Research Menu

.
Skip Search Box

SELinux Mailing List

Re: [RFC & PATCH] inherited type definition.

From: Kaigai Kohei <kaigai_at_ak.jp.nec.com>
Date: Wed, 16 Mar 2005 13:35:36 +0900


Hi Karl, Thanks for your comments.

> Not exactly - that is certainly one problem, but the main problem is that I want
> the ability to create a group of types based on another group of types, e.g. I
> want to create staff_ssh_t and staff_home_ssh_t based on the corresponding user
> types. In this model staff_ssh_t wouldn't have any access to user_home_ssh_t,
> instead it will have the same access that user_ssh_t has to user_home_ssh_t
> except to staff_home_ssh_t.

OK, I have misunderstood about your concern.

BTW, I don't think your 'group of types' idea conflicts with my patch. Because the results of "TYPE ... EXTENDS" look like two similar type/domain in binary level, any existing tools can handle the generated policy binary without any problems. (Thus, I adopted sediff to check the patched checkpolicy.) How does your ideas work ? and, how does conflict with "TYPE ... EXTENDS" approach?

>>This look like the usage of ATTRIBUTE. But we can't define
>>multi-layer structure for attribute on current checkpolicy.
>>My extension make it possible.
>
> I'm not certain what you mean here - if generic_ssh was an attribute with a
> defined set of permissions, this would work almost the same. The
> user/staff_ssh_t would need some additional attributes in addition to
> generic_ssh, but otherwise this is very similar. Can you explain the advantage
> to your suggestion in more detail?

Yes, those works similarly. But current implementation of attribute doesn't permit such a usage. In above example, generic_ssh is attached some attributes, but we can't attach any attributed to attribute on current checkpolicy. Because "TYPE ... EXTENDS" statement is implemented by existing attribute implementation, this extension has similar functionality is natural. This extensiton make it possible to define multiple-layer type/domain with minimum modification and enough compatibility.

> It may be easier, but it is fundamentally dangerous. A user that simply extends
> an existing type without understanding the access granted to that type is
> potentially granting a new type excessive access. I think that there are real
> capabilities that are needed in the language, but I disagree with adding this
> syntax simply for ease-of-use. I think that there are other methods to make it
> easier for users to author policy without these dangers.

Since we can't enforce end-user to apply specific configuration, it's possible to happen an excessive access in anywhere. I think end-user should select the best way corresponding to own skill and so on. Providing another options is not bad.

Thanks,

--
DO NOTHING IS THE WORST POLICY.
KaiGai Kohei <kaigai@kaigai.gr.jp>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Tue 15 Mar 2005 - 23:41:32 EST
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service