Research
Skip Research Menus
Research MenuSecurity Enhanced Linux What's New Frequently Asked Questions Background Documents License Download Participating Mail List Archives Remaining Work Contributors Related Work Press Releases Information Assurance Research NIARL In-house Research Areas Mathematical Sciences Program Sabbaticals Computer & Information Sciences Research Technology Transfer Advanced Computing Advanced Mathematics Communications & Networking Information Processing Microelectronics Other Technologies Technology Fact Sheets Publications Related Links |
SELinux Mailing ListRe: [Fwd: Re: avc_toggle and avc_enforcing]
From: Russell Coker <russell_at_coker.com.au>
Date: Fri, 17 Oct 2003 01:55:19 +1000
I guess that the next thing we want is per-role instantiations for run_init.
So for example we could have:
Then the Database administrator could login as user:dba_r:dba_t to run all unix programs, and they could have a SUID root program with type run_dba_exec_t which would run /etc/init.d/postgresql with specified parameters. That combined with a few rules relating to file access would give them full control over the database server without granting any access to the rest of the system. NB It's quite important that such uses of run_program which have something other than sysadm_t as the first parameter do not have initrc_t as the last parameter! It is very important that we restrict initrc_t. Also it's very important that the program which has run_dba_exec_t is a very simple program that sets it's UID, sets the execute context, and executes the script. As it has privrole we want to be very sure that it does not do the wrong thing. Privrole is necessary as it has to start the daemon as system_r. I've been meaning to write policy for this for some time, but have lacked suitable opportunities for testing. The machines I've been involved in running recently have all had a boolean policy regarding administrative privs... -- http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/ Postal SMTP/POP benchmark http://www.coker.com.au/~russell/ My home page -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Thu 16 Oct 2003 - 11:55:41 EDT |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |