Research
.
Skip Search Box

SELinux Mailing List

Re: New policy for tripwire

From: Russell Coker <russell_at_coker.com.au>
Date: Fri, 22 Apr 2005 01:14:33 +1000


On Sunday 13 March 2005 10:50, David Hampton <hampton-rh@rainbolthampton.net> wrote:
> This is written on an FC3 base system using the selinux-policy-strict-
> sources-1.22.1-2 policy from March 11th. These are the first policies
> I've submitted so I'd appreciate any comments on how to write better
> policies.

Executable types in .fc files should be marked with --. It makes setfiles run faster and also avoids bad policy being written when the executable gets replaced with a symlink or something else strange happens.

Labelling a binary in /usr/sbin as bin_t makes no sense.

I don't think that there's any need for so many domains.

Also tripwire domains probably don't make any sense. If you are serious about tripwire then you should boot from removable media to run it. Anyone who can crack a SE Linux system can surely sort out the tripwire database.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page

-- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.

Received on Thu 21 Apr 2005 - 20:06:16 EDT
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service