All of lore.kernel.org
 help / color / mirror / Atom feed
* Updated release
@ 2001-10-16 22:03 Howard Holm
  2001-10-17 15:05 ` Stephen Smalley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2001-10-16 22:03 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated.  The site includes a new release of the
LSM-based SELinux prototype.  This release contains bug fixes and
additional policy domains and permissions.  The capability module may
now be stacked with SELinux.  The base for SELinux has been updated to
the lsm-2001_10_11 patch against kernel 2.4.12.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2004-06-29 21:16 Howard Holm
  0 siblings, 0 replies; 71+ messages in thread
From: Howard Holm @ 2004-06-29 21:16 UTC (permalink / raw)
  To: selinux

[-- Attachment #1: Type: text/plain, Size: 513 bytes --]

The SELinux web site <http://www.nsa.gov/selinux/> has been updated. The
site includes a new release of the SELinux prototype. The current
prototype and the experimental NFS code are now based on Linux kernel
2.6.7. Fine-grained netlink classes and permissions have been added.
Many enhancements and bugfixes for policy as well as userland tools
including slat and setools have been incorporated.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Office of Defensive Computing Research
National Security Agency

[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2004-05-13 23:10 Howard Holm
  2004-05-14 14:26 ` Stephen Smalley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2004-05-13 23:10 UTC (permalink / raw)
  To: selinux

[-- Attachment #1: Type: text/plain, Size: 707 bytes --]

The SELinux web site <http://www.nsa.gov/selinux/> has been updated. The
site includes a new release of the SELinux prototype. The current
prototype and the experimental NFS code are now based on Linux kernel
2.6.6. Several races and kernel socket creation have been fixed and a
runtime disable has been added. The old linux 2.4-based kernel patch has
been ported to 2.4.26. The userland patches have been updated from
Fedora Core 2 development. There are now man pages for libselinux. X
server security classes and access vector definitions were added and
many policy updates were made.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Office of Defensive Computing Research
National Security Agency

[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2004-04-08 14:29 Howard Holm
  0 siblings, 0 replies; 71+ messages in thread
From: Howard Holm @ 2004-04-08 14:29 UTC (permalink / raw)
  To: selinux

[-- Attachment #1: Type: text/plain, Size: 487 bytes --]

The SELinux web site <http://www.nsa.gov/selinux/> has been updated. The
site includes a new release of the SELinux prototype. The current
prototype and the experimental NFS code are now based on Linux kernel
2.6.5. IPv6 support has been added. A new sestatus utility is
available.  A number of bugs have been fixed and many updates have been
made to the example policy.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Office of Defensive Computing Research
National Security Agency

[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2004-03-12 18:34 Howard Holm
  2004-03-16 13:16 ` James Carter
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2004-03-12 18:34 UTC (permalink / raw)
  To: selinux

[-- Attachment #1: Type: text/plain, Size: 780 bytes --]

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. OpenPGP signatures are now available for
released code. The site includes a new release of the SELinux prototype.
Experimental SELinux NFS code has been made available. The base kernel
version for 2.4 has been updated to 2.4.25. The base version for 2.6
remains 2.6.3, but the SELinux patch has been updated.  Among the
improvements in this release: Fine-grained boolean labeling support has
been merged. The userspace AVC has been enhanced to handle netlink
selinux notifications. MLS improvements have been merged as well as
updates to slat and the example policy.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency

[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2004-02-23 23:19 Howard Holm
  0 siblings, 0 replies; 71+ messages in thread
From: Howard Holm @ 2004-02-23 23:19 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated and redesigned.  The base kernel versions
have been updated to 2.4.24 and 2.6.3.  The 2.6.3 kernel patches include
significant enhancements including port-based controls, mount context
options, and conditional policy extensions.  libselinux now includes
code for a userspace AVC and discovers the selinuxfx mount point at
runtime.  Many other updates and bugfixes have been applied.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Office of Defensive Computing Research
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2003-12-05 20:28 Howard Holm
  0 siblings, 0 replies; 71+ messages in thread
From: Howard Holm @ 2003-12-05 20:28 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The site includes a new release of the
LSM-based SELinux prototype. The base kernel versions have been updated
to 2.4.23 and 2.6.0-test11. In 2.6.0-test11 controls have been added for
inheritance of signal-related state and resource limits and the network
interface and node controls have been reimplemented.  SysVinit has been
patched to eliminate the need for a modified initrd.  Login now uses a
pam_selinux module.  Many other updates have been made to the tools,
utilities and userland patches.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Office of Defensive Computing Research
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2003-10-02 17:13 Howard Holm
  2003-10-03  6:47 ` Andreas Schuldei
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2003-10-02 17:13 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated.  SELinux kernel patches for 2.6.0-test6
and 2.4.21 are available.  The updated kernel patches include support
for an selinux boot parameter and improved auditing.  A number of
bugfixes and improvements have been integrated into the user space tools
and utilities.  SRPMs for newer Red Hat packages are available.  The
star package has been added.  The example policy has been updated. 
Improvements have been made to existing policy tools, and a new policy
analysis tool has been added.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Office of Defensive Computing Research
National Security Agency

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2003-08-14 11:46 Howard Holm
  2003-08-14 16:14 ` Chris PeBenito
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2003-08-14 11:46 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the
maillist archive has been updated.  The SELinux module has been merged
into the mainline kernel as of 2.6.0-test3.  This release includes new
kernel patches based on the 2.6.0-test3 kernel and a backport of the 2.6
SELinux module to the 2.4.21 kernel.  The new API is consistent between
2.4 and 2.6.  The old 2.4 API and user-space utilities are no longer
actively maintained.  There have been a number of bug fixes and cleanups
to the library and utilities as well as new contributions to the example
policy.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Office of Defensive Computing Research
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2003-07-11 19:41 Howard Holm
  2003-07-11 23:31 ` Christopher J. PeBenito
  2003-07-31  2:56 ` Bill Laut
  0 siblings, 2 replies; 71+ messages in thread
From: Howard Holm @ 2003-07-11 19:41 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The base kernel versions have been
updated to 2.5.74 and 2.4.21.  The SELinux API redesign with xattr
support has been completed for the version 2.5 based kernel.  The
SELinux daemon and utility patches have been ported to the new API. 
Support for the AT_SECURE auxv entry was added.  Changes were made to
bprm hook permission checking and nosuid operation.  A report, "Securing
the X Window System with SELinux" was added to documentation discussing
adding SELinux controls to the window system.  Finally, many contributed
patches to tools and policy have been merged and RPM spec files and
SRPMs are now provided.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2003-04-07 20:46 Howard Holm
  2003-04-08 14:11 ` Stephen Smalley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2003-04-07 20:46 UTC (permalink / raw)
  To: SELinux Mailing List

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The example policy has been updated with
enhancements and cleanups.  A number of bugs have been fixed in the
SELinux module.  The updated module is available for the ia32 2.4.20
Linux kernel.   The updated module is also available for both the
mainline 2.5.66 Linux kernel and an LSM patched 2.5.66 Linux kernel. 
The new mainline module also includes work in preparation for a new
SELinux API.  Finally, a port of SELinux to the arm 2.4.19 kernel is
also now available.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Re: Updated Release
@ 2003-01-16 16:12 Stephen D. Smalley
  0 siblings, 0 replies; 71+ messages in thread
From: Stephen D. Smalley @ 2003-01-16 16:12 UTC (permalink / raw)
  To: selinux


The updated release (2003011510) has been imported and merged into
the sourceforge selinux CVS tree under the 'nsa' module.  As usual,
you can check out a copy via:

cvs -d:pserver:anonymous@cvs.selinux.sourceforge.net:/cvsroot/selinux \
-z3 co nsa

> The SELinux web site <http://www.nsa.gov/selinux/> including the mail
> list archive has been updated. The site includes a new release of the
> LSM-based SELinux prototype. The base 2.5 kernel version has been
> updated to 2.5.58.  The base 2.4 kernel version remains at 2.4.20, but
> the LSM patch and the SELinux module for 2.4 have changed since the last
> release.  New contributed policy analysis and policy management tools
> have been added to the provided tools and utilities. Hooks for xattr
> operations were added to 2.4.  Inode security initialization has been
> reworked using the d_instantiate hook.  The nfsd private file bug in 2.4
> has been fixed and the task_kill bug in 2.5 has been fixed.  Configuring
> the SELinux Policy, a technical report included in the documentation,
> has been updated to reflect recent changes.

--
Stephen Smalley, NSA
sds@epoch.ncsc.mil


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2003-01-16 15:31 Howard Holm
  0 siblings, 0 replies; 71+ messages in thread
From: Howard Holm @ 2003-01-16 15:31 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The site includes a new release of the
LSM-based SELinux prototype. The base 2.5 kernel version has been
updated to 2.5.58.  The base 2.4 kernel version remains at 2.4.20, but
the LSM patch and the SELinux module for 2.4 have changed since the last
release.  New contributed policy analysis and policy management tools
have been added to the provided tools and utilities. Hooks for xattr
operations were added to 2.4.  Inode security initialization has been
reworked using the d_instantiate hook.  The nfsd private file bug in 2.4
has been fixed and the task_kill bug in 2.5 has been fixed.  Configuring
the SELinux Policy, a technical report included in the documentation,
has been updated to reflect recent changes.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Re: Updated Release
@ 2002-12-16 14:57 Stephen D. Smalley
  0 siblings, 0 replies; 71+ messages in thread
From: Stephen D. Smalley @ 2002-12-16 14:57 UTC (permalink / raw)
  To: selinux, hdholm


The updated release (2002121210) has been imported and merged into
the sourceforge selinux CVS tree under the 'nsa' module.  As usual,
you can check out a copy via:

cvs -d:pserver:anonymous@cvs.selinux.sourceforge.net:/cvsroot/selinux \
-z3 co nsa

On Fri, 12 Dec 2002, Howard Holm wrote:

> The SELinux web site <http://www.nsa.gov/selinux/> including the mail
> list archive has been updated. The site includes a new release of the
> LSM-based SELinux prototype. The base kernel versions have been updated
> to 2.4.20 and 2.5.51.  Initial SID and context for SCMP packets has been
> added.  Additional policy enhancement and patch contributions have been
> merged. The logrotate patch has been updated to 3.6.5-2. The private
> file oversight in LSM, inode_doinit bug in SELinux, and selopt compile
> problems have all been fixed.

--
Stephen Smalley, NSA
sds@epoch.ncsc.mil


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2002-12-13 15:41 Howard Holm
  0 siblings, 0 replies; 71+ messages in thread
From: Howard Holm @ 2002-12-13 15:41 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The site includes a new release of the
LSM-based SELinux prototype. The base kernel versions have been updated
to 2.4.20 and 2.5.51.  Initial SID and context for SCMP packets has been
added.  Additional policy enhancement and patch contributions have been
merged. The logrotate patch has been updated to 3.6.5-2. The private
file oversight in LSM, inode_doinit bug in SELinux, and selopt compile
problems have all been fixed.

-- 
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2002-10-23 14:16 Howard Holm
  2002-10-23 19:57 ` Stephen Smalley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2002-10-23 14:16 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The site includes a new release of the
LSM-based SELinux prototype. The base 2.5 kernel version has been
updated to 2.5.44. The base 2.4 kernel version remains at 2.4.19, but
many changes have been made to the 2.4 LSM patch and to the 2.4 SELinux
module since the last release. The modified login, sshd and crond
programs have been updated to use a new configuration scheme. Socket
handling has been improved. Internally, precondition functions have
been removed in favor of early initialization support. The modified tar
has been updated to tar-1.13.25. A number of other improvements, bug
fixes and policy enhancements have taken place.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2002-08-24 17:45 Howard Holm
  2002-08-26 12:36 ` Stephen Smalley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2002-08-24 17:45 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The site includes a new release of the
LSM-based SELinux prototype.  The base kernel versions were updated to
2.4.19 and 2.5.31.  The SELinux peer SID functionality was
re-implemented with new sock hooks; the accept_secure call should now
be reliable.  The sysctl hook and /proc/sys labeling were made
configurable.  Other minor enhancements were made including checkpolicy
and the example policy.  Bugs were fixed in auditing logic, PSID
mapping code, and ipc permission hook.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2002-07-03 19:59 Howard Holm
  2002-07-04 11:33 ` Grant Bayley
  2002-07-05 12:11 ` Stephen Smalley
  0 siblings, 2 replies; 71+ messages in thread
From: Howard Holm @ 2002-07-03 19:59 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The site includes a new release of
the LSM-based SELinux prototype.  The stable (2.4) LSM-based SELinux
prototype remains at kernel 2.4.18.  The development (2.5) LSM-based
SELinux prototype was updated to kernel 2.5.24.  The OpenSSH patch has
been updated to openssh-3.4p1.  The file system labeling support has
been generalized and labeling for kernel-generated IGMP and ICMP
traffic has been added.  Many improvements have been made in the policy
including making many policy sections optional, changing the audit
configuration syntax, adding explicit type attribute declarations, and
merging many contributed domains and policy changes.  The technical
report describing configuration of the policy has also been updated.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency


--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2002-05-31 21:32 Howard Holm
  2002-06-01 10:21 ` Russell Coker
  2002-06-03 15:08 ` Stephen Smalley
  0 siblings, 2 replies; 71+ messages in thread
From: Howard Holm @ 2002-05-31 21:32 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The site includes a new release of
the LSM-based SELinux prototype.  The stable (2.4) LSM-based SELinux
prototype remains at kernel 2.4.18.  The development (2.5) LSM-based
SELinux prototype was updated to kernel 2.5.19.  The MLS support has
been enhanced, although it is still experimental. Support was added for
selecting enforcing mode at boot/insertion time. The extended socket
call processing was encapsulated and made optional. Connection peer SID
lists for accept_secure were implemented.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency



--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2002-05-02 20:32 Howard Holm
  2002-05-03  4:33 ` Grant Bayley
  2002-05-03 14:06 ` Stephen Smalley
  0 siblings, 2 replies; 71+ messages in thread
From: Howard Holm @ 2002-05-02 20:32 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated.  Two new technical reports are available
in the documentation: a document describing the policy language and a
document describing the current LSM implementation of SELinux.  The
site also includes a new release of the LSM-based SELinux prototype.
The stable (2.4) LSM-based SELinux prototype remains at kernel 2.4.18.
The development (2.5) LSM-based SELinux prototype was updated to kernel
2.5.10.  A number of policy improvements, minor feature enhancements
and bug fixes have also been made.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency


--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
[parent not found: <72222DC86846D411ABD300A0C9EB08A10152430C@csoc-mail-box.csoconline.com>]
* Updated Release
@ 2002-03-14 20:12 Howard Holm
  2002-03-15 14:38 ` Stephen Smalley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2002-03-14 20:12 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated.  The site includes a new release of the
LSM-based SELinux prototype.  The stable (2.4) LSM-based SELinux
prototype was updated to kernel 2.4.18.  The development (2.5)
LSM-based SELinux prototype was updated to kernel 2.5.6.  The modified
utilities have been updated to Red Hat Linux 7.2-based versions.  A
number of new policy domains have been added and policy restructured.
Support for usbdevfs and work for labeled networking has been added.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated Release
@ 2002-01-18 22:56 Howard Holm
  2002-01-19  0:18 ` Grant Bayley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2002-01-18 22:56 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated.  The site includes a new release of the
LSM-based SELinux prototype.  The stable (2.4) LSM-based SELinux
prototype was updated to kernel 2.4.17 and was updated to include a
number of bug fixes and minor enhancements made since the previous
release. A new development (2.5) LSM-based SELinux prototype based on
kernel 2.5.2 was also added to the site.  The original SELinux
prototype (which was not based on LSM) has been reduced to just the
2.2.19 and 2.4.3 kernel patches for historical reference. The technical
report describing the design and implementation of the original 2.2
kernel patch is also still available for historical reference.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Re: Updated release
@ 2001-12-10 20:55 Howard Holm
  2001-12-11  3:27 ` Grant Bayley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2001-12-10 20:55 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated.  The site includes a new release of the
LSM-based SELinux prototype.  This release is based on the
lsm-full-2001_12_10 patch against kernel 2.4.16 which merges SELinux
into the LSM tree.  Many utilities have been updated to newer versions
to improve compatibility with Red Hat 7.2. Auditing has been revised
for easier parsing and several additional bugs were fixed.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated release
@ 2001-11-20 14:10 Howard Holm
  2001-11-21  1:30 ` Grant Bayley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2001-11-20 14:10 UTC (permalink / raw)
  To: selinux

The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated.  The site includes a new release of the
LSM-based SELinux prototype.  This release is based on the
lsm-2001_11_05 patch against kernel 2.4.14.  It fixes a number of bugs,
cleans up some code, and is based on newer versions of the kernel and
utilities.

The following changes should be carefully noted if you have previously
installed SELinux:

1) LSM has renamed all LSM-related configuration options to use a
CONFIG_SECURITY prefix, and we have done likewise for the SELinux
kernel option.  This means that old .config files aren't quite right
anymore.  You can still use them, but you'll need to explicitly enable
the LSM-related (IP Networking hooks, Capabilities) and SELinux options
again when you configure (unless you hand edit your old .config file to
reflect the name changes).

2) A small change was made to the policydb format, so you need to
rebuild checkpolicy and recompile your policy with the updated
checkpolicy program.  Also, if you have customized your policy, you
need to at least pick up a new initial SID definition (sysctl_net_unix)
in the initial_sid_contexts file.

3) The execve_secure system call has been reimplemented via the general
security system call.  Previously, this system call remained as a
separate entrypoint due to the inability to access register state
(needed by execve) from the general security system call, but this was
undesireable because only the security call is reserved in the
mainstream kernel.  We found that we could reimplement the
execve_secure call via the security call by replacing the LSM security
call entrypoint function with our own architecture-specific entrypoint
function that can support both execve_secure and all of our other
calls.  So you must recompile libsecure and relink all applications
that use exec.*_secure against it (runas, newrole, crond, run_init,
sshd, login, Mark Westerman's modified gdm).  This will be a nuisance
for current users, but ensures that you should never have to do so
again, since the security syscall is reserved, unlike the old separate
entrypoint for execve_secure.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Secure Systems Research Office
National Security Agency


--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated release
@ 2001-08-24 14:30 Howard Holm
  2001-09-27 22:11 ` Howard Holm
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2001-08-24 14:30 UTC (permalink / raw)
  To: selinux

The NSA SELinux web site (http://www.nsa.gov/selinux/) has been updated.
It includes a completely new variant of the SELinux prototype
based on the Linux Security Modules (LSM) work.  This patches for the
LSM-based prototype are based on the Linux 2.4.9 kernel, and the patches
for the utilities are known to work with Red Hat Linux 7.1.

Additional web site updates include additional papers and presentations,
and the long awaited updating of the SELinux hyper-mail mail list archives.
Remember, current archives are always available via e-mail (see
http://www.nsa.gov/selinux/list.html) even when the hyper-mail archives are
out of date.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Information Assurance Research Group
National Security Agency

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated release
@ 2001-04-17 21:23 Howard Holm
  0 siblings, 0 replies; 71+ messages in thread
From: Howard Holm @ 2001-04-17 21:23 UTC (permalink / raw)
  To: selinux

The NSA web site (www.nsa.gov/selinux) for Security-enhanced Linux was
updated Friday.

Changes include:

- Documentation now includes the slides used by Pete Loscocco at the
  Linux 2.5 Kernel Summit.
- The mailing list archives are more current
- Kernel patches are now provided for kernel versions 2.2.19 and 2.4.3

--
Howard Holm <hdholm@epoch.ncsc.mil>
Information Assurance Research Office
National Security Agency

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated release
@ 2001-03-16 16:07 Howard Holm
  2001-03-16 23:29 ` Grant Bayley
  0 siblings, 1 reply; 71+ messages in thread
From: Howard Holm @ 2001-03-16 16:07 UTC (permalink / raw)
  To: selinux

An updated release of Security-enhanced Linux has been posted on the
NSA web site (www.nsa.gov/selinux).

Changes include:

- Updated information on the developers' mailing list and archives was
  made available.
- Answers to Frequently Asked Questions were added to the site. 
- Kernel patches are now provided for 2.4.2 and 2.2.18. 
  - The 2.4.2 patch includes changes to virtualize the persistent SID
    mapping interfaces and the file mandatory access controls.
  - The 2.2.18 patch includes several bug fixes to the old 2.2-based
    patch. It also includes a new implementation of System V IPC
    mandatory access controls. These controls have not yet been ported to
    the 2.4 kernel.
  - Both the 2.2.18 and 2.4.2 patches incorporate a change in the
    implementation of the new system calls that is not backward
    compatible with the old implementation. Hence, the updated libsecure
    must be compiled and all modified utilities must be relinked against it.
- The util-linux patch is now provided for the util-linux-2.10s sources
  from kernel.org.
- The procps patch is now provided for the procps-010114 sources from
  http://www.cs.uml.edu/~acahalan/procps.
- The vixie-cron patch is now provided for the vixie-cron-3.0.1-61
  sources from RedHat.
- A small fix was made to the spasswd wrapper program to ensure that it
  is not mistakenly used by an administrator to try to change another
  user's password. A README was added to explain the purpose of this
  program.
- The shadow password file is no longer moved by the installation
  scripts, and the modified versions of libpwdb, sulogin, and the shadow
  utilities are no longer provided. The relocation of the shadow password
  file was creating compatibility problems with a number of applications
  despite the updatedlibpwdb. A different approach for maintaining a
  separate security context on the shadow password file will be
  implemented in the future.
- The modified versions of rshd and wu-ftpd were removed from the
  distribution and each of these daemons were limited to their initial
  domain in the example policy configuration.

--
Howard Holm <hdholm@epoch.ncsc.mil>
Information Assurance Research Office
National Security Agency

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread
* Updated release
@ 2001-01-02 22:28 Pete Loscocco
  0 siblings, 0 replies; 71+ messages in thread
From: Pete Loscocco @ 2001-01-02 22:28 UTC (permalink / raw)
  To: selinux

An updated release of Security-enhanced Linux that corrects some of the
minor problems in the original release has been posted on the NSA web
site (www.nsa.gov/selinux).

