Research Menu

.
Skip Search Box

SELinux Mailing List

Re: Proposed policy feature: $1_domain attribute

From: Ivan Gyurdiev <ivg2_at_cornell.edu>
Date: Tue, 01 Mar 2005 13:07:47 -0500


On Tue, 2005-03-01 at 12:31 -0500, Stephen Smalley wrote:
>On Tue, 2005-03-01 at 12:29 -0500, Ivan Gyurdiev wrote:
>> Well, in that case, how about an attribute to marks all of the programs
>> that have less permissions than the user. You said Tresys
>> has done inheritance work that can verify this stuff automatically.
>
>Not sure that their notion of inheritance will apply here, as it is:
>1) name-based, i.e. type A.B.C is bounded by the permissions allowed to
>type A.B and type A.B is bounded by the permissions allowed to type A,
>2) strict, i.e. type A.B.C cannot any permissions to type D unless type
>A has those permissions, whereas program domains have often some
>additional permissions even if we consider them to be less privileged
>for their own private objects,
>3) likely to cut across domains differently than you envision, as it is
>intended to allow delegation of management of portions of the policy,
>e.g. the entire apache policy, without being able to alter properties of
>the base policy (as bounded by the overall "apache" type).

I'm tempted to try and put the policy in a database and write SQL queries against that. :) There's too many rules - hard to keep track of them all.

>> How about a: $1_constrained attribute.
>>
>> Then we can do:
>> can_ps($1, $1_constrained)
>> can_ptrace($1, $1_constrained)
>> allow $1 $1_constrained:process signal;
>
>I think I'd prefer a macro that can be selectively included by program
>domains that have been identified as being suitable for complete control
>by the user (but if you are allowing ptrace, then you might as well
>allow all signals, including sigkill and sigstop).

Okay then - now I just have to find out which types are 'safe'.

-- 
Ivan Gyurdiev <ivg2@cornell.edu>
Cornell University


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Tue 1 Mar 2005 - 13:07:29 EST
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service