Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
|
SELinux Mailing ListRe: Where to specific the handling of unknown kernel classes and perms
From: Stephen Smalley <sds_at_tycho.nsa.gov>
Date: Thu, 03 May 2007 09:54:39 -0400
I understand that, but as semanage.conf is not "managed" (just a config file to rpm and not managed by libsemanage itself) and changes to it are not audited, this means that you won't be able to tell easily what behavior was in effect at a given time. That's the tradeoff. Regardless, for Eric's purposes, it would be sufficient for basic operation to add a command line flag to checkpolicy and checkmodule to set these flags in monolithic policy and base modules, and to modify libsepol (in particular, expand_module()) to propagate the base flags in the same manner as it already does for the mls flag. Then he or we can separately add a libsepol interface to mutate the flag and modify libsemanage to use that interface and have a new semanage.conf setting. -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Thu 3 May 2007 - 09:54:41 EDT |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |