From: Karl MacMillan <kmacmillan@mentalrootkit.com>
To: Joshua Brindle <method@manicmethod.com>
Cc: jwcart2@epoch.ncsc.mil, Stephen Smalley <sds@tycho.nsa.gov>,
Daniel J Walsh <dwalsh@redhat.com>,
Eric Paris <eparis@redhat.com>,
selinux@tycho.nsa.gov
Subject: Re: concept of a permissive domain
Date: Fri, 14 Sep 2007 11:15:37 -0400 [thread overview]
Message-ID: <1189782937.11407.3.camel@kmacmill-desktop> (raw)
In-Reply-To: <46EA9E7F.8080405@manicmethod.com>
On Fri, 2007-09-14 at 10:45 -0400, Joshua Brindle wrote:
> James Carter wrote:
> > On Thu, 2007-09-13 at 15:38 -0400, Stephen Smalley wrote:
[...]
> >
> > If this was called a debug domain instead of a permissive domain, would
> > it be acceptable to change the behavior of dontaudit and other things as
> > needed to assist in debugging?
> >
> > If there were debug domains, however, it is not hard to imagine that
> > soon people would be declaring how much easier it is to just run an
> > application as a debug domain and add dontaudit rules to deny what the
> > application isn't suppose to do.
> >
> > The problem that does need to be addressed is how to prevent certain
> > code paths from being followed in permissive/debug mode. Maybe deny
> > rules are the best answer.
> >
>
> Since we moved to a avtab datum that is only 1 vector and are now
> packing different avtab entry types into the key we could easily make a
> new kind of entry, I suggest we call it "reallydontaudit"
>
> Seriously though, FWIW I like Steves idea of setting permissive on a
> domain via selinuxfs (in fact I had a similar idea on my own before he
> posted it here). It wouldn't be appropriate to put permissive in the
> policy and load it so why would it be to do so at a higher granularity?
Why wouldn't it be appropriate to put permissive in the policy?
> Also this would let you easily put something into permissive
> temporarilly without reloading the policy over and over. Nothing
> prevents us from adding functionality to semanage and putting an init
> script in place for boot time permissive (though doing so does have some
> atomicity issues, just like compat_net and friends :\)
>
Why cause all of these problems and require building all of this extra
functionality when you can just put this in the policy? I really don't
get why we want to put some data in the policy and communicate some
through other means.
Even booleans at this point - there is almost no reason to set those via
selinuxfs. I'd rather just focus on making loading policy more efficient
and communicate all of that state that way.
Karl
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2007-09-14 15:15 UTC|newest]
Thread overview: 71+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-09-11 19:13 concept of a permissive domain Eric Paris
2007-09-11 20:31 ` Daniel J Walsh
2007-09-11 21:26 ` Karl MacMillan
2007-09-11 21:47 ` Eric Paris
2007-09-12 13:27 ` Karl MacMillan
2007-09-12 13:57 ` Daniel J Walsh
2007-09-13 14:08 ` Stephen Smalley
2007-09-13 14:46 ` Karl MacMillan
2007-09-13 14:57 ` Stephen Smalley
2007-09-13 15:25 ` Karl MacMillan
2007-09-13 19:25 ` Daniel J Walsh
2007-09-13 19:38 ` Stephen Smalley
2007-09-13 20:16 ` Eric Paris
2007-09-18 20:24 ` Stephen Smalley
2007-09-18 20:50 ` Joshua Brindle
2007-09-18 21:54 ` Chad Sellers
2007-09-19 12:56 ` Daniel J Walsh
2007-09-19 14:22 ` Chad Sellers
2007-10-12 13:50 ` Daniel J Walsh
2007-10-12 17:49 ` Joshua Brindle
2007-10-12 18:07 ` Eric Paris
2007-10-12 19:03 ` Karl MacMillan
2007-10-12 19:09 ` Stephen Smalley
2007-10-12 18:40 ` Chad Sellers
2007-10-12 19:05 ` Karl MacMillan
2007-10-12 20:43 ` Chad Sellers
2007-10-12 21:01 ` Stephen Smalley
2007-10-12 21:21 ` Karl MacMillan
2007-10-12 23:38 ` Chad Sellers
2007-10-13 13:38 ` Daniel J Walsh
2007-10-14 10:14 ` Stefan Schulze Frielinghaus
2007-10-15 12:40 ` Daniel J Walsh
2007-10-15 16:52 ` Brett Lentz
2007-10-15 16:58 ` Stephen Smalley
2007-10-15 18:32 ` Daniel J Walsh
2007-10-15 18:40 ` Stephen Smalley
2007-10-15 18:57 ` Karl MacMillan
2007-10-15 19:09 ` Eric Paris
2007-10-17 19:47 ` Stephen Smalley
2007-10-17 21:50 ` Recurring SELinux events for similar violations Hasan Rezaul-CHR010
2007-10-17 22:18 ` Eric Paris
2007-10-17 22:22 ` Hasan Rezaul-CHR010
2007-10-18 13:13 ` Stephen Smalley
2007-10-18 14:32 ` Hasan Rezaul-CHR010
2007-11-29 20:06 ` Hasan Rezaul-CHR010
2007-11-29 20:16 ` Stephen Smalley
2007-11-29 21:26 ` Hasan Rezaul-CHR010
2007-11-29 21:32 ` Stephen Smalley
2007-11-29 21:45 ` Stephen Smalley
2007-10-15 17:26 ` concept of a permissive domain Chad Sellers
2007-10-12 19:07 ` Stephen Smalley
2007-10-12 19:30 ` Stephen Smalley
2007-09-19 16:35 ` Martin Orr
2007-09-19 16:41 ` Eric Paris
2007-09-20 14:41 ` Joshua Brindle
2007-09-20 14:46 ` Joshua Brindle
2007-09-19 16:52 ` Stephen Smalley
2007-09-24 14:59 ` Karl MacMillan
2007-09-13 20:25 ` Karl MacMillan
2007-09-14 14:15 ` James Carter
2007-09-14 14:45 ` Joshua Brindle
2007-09-14 15:15 ` Karl MacMillan [this message]
2007-09-11 22:57 ` Joshua Brindle
2007-09-12 13:26 ` Karl MacMillan
2007-09-13 13:11 ` Stephen Smalley
2007-09-13 13:19 ` Karl MacMillan
2007-09-13 13:25 ` Stephen Smalley
2007-09-13 13:59 ` Eric Paris
2007-09-13 14:23 ` Stephen Smalley
2007-09-13 14:36 ` Stephen Smalley
2007-09-13 14:42 ` Karl MacMillan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1189782937.11407.3.camel@kmacmill-desktop \
--to=kmacmillan@mentalrootkit.com \
--cc=dwalsh@redhat.com \
--cc=eparis@redhat.com \
--cc=jwcart2@epoch.ncsc.mil \
--cc=method@manicmethod.com \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.