Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
|
SELinux Mailing ListRe: Desktop apps interoperability
From: Stephen Smalley <sds_at_tycho.nsa.gov>
Date: Mon, 28 Mar 2005 10:12:30 -0500
Seems fairly pointless to perform such a relabeling if the context determination is based entirely on untrusted input from the same source as the data itself and the user isn't involved to any greater degree than selecting the file in the first place. If you are going to run it through a filtering pipeline (e.g. malicious code checker), then it makes more sense to set up a relabeling or data copying pipeline using TE to ensure that each filter stage is unbypassable and tamperproof (i.e. an assured pipeline in TE parlance). Note however that relabeling in place is not necessarily safe, as Linux does not yet fully support revocation of access. -- Stephen Smalley <sds@tycho.nsa.gov> National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Mon 28 Mar 2005 - 10:21:14 EST |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |