work properly under Smack. 739 739 740 Smack Ignorant Applications 740 Smack Ignorant Applications 741 --------------------------- 741 --------------------------- 742 742 743 By far the majority of applications have no re 743 By far the majority of applications have no reason whatever to care about the 744 unique properties of Smack. Since invoking a p 744 unique properties of Smack. Since invoking a program has no impact on the 745 Smack label associated with the process the on 745 Smack label associated with the process the only concern likely to arise is 746 whether the process has execute access to the 746 whether the process has execute access to the program. 747 747 748 Smack Relevant Applications 748 Smack Relevant Applications 749 --------------------------- 749 --------------------------- 750 750 751 Some programs can be improved by teaching them 751 Some programs can be improved by teaching them about Smack, but do not make 752 any security decisions themselves. The utility 752 any security decisions themselves. The utility ls(1) is one example of such a 753 program. 753 program. 754 754 755 Smack Enforcing Applications 755 Smack Enforcing Applications 756 ---------------------------- 756 ---------------------------- 757 757 758 These are special programs that not only know 758 These are special programs that not only know about Smack, but participate in 759 the enforcement of system policy. In most case 759 the enforcement of system policy. In most cases these are the programs that 760 set up user sessions. There are also network s 760 set up user sessions. There are also network services that provide information 761 to processes running with various labels. 761 to processes running with various labels. 762 762 763 File System Interfaces 763 File System Interfaces 764 ---------------------- 764 ---------------------- 765 765 766 Smack maintains labels on file system objects 766 Smack maintains labels on file system objects using extended attributes. The 767 Smack label of a file, directory, or other fil 767 Smack label of a file, directory, or other file system object can be obtained 768 using getxattr(2):: 768 using getxattr(2):: 769 769 770 len = getxattr("/", "security.SMACK64" 770 len = getxattr("/", "security.SMACK64", value, sizeof (value)); 771 771 772 will put the Smack label of the root directory 772 will put the Smack label of the root directory into value. A privileged 773 process can set the Smack label of a file syst 773 process can set the Smack label of a file system object with setxattr(2):: 774 774 775 len = strlen("Rubble"); 775 len = strlen("Rubble"); 776 rc = setxattr("/foo", "security.SMACK6 776 rc = setxattr("/foo", "security.SMACK64", "Rubble", len, 0); 777 777 778 will set the Smack label of /foo to "Rubble" i 778 will set the Smack label of /foo to "Rubble" if the program has appropriate 779 privilege. 779 privilege. 780 780 781 Socket Interfaces 781 Socket Interfaces 782 ----------------- 782 ----------------- 783 783 784 The socket attributes can be read using fgetxa 784 The socket attributes can be read using fgetxattr(2). 785 785 786 A privileged process can set the Smack label o 786 A privileged process can set the Smack label of outgoing packets with 787 fsetxattr(2):: 787 fsetxattr(2):: 788 788 789 len = strlen("Rubble"); 789 len = strlen("Rubble"); 790 rc = fsetxattr(fd, "security.SMACK64IP 790 rc = fsetxattr(fd, "security.SMACK64IPOUT", "Rubble", len, 0); 791 791 792 will set the Smack label "Rubble" on packets g 792 will set the Smack label "Rubble" on packets going out from the socket if the 793 program has appropriate privilege:: 793 program has appropriate privilege:: 794 794 795 rc = fsetxattr(fd, "security.SMACK64IP 795 rc = fsetxattr(fd, "security.SMACK64IPIN, "*", strlen("*"), 0); 796 796 797 will set the Smack label "*" as the object lab 797 will set the Smack label "*" as the object label against which incoming 798 packets will be checked if the program has app 798 packets will be checked if the program has appropriate privilege. 799 799 800 Administration 800 Administration 801 -------------- 801 -------------- 802 802 803 Smack supports some mount options: 803 Smack supports some mount options: 804 804 805 smackfsdef=label: 805 smackfsdef=label: 806 specifies the label to give files that 806 specifies the label to give files that lack 807 the Smack label extended attribute. 807 the Smack label extended attribute. 808 808 809 smackfsroot=label: 809 smackfsroot=label: 810 specifies the label to assign the root 810 specifies the label to assign the root of the 811 file system if it lacks the Smack exte 811 file system if it lacks the Smack extended attribute. 812 812 813 smackfshat=label: 813 smackfshat=label: 814 specifies a label that must have read 814 specifies a label that must have read access to 815 all labels set on the filesystem. Not 815 all labels set on the filesystem. Not yet enforced. 816 816 817 smackfsfloor=label: 817 smackfsfloor=label: 818 specifies a label to which all labels 818 specifies a label to which all labels set on the 819 filesystem must have read access. Not 819 filesystem must have read access. Not yet enforced. 820 820 821 smackfstransmute=label: 821 smackfstransmute=label: 822 behaves exactly like smackfsroot excep 822 behaves exactly like smackfsroot except that it also 823 sets the transmute flag on the root of 823 sets the transmute flag on the root of the mount 824 824 825 These mount options apply to all file system t 825 These mount options apply to all file system types. 826 826 827 Smack auditing 827 Smack auditing 828 -------------- 828 -------------- 829 829 830 If you want Smack auditing of security events, 830 If you want Smack auditing of security events, you need to set CONFIG_AUDIT 831 in your kernel configuration. 831 in your kernel configuration. 832 By default, all denied events will be audited. 832 By default, all denied events will be audited. You can change this behavior by 833 writing a single character to the /sys/fs/smac 833 writing a single character to the /sys/fs/smackfs/logging file:: 834 834 835 0 : no logging 835 0 : no logging 836 1 : log denied (default) 836 1 : log denied (default) 837 2 : log accepted 837 2 : log accepted 838 3 : log denied & accepted 838 3 : log denied & accepted 839 839 840 Events are logged as 'key=value' pairs, for ea 840 Events are logged as 'key=value' pairs, for each event you at least will get 841 the subject, the object, the rights requested, 841 the subject, the object, the rights requested, the action, the kernel function 842 that triggered the event, plus other pairs dep 842 that triggered the event, plus other pairs depending on the type of event 843 audited. 843 audited. 844 844 845 Bringup Mode 845 Bringup Mode 846 ------------ 846 ------------ 847 847 848 Bringup mode provides logging features that ca 848 Bringup mode provides logging features that can make application 849 configuration and system bringup easier. Confi 849 configuration and system bringup easier. Configure the kernel with 850 CONFIG_SECURITY_SMACK_BRINGUP to enable these 850 CONFIG_SECURITY_SMACK_BRINGUP to enable these features. When bringup 851 mode is enabled accesses that succeed due to r 851 mode is enabled accesses that succeed due to rules marked with the "b" 852 access mode will logged. When a new label is i 852 access mode will logged. When a new label is introduced for processes 853 rules can be added aggressively, marked with t 853 rules can be added aggressively, marked with the "b". The logging allows 854 tracking of which rules actual get used for th 854 tracking of which rules actual get used for that label. 855 855 856 Another feature of bringup mode is the "unconf 856 Another feature of bringup mode is the "unconfined" option. Writing 857 a label to /sys/fs/smackfs/unconfined makes su 857 a label to /sys/fs/smackfs/unconfined makes subjects with that label 858 able to access any object, and objects with th 858 able to access any object, and objects with that label accessible to 859 all subjects. Any access that is granted becau 859 all subjects. Any access that is granted because a label is unconfined 860 is logged. This feature is dangerous, as files 860 is logged. This feature is dangerous, as files and directories may 861 be created in places they couldn't if the poli 861 be created in places they couldn't if the policy were being enforced.
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.