Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
|
SELinux Mailing ListRe: Cleanup of chkpwd and su macros
From: James Carter <jwcart2_at_epoch.ncsc.mil>
Date: Fri, 22 Apr 2005 15:20:15 -0400
If the permissions are only needed when unix_chkpwd is not executed and system_chkpwd_t is not used, then why grant them in the chkpwd_domain macro in an ifelse statement where permissions specific to system_chkpwd_t are granted?
> Where do you think that the permissions should be if not the auth_chkpwd How about a can_authenticate macro? Another option would be to add the permissions directly to the domains.
Here is the list of domains that have the auth_chkpwd attribute:
(* - already uses can_ypbind, + - already uses can_kerberos)
sysadm_userhelper_t *
If it seems like the best answer is to keep these permissions with chkpwd, then at least they should be pulled out of the macro so it is clear that they are not needed for system_chkpwd_t (which already has them), but for the calling domains. -- James Carter <jwcart2@epoch.ncsc.mil> National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Fri 22 Apr 2005 - 15:24:37 EDT |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |