Research
.
Skip Search Box

SELinux Mailing List

Re: can_network patch.

From: Russell Coker <russell_at_coker.com.au>
Date: Sat, 11 Dec 2004 10:47:46 +1100


On Saturday 11 December 2004 08:01, Valdis.Kletnieks@vt.edu wrote:
> On Sat, 11 Dec 2004 05:11:07 +1100, Russell Coker said:
> > We have mozilla running in it's own domain to limit the risk of exploits
> > of mozilla taking over the rest of the system. Allowing mozilla to
> > install packages seems to directly contradict this aim.
>
> Gaak. Given the "browser can install software" mentality that's one of the
> single biggest design borkages in That Other Browser/Operating System, we
> should do what we can to fix this...

I agree.

> > Maybe we should just remove the mozilla policy?
>
> I'd rather have a mozilla policy that enforces (roughly) "it can play
> inside the ~/.mozilla tree, and download into ~/Downloads or similar, and
> any other activity is constrained".

Same here.

> Or did you mean "remove the bit of policy that allows it to install
> packages", in which case we're in total agreement....

If we were going to give Mozilla the access to install packages (as was in the CVS until recently) then there was no benefit in trying to restrict it's access so we may as well have removed mozilla.te.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Fri 10 Dec 2004 - 18:48:02 EST
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service