Research
Skip Research Menus
Research MenuSecurity Enhanced Linux What's New Frequently Asked Questions Background Documents License Download Participating Mail List Archives Remaining Work Contributors Related Work Press Releases Information Assurance Research NIARL In-house Research Areas Mathematical Sciences Program Sabbaticals Computer & Information Sciences Research Technology Transfer Advanced Computing Advanced Mathematics Communications & Networking Information Processing Microelectronics Other Technologies Technology Fact Sheets Publications Related Links |
SELinux Mailing ListRe: Do you trust X server?
From: Tom <tom_at_lemuria.org>
Date: Thu, 24 Mar 2005 21:26:17 +0100
That it does. Nevertheless, its impact on the policy needs to be evaluated if you want to use X on an SELinux system. There's no point in saying "sure, it breaks all my security, but hey, it wasn't designed to keep the policy intact". Of course X is policy-ignorant. Most of the programs that SELinux has policies for are.
> You can trust the X server to the same i.e. ca. 90% of the applications we've written .te files for so far.
> If you That depends. As far as we can provide policy enforcement externally, the X server doesn't have to care. However, it has been noted in past discussions that the X server is, like login or ssh, one of the programs that cannot fulfill their role within an SELinux environment without either endangering said environment or becoming policy-aware.
> the "system" is not damaged at all. The DoS Most security issues are the consequence of from programming flaws. ;) -- http://web.lemuria.org/pubkey.html pub 1024D/2D7A04F5 2002-05-16 Tom Vogt <tom@lemuria.org> Key fingerprint = C731 64D1 4BCF 4C20 48A4 29B2 BF01 9FA1 2D7A 04F5 -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Thu 24 Mar 2005 - 15:25:56 EST |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |