From: "Karl MacMillan" <kmacmillan@tresys.com>
To: "Stephen Smalley" <sds@epoch.ncsc.mil>, <selinux@tycho.nsa.gov>
Cc: "Russell Coker" <russell@coker.com.au>,
"Daniel J Walsh" <dwalsh@redhat.com>, <selinux-dev@tresys.com>
Subject: Re: Now that SELinux supports booleans should we replace tunableswith booleans?
Date: Fri, 6 Aug 2004 11:57:53 -0400 [thread overview]
Message-ID: <002201c47bce$22783840$0102a8c0@DESKTOP> (raw)
In-Reply-To: 1091709228.11061.47.camel@moss-spartans.epoch.ncsc.mil
----- Original Message -----
From: "Stephen Smalley" <sds@epoch.ncsc.mil>
To: <selinux@tycho.nsa.gov>
Cc: "Russell Coker" <russell@coker.com.au>; "Daniel J Walsh"
<dwalsh@redhat.com>; <selinux-dev@tresys.com>
Sent: Thursday, August 05, 2004 8:33 AM
Subject: RE: Now that SELinux supports booleans should we replace
tunableswith booleans?
> On Thu, 2004-08-05 at 08:30, Stephen Smalley wrote:
> > Dan has raised the issue of how to handle policy reloads when using
> > booleans, as a policy reload will reset the boolean values to the
> > compile-time default settings. We could certainly extend load_policy to
> > also set the booleans based on the same configuration file used at boot
> > time, but that will leave open a window between the policy reload and
> > the setting of the booleans where the active policy will fall back to
> > the compile-time defaults. That could break running processes or create
> > a window of vulnerability, depending on whether the compile-time
> > defaults are more secure or less secure than the configuration file
> > settings. We could have the policy Makefile patch the boolean default
> > settings based on the configuration file, so that a policy rebuild would
> > change the compile-time defaults to match the desired settings, but that
> > requires policy sources, which may not be available (e.g. the policy
> > reload may have been triggered by a binary policy update, and the end
> > system may not have policy sources installed). Thoughts?
>
> Actually, it would be easy to create a simple utility that patches a
> binary policy to change the boolean default values, so that would be a
> possibility.
>
Just changing the booleans isn't enough - you would also need to evaluate
all of the expressions and set rules to active/inactive. If you were
planning to take the same approach as the user management tool that you just
did, this should be trivial. The other option is that the reading code could
be changed to evaluate all of the expressions after loading a policy so that
changes to the booleans would become active, but that would obviously
require kernel changes.
For the reload case, the only other idea that I can think of is to have
security_load_policy copy the current boolean states to the newly loaded
policy for booleans that are shared between the policies. I'm not certain
this is a good idea - and you probably want to have a way to disable the
behavior - but the advantage is that it allows booleans to be persistent
while a machine is running without requiring them to be persistent across
reboots. It seems to me that persistance across reboots is actually a
separate case and I am concerned about administrator confusion about when a
change to a boolean is temporary and when it is persistent. I agree,
however, that it is important to have some safe mechanisms for making the
boolean states stay during reload and reboots.
Karl
> --
> Stephen Smalley <sds@epoch.ncsc.mil>
> National Security Agency
>
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2004-08-06 16:03 UTC|newest]
Thread overview: 46+ messages / expand[flat|nested] mbox.gz Atom feed top
2004-04-13 13:59 Now that SELinux supports booleans should we replace tunables with booleans? Daniel J Walsh
2004-04-13 17:09 ` Chris PeBenito
2004-04-13 17:53 ` Tom Mitchell
2004-04-14 13:16 ` Karl MacMillan
2004-04-14 16:19 ` Russell Coker
2004-04-14 17:19 ` Karl MacMillan
2004-04-14 19:50 ` Valdis.Kletnieks
[not found] ` <407DF398.4010405@redhat.com>
2004-04-15 5:28 ` Russell Coker
2004-04-15 14:52 ` Valdis.Kletnieks
2004-04-14 19:58 ` James Morris
2004-04-14 20:19 ` James Morris
2004-04-21 16:05 ` Karl MacMillan
2004-04-13 23:17 ` Russell Coker
2004-04-14 13:11 ` Karl MacMillan
2004-04-14 13:30 ` Stephen Smalley
2004-04-14 14:10 ` Now that SELinux supports booleans should we replace tunableswith booleans? Karl MacMillan
2004-04-14 16:00 ` Russell Coker
2004-04-14 13:38 ` Now that SELinux supports booleans should we replace tunables with booleans? Russell Coker
2004-04-14 14:53 ` Karl MacMillan
2004-08-02 18:53 ` Stephen Smalley
2004-08-02 19:08 ` Stephen Smalley
2004-08-05 12:30 ` Stephen Smalley
2004-08-05 12:33 ` Stephen Smalley
2004-08-05 13:44 ` Daniel J Walsh
2004-08-06 14:04 ` Stephen Smalley
2004-08-06 15:57 ` Karl MacMillan [this message]
2004-08-06 16:20 ` Now that SELinux supports booleans should we replace tunableswith booleans? Stephen Smalley
2004-08-09 20:11 ` Stephen Smalley
2004-08-10 6:46 ` Russell Coker
2004-08-10 14:29 ` Karl MacMillan
2004-08-10 14:33 ` Daniel J Walsh
2004-08-10 14:47 ` Karl MacMillan
2004-08-10 14:43 ` Stephen Smalley
2004-08-10 17:06 ` Timothy Wood
2004-08-10 17:20 ` Stephen Smalley
2004-08-10 13:25 ` Daniel J Walsh
2004-08-06 14:02 ` Now that SELinux supports booleans should we replace tunables with booleans? Stephen Smalley
2004-08-06 14:20 ` Joshua Brindle
2004-08-06 14:28 ` Stephen Smalley
2004-08-06 14:38 ` Daniel J Walsh
2004-08-06 15:30 ` Stephen Smalley
2004-08-06 15:36 ` kmacmillan
2004-08-06 14:23 ` Stephen Smalley
2004-08-06 14:40 ` Daniel J Walsh
2004-08-06 15:02 ` Stephen Smalley
2004-08-23 19:33 ` Daniel J Walsh
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='002201c47bce$22783840$0102a8c0@DESKTOP' \
--to=kmacmillan@tresys.com \
--cc=dwalsh@redhat.com \
--cc=russell@coker.com.au \
--cc=sds@epoch.ncsc.mil \
--cc=selinux-dev@tresys.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.