Changes include:

- moving the numbers of the new system calls to avoid conflicts
- fixing the buffer overflow problem discovered in the
  find_default_type function in libsecure
- removed extra ';' in policy grammar
- minor adjustments in kernel/flask/Makefile

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 71+ messages in thread

end of thread, other threads:[~2004-06-29 21:16 UTC | newest]

Thread overview: 71+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2001-10-16 22:03 Updated release Howard Holm
2001-10-17 15:05 ` Stephen Smalley
2001-10-18  9:11   ` J
2001-10-18 12:48     ` [PATCH] Bug fixes for non-PAM newrole and run_init (Was: Re: Updated release) Stephen Smalley
  -- strict thread matches above, loose matches on Subject: below --
2004-06-29 21:16 Updated Release Howard Holm
2004-05-13 23:10 Howard Holm
2004-05-14 14:26 ` Stephen Smalley
2004-04-08 14:29 Howard Holm
2004-03-12 18:34 Howard Holm
2004-03-16 13:16 ` James Carter
2004-02-23 23:19 Howard Holm
2003-12-05 20:28 Howard Holm
2003-10-02 17:13 Howard Holm
2003-10-03  6:47 ` Andreas Schuldei
2003-10-03 13:45   ` Stephen Smalley
2003-10-04 11:40     ` Andreas Schuldei
2003-10-06 14:20       ` Stephen Smalley
2003-10-06 17:55         ` Tom
2003-10-03 14:19   ` Daniel J Walsh
2003-08-14 11:46 Howard Holm
2003-08-14 16:14 ` Chris PeBenito
2003-08-14 18:21   ` James Carter
2003-07-11 19:41 Howard Holm
2003-07-11 23:31 ` Christopher J. PeBenito
2003-07-14 11:59   ` Stephen Smalley
2003-07-31  2:56 ` Bill Laut
2003-07-31 12:20   ` Stephen Smalley
2003-04-07 20:46 Howard Holm
2003-04-08 14:11 ` Stephen Smalley
2003-01-16 16:12 Stephen D. Smalley
2003-01-16 15:31 Howard Holm
2002-12-16 14:57 Stephen D. Smalley
2002-12-13 15:41 Howard Holm
2002-10-23 14:16 Howard Holm
2002-10-23 19:57 ` Stephen Smalley
2002-08-24 17:45 Howard Holm
2002-08-26 12:36 ` Stephen Smalley
2002-07-03 19:59 Howard Holm
2002-07-04 11:33 ` Grant Bayley
2002-07-04 13:07   ` Brad Chapman
2002-07-04 13:10     ` Grant Bayley
2002-07-04 15:53       ` Brad Chapman
2002-07-05 12:35         ` Stephen Smalley
2002-07-05 12:30     ` Stephen Smalley
2002-07-05 12:11 ` Stephen Smalley
2002-05-31 21:32 Howard Holm
2002-06-01 10:21 ` Russell Coker
2002-06-03 12:53   ` Stephen Smalley
2002-06-03 22:44     ` Russell Coker
2002-06-03 15:08 ` Stephen Smalley
2002-05-02 20:32 Howard Holm
2002-05-03  4:33 ` Grant Bayley
2002-05-03 14:06 ` Stephen Smalley
     [not found] <72222DC86846D411ABD300A0C9EB08A10152430C@csoc-mail-box.csoconline.com>
2002-03-15 17:03 ` Stephen Smalley
2002-03-14 20:12 Howard Holm
2002-03-15 14:38 ` Stephen Smalley
2002-01-18 22:56 Howard Holm
2002-01-19  0:18 ` Grant Bayley
2001-12-10 20:55 Updated release Howard Holm
2001-12-11  3:27 ` Grant Bayley
2001-11-20 14:10 Howard Holm
2001-11-21  1:30 ` Grant Bayley
2001-08-24 14:30 Howard Holm
2001-09-27 22:11 ` Howard Holm
2001-09-28  6:44   ` Grant Bayley
2001-09-30  6:47   ` Conan Callen
2001-10-01 13:52     ` Stephen Smalley
2001-04-17 21:23 Howard Holm
2001-03-16 16:07 Howard Holm
2001-03-16 23:29 ` Grant Bayley
2001-01-02 22:28 Pete Loscocco

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.