Hi!
Quote:
I took the performance data from the RSBAC website. It's simply a fact that grsecurity with any number of rules, using all features of grsecurity, is faster than RSBAC with NOTHING enabled on it. I have published my performance results.
Right, those numbers are outdated. Efficiency has improved since then. You still do not explain which number you took from the web site and how you compare it to gr-security.
Quote:
RSBAC is actually not overly difficult. I would say that it is not more difficult than learning UNIX. But it takes time to get used to it, just like it takes time to get used to UNIX. RSBAC is a security toolbox with which you can easilly combine security features. Like UNIX it is extensible, you can write your own security modules that can be loaded at runtime. And they will be treated like any other RSBAC module. Like UNIX and unlike gr-security, it does not force you to use a predefined security policy. I would like to compare gr-security with the MS-DOS command line and RSBAC with the UNIX command line.
99% of users don't want to write their own security modules.
Fortunately not, that would be a waste of time. My point is that you can extend RSBAC in any way that is necessary, without having to alter the architecture. It makes experimenting with new security features possible. For instance, the PaX support in RSBAC was first implemented as a loadable module. In the upcoming v1.2.3 release, it will be an integral part of RSBAC.
Think back to the days of DOS. Who was using DOS, and who was using UNIX? Do you think mom and pop would be using UNIX? I'll take your analogy and say that the same applies to RSBAC.
The number of UNIX users is growing, and so is the number of RSBAC users.
If you're building a fence to keep dogs out, is it necessary to build a 100ft wall with notches at the top for easy access to add more height to the wall? The dogs are only a few feet tall. What's the point of all the extra bloat?
What you call ``bloat'' is actually necessary functionality. While you had to rewrite lots of gr-security to accomodate RBAC, no such thing was ever necessary for RSBAC. Because it got the architecture right from the beginning.
As much as you'd like to believe it, bigger is not always better. And when you tell someone they need a 100ft wall to keep out the dogs, they're going to ignore you and choose something that fits the purpose.
You are talking about the biggest fence. I am talking about flexibility and therefore choice. For example, if you have low security needs, then you could use RSBAC to manage Linux kernel capabilities, resources and setuid. That is all standard Linux security stuff. You don't need to learn any formal models to use it like that.
If that is not sufficient, you can add ACLs (similar to Novell ACL stuff, which many people already know). Or the more advanced models if you want.
The nice thing is that the setuid management module and the ACL module have a learning mode in the upcoming v1.2.3. So you don't have to specify everything in menus or from the command line.
I would say that grsecurity is popular because it takes a realistic approach to security.
I think that gr-security is popular because many people do not know much about security. And therefore take anything that is more secure than the bare Linux kernel. Even if it is something like gr-security.
As an analogy, if you build a house and I tell you it's not a very good bicycle, my statement would be silly.
It wouldn't be the first time you said something silly.
Simply having a learning mode is not enough, as I'm sure you'll soon find out.
Thank you for stating the obvious.
The ability to log normally denied accesses is trivial. It's the analysis and reduction that is a very difficult problem. Grsecurity can create least privilege policies for the entire system with no configuration.
Well, I can also claim that my bycicle will never suffer from motor damage. I mean, there is only hard-coded policy and a simple ACL model in gr-security. There is hardly anything to configure. Not that there is much flexibility and security there either.
So I still don't see how RSBAC is better, and I also don't see how any of my facts are unverifiable.
It is easier to see with your eyes open you know.
If a smart attacker owns X, SSH, or the kernel, the game is probably over in grsecurity (PaX will give them a hard time), but most definitely over in RSBAC and SELinux.
You're talking about PaX features here, not gr-security features. Your ACLs don't stop someone from owning X, OpenSSH or the kernel, it is PaX that does that. Adamantix has PaX in the kernel.
What do you have to say about that?
I'll tell you what I have to say about this: You make a lot of wild claims. But provide no proof whatsoever. Normally that is a sign that someone doesn't know what he's talking about.
These are problems that can't be solved by some bloated framework for different formal security models.
Basically you are now saying that the ACL and RBAC extensions in gr-security are worthless. You have a nice way of contradicting yourself.
I always recommend people to never depend their system security on one mechanism. That is why the Adamantix kernel has PaX *and* RSBAC. And that is why all binaries are compiled and linked for PaX Address Space Layout Randomisation (ASLR). And that is why GCC has been extended with the Stack Smashing Protector (SSP).
You may like to think that you invented the security in depth concept, but I can assure that that it existed long before you were born.
A more intelligent solution is needed, and grsecurity (and PaX) are the only projects working towards that goal.
Yeah, you are indeed working towards that goal. You still have a long way to go. RSBAC with PaX is already there.
If people ask for a problem to be solved, they're not asking for you to throw them a toolbox and tell them to do it themselves.
People tend to have different knowledge and different needs. Gr-security clearly targets the low-end. RSBAC can be used for both low-end and high-end stuff, but is probably more appealing for high-end stuff.
Groetjes,
Peter Busser.