All of lore.kernel.org
 help / color / mirror / Atom feed
From: Stefan Schulze Frielinghaus <stefan@seekline.net>
To: Daniel J Walsh <dwalsh@redhat.com>
Cc: Chad Sellers <csellers@tresys.com>,
	Karl MacMillan <kmacmillan@mentalrootkit.com>,
	Stephen Smalley <sds@tycho.nsa.gov>,
	Eric Paris <eparis@redhat.com>,
	selinux@tycho.nsa.gov
Subject: Re: concept of a permissive domain
Date: Sun, 14 Oct 2007 11:14:38 +0100	[thread overview]
Message-ID: <1192356878.3376.3.camel@vogon> (raw)
In-Reply-To: <4710CA44.1040300@redhat.com>

On Sat, 2007-10-13 at 09:38 -0400, Daniel J Walsh wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Chad Sellers wrote:
> > On 10/12/07 5:21 PM, "Karl MacMillan" <kmacmillan@mentalrootkit.com> wrote:
> > 
> >> On Fri, 2007-10-12 at 16:43 -0400, Chad Sellers wrote:
> >>> On 10/12/07 3:05 PM, "Karl MacMillan" <kmacmillan@mentalrootkit.com> wrote:
> >>>
> >>>> On Fri, 2007-10-12 at 14:40 -0400, Chad Sellers wrote:
> >> [...[
> >>
> >>>> Calling it a permissive domain uses the same concept as global
> >>>> permissive - so I think that is natural. It does not, to me, mean that
> >>>> it should be enabled in the same way as global permissive - that's just
> >>>> an implementation detail. I think it is much better to put it in the
> >>>> policy as that allows some sort of sane delivery mechanism.
> >>>>
> >>> Calling it one thing and implementing it differently is fine as long as the
> >>> implementation doesn't leak out to the user. And it will here. We're not
> >>> exactly good at making leak-proof abstractions to begin with, but this is a
> >>> case where the user will see a new statement in policy.
> >>>
> >>> Think of this from the perspective of the user. We have to tell them that
> >>> system-wide permissive is not part of policy, but is instead in a config
> >>> file, done using setenforce, or done using selinuxfs, but per-domain
> >>> permissive is not done by any of those methods, but instead is done in
> >>> policy via a new language construct. This is confusing.
> >>>
> >>> Chad
> >> See, now you are going to make me argue for putting permissive in the
> >> policy, which I think that it should be. The fact that we have
> >> permissive in a separate config file, have to write a little parser in
> >> libselinux, patch apps to set permissive on boot is just dumb.
> >>
> > I figured that might be your response. I actually don't mind that solution
> > at all. I'm just trying to minimize the number of different concepts in
> > SELinux.
> > 
> >> That doesn't mean when shouldn't allow small changes to the in-kernel
> >> policy - like switching permissive on or off - but I still think it
> >> makes no sense to have one big configuration file with lots of tiny
> >> supporting config files. Just put it all in one place and be done with
> >> it.
> >>
> > Note that we already have a mechanism for turning pieces of policy on/off
> > in-kernel (booleans). So, if permissive were policy based, we could
> > potentially simplify things by having the kernel "switch" be just another
> > boolean instead of a separate mechanism.
> > 
> > Chad
> > 
> >> Karl
> >>
> > 
> - From the user point of view we could change the setenforce command
> 
> setenforce 0
> setenforce httpd_t 0
> 
> getenforce 0
> getenforce httpd_t 0
> 
> Then we could replace both to do something in semanage to rebuild and
> reload policy.

But that would mean e.g. consider apache that you would have to
setenforce for every domain type?

apache_t
apache_helper_t
apache_php_t
httpd_rotatelogs_t
httpd_suexec_t
...

There wouldn't be a setenforce for a whole module, right?

	Stefan


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2007-10-14 10:14 UTC|newest]

Thread overview: 71+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-09-11 19:13 concept of a permissive domain Eric Paris
2007-09-11 20:31 ` Daniel J Walsh
2007-09-11 21:26   ` Karl MacMillan
2007-09-11 21:47     ` Eric Paris
2007-09-12 13:27       ` Karl MacMillan
2007-09-12 13:57         ` Daniel J Walsh
2007-09-13 14:08     ` Stephen Smalley
2007-09-13 14:46       ` Karl MacMillan
2007-09-13 14:57         ` Stephen Smalley
2007-09-13 15:25           ` Karl MacMillan
2007-09-13 19:25           ` Daniel J Walsh
2007-09-13 19:38             ` Stephen Smalley
2007-09-13 20:16               ` Eric Paris
2007-09-18 20:24                 ` Stephen Smalley
2007-09-18 20:50                   ` Joshua Brindle
2007-09-18 21:54                   ` Chad Sellers
2007-09-19 12:56                     ` Daniel J Walsh
2007-09-19 14:22                       ` Chad Sellers
2007-10-12 13:50                       ` Daniel J Walsh
2007-10-12 17:49                         ` Joshua Brindle
2007-10-12 18:07                           ` Eric Paris
2007-10-12 19:03                             ` Karl MacMillan
2007-10-12 19:09                               ` Stephen Smalley
2007-10-12 18:40                         ` Chad Sellers
2007-10-12 19:05                           ` Karl MacMillan
2007-10-12 20:43                             ` Chad Sellers
2007-10-12 21:01                               ` Stephen Smalley
2007-10-12 21:21                               ` Karl MacMillan
2007-10-12 23:38                                 ` Chad Sellers
2007-10-13 13:38                                   ` Daniel J Walsh
2007-10-14 10:14                                     ` Stefan Schulze Frielinghaus [this message]
2007-10-15 12:40                                       ` Daniel J Walsh
2007-10-15 16:52                                         ` Brett Lentz
2007-10-15 16:58                                           ` Stephen Smalley
2007-10-15 18:32                                             ` Daniel J Walsh
2007-10-15 18:40                                               ` Stephen Smalley
2007-10-15 18:57                                                 ` Karl MacMillan
2007-10-15 19:09                                                 ` Eric Paris
2007-10-17 19:47                                                   ` Stephen Smalley
2007-10-17 21:50                                                     ` Recurring SELinux events for similar violations Hasan Rezaul-CHR010
2007-10-17 22:18                                                       ` Eric Paris
2007-10-17 22:22                                                         ` Hasan Rezaul-CHR010
2007-10-18 13:13                                                           ` Stephen Smalley
2007-10-18 14:32                                                             ` Hasan Rezaul-CHR010
2007-11-29 20:06                                                             ` Hasan Rezaul-CHR010
2007-11-29 20:16                                                               ` Stephen Smalley
2007-11-29 21:26                                                                 ` Hasan Rezaul-CHR010
2007-11-29 21:32                                                                   ` Stephen Smalley
2007-11-29 21:45                                                                     ` Stephen Smalley
2007-10-15 17:26                                           ` concept of a permissive domain Chad Sellers
2007-10-12 19:07                           ` Stephen Smalley
2007-10-12 19:30                             ` Stephen Smalley
2007-09-19 16:35                     ` Martin Orr
2007-09-19 16:41                       ` Eric Paris
2007-09-20 14:41                         ` Joshua Brindle
2007-09-20 14:46                           ` Joshua Brindle
2007-09-19 16:52                       ` Stephen Smalley
2007-09-24 14:59                   ` Karl MacMillan
2007-09-13 20:25               ` Karl MacMillan
2007-09-14 14:15               ` James Carter
2007-09-14 14:45                 ` Joshua Brindle
2007-09-14 15:15                   ` Karl MacMillan
2007-09-11 22:57 ` Joshua Brindle
2007-09-12 13:26   ` Karl MacMillan
2007-09-13 13:11 ` Stephen Smalley
2007-09-13 13:19   ` Karl MacMillan
2007-09-13 13:25     ` Stephen Smalley
2007-09-13 13:59       ` Eric Paris
2007-09-13 14:23         ` Stephen Smalley
2007-09-13 14:36           ` Stephen Smalley
2007-09-13 14:42           ` Karl MacMillan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1192356878.3376.3.camel@vogon \
    --to=stefan@seekline.net \
    --cc=csellers@tresys.com \
    --cc=dwalsh@redhat.com \
    --cc=eparis@redhat.com \
    --cc=kmacmillan@mentalrootkit.com \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.