From: Karl MacMillan <kmacmillan@mentalrootkit.com>
To: Stephen Smalley <sds@tycho.nsa.gov>
Cc: Daniel J Walsh <dwalsh@redhat.com>,
Eric Paris <eparis@redhat.com>,
selinux@tycho.nsa.gov
Subject: Re: concept of a permissive domain
Date: Thu, 13 Sep 2007 11:25:24 -0400 [thread overview]
Message-ID: <1189697124.3737.12.camel@localhost.localdomain> (raw)
In-Reply-To: <1189695443.18713.95.camel@moss-spartans.epoch.ncsc.mil>
On Thu, 2007-09-13 at 10:57 -0400, Stephen Smalley wrote:
> On Thu, 2007-09-13 at 10:46 -0400, Karl MacMillan wrote:
> > On Thu, 2007-09-13 at 10:08 -0400, Stephen Smalley wrote:
> > > On Tue, 2007-09-11 at 17:26 -0400, Karl MacMillan wrote:
> > > > On Tue, 2007-09-11 at 16:31 -0400, Daniel J Walsh wrote:
> > > > [...]
> > > > > One other feature/requirement would be to not override dontaudit rules.
> > > > > So if I have a domain in permissive mode and I have a dontaudit rule on
> > > > > reading /etc/shadow. The app should still be denied reading
> > > > > /etc/shadow. (This is not a show stopper, but would allow us to force
> > > > > apps to take the code paths they will take in enforcing mode.)
> > > >
> > > > This isn't specific to per-domain permissive, right? It would be useful
> > > > in general for permissive.
> > >
> > > I would be opposed to such a change, as it is a semantic change to what
> > > dontaudit means.
> > >
> > > Keep in mind that allow, auditallow, and dontaudit/auditdeny are all
> > > independent of one another today and none of them imply the other, e.g.
> > > allow a b:file read;
> > > auditallow a b:file *;
> > > dontaudit a b:file *;
> > > is perfectly valid and means:
> > > - Let a read files labeled b,
> > > - Audit all permission grantings from a to files labeled b,
> > > - Don't audit any permission denials from a to files labeled b.
> > >
> >
> > I agree that changing the dontaudit semantic has problems - however the
> > reason Dan suggested is still valid. Currently, generating policy in
> > permissive mode can lead to bogus or overly permissive policy. It would
> > be nice to have some solution to that problem.
>
> Can't you handle that in the tool, by giving matching interfaces with
> dontaudit rules precedence over ones with allow rules and asking the
> user?
>
Somewhat - that's been something I've been wanting to implement for a
while. The real problem, though, is applications that follow different
code paths depending on whether an operation was allowed.
> I'd actually rather see an improved capability for (more easily)
> generating policy incrementally in enforcing mode. That would make it
> more suitable for production use and avoid the problem above.
>
The large sepolgen patch I'm working on now will allow you to
incrementally update policy, including intelligent updates of interface
calls. So if you have an application with a good test suite this might
be possible.
Karl
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2007-09-13 15:25 UTC|newest]
Thread overview: 71+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-09-11 19:13 concept of a permissive domain Eric Paris
2007-09-11 20:31 ` Daniel J Walsh
2007-09-11 21:26 ` Karl MacMillan
2007-09-11 21:47 ` Eric Paris
2007-09-12 13:27 ` Karl MacMillan
2007-09-12 13:57 ` Daniel J Walsh
2007-09-13 14:08 ` Stephen Smalley
2007-09-13 14:46 ` Karl MacMillan
2007-09-13 14:57 ` Stephen Smalley
2007-09-13 15:25 ` Karl MacMillan [this message]
2007-09-13 19:25 ` Daniel J Walsh
2007-09-13 19:38 ` Stephen Smalley
2007-09-13 20:16 ` Eric Paris
2007-09-18 20:24 ` Stephen Smalley
2007-09-18 20:50 ` Joshua Brindle
2007-09-18 21:54 ` Chad Sellers
2007-09-19 12:56 ` Daniel J Walsh
2007-09-19 14:22 ` Chad Sellers
2007-10-12 13:50 ` Daniel J Walsh
2007-10-12 17:49 ` Joshua Brindle
2007-10-12 18:07 ` Eric Paris
2007-10-12 19:03 ` Karl MacMillan
2007-10-12 19:09 ` Stephen Smalley
2007-10-12 18:40 ` Chad Sellers
2007-10-12 19:05 ` Karl MacMillan
2007-10-12 20:43 ` Chad Sellers
2007-10-12 21:01 ` Stephen Smalley
2007-10-12 21:21 ` Karl MacMillan
2007-10-12 23:38 ` Chad Sellers
2007-10-13 13:38 ` Daniel J Walsh
2007-10-14 10:14 ` Stefan Schulze Frielinghaus
2007-10-15 12:40 ` Daniel J Walsh
2007-10-15 16:52 ` Brett Lentz
2007-10-15 16:58 ` Stephen Smalley
2007-10-15 18:32 ` Daniel J Walsh
2007-10-15 18:40 ` Stephen Smalley
2007-10-15 18:57 ` Karl MacMillan
2007-10-15 19:09 ` Eric Paris
2007-10-17 19:47 ` Stephen Smalley
2007-10-17 21:50 ` Recurring SELinux events for similar violations Hasan Rezaul-CHR010
2007-10-17 22:18 ` Eric Paris
2007-10-17 22:22 ` Hasan Rezaul-CHR010
2007-10-18 13:13 ` Stephen Smalley
2007-10-18 14:32 ` Hasan Rezaul-CHR010
2007-11-29 20:06 ` Hasan Rezaul-CHR010
2007-11-29 20:16 ` Stephen Smalley
2007-11-29 21:26 ` Hasan Rezaul-CHR010
2007-11-29 21:32 ` Stephen Smalley
2007-11-29 21:45 ` Stephen Smalley
2007-10-15 17:26 ` concept of a permissive domain Chad Sellers
2007-10-12 19:07 ` Stephen Smalley
2007-10-12 19:30 ` Stephen Smalley
2007-09-19 16:35 ` Martin Orr
2007-09-19 16:41 ` Eric Paris
2007-09-20 14:41 ` Joshua Brindle
2007-09-20 14:46 ` Joshua Brindle
2007-09-19 16:52 ` Stephen Smalley
2007-09-24 14:59 ` Karl MacMillan
2007-09-13 20:25 ` Karl MacMillan
2007-09-14 14:15 ` James Carter
2007-09-14 14:45 ` Joshua Brindle
2007-09-14 15:15 ` Karl MacMillan
2007-09-11 22:57 ` Joshua Brindle
2007-09-12 13:26 ` Karl MacMillan
2007-09-13 13:11 ` Stephen Smalley
2007-09-13 13:19 ` Karl MacMillan
2007-09-13 13:25 ` Stephen Smalley
2007-09-13 13:59 ` Eric Paris
2007-09-13 14:23 ` Stephen Smalley
2007-09-13 14:36 ` Stephen Smalley
2007-09-13 14:42 ` Karl MacMillan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1189697124.3737.12.camel@localhost.localdomain \
--to=kmacmillan@mentalrootkit.com \
--cc=dwalsh@redhat.com \
--cc=eparis@redhat.com \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.