From: Dominick Grift <domg472@gmail.com>
To: Hasan Rezaul-CHR010 <CHR010@motorola.com>
Cc: selinux@tycho.nsa.gov
Subject: Re: Where do I get a good Policy Base ?...
Date: Tue, 27 Oct 2009 09:49:34 +0100 [thread overview]
Message-ID: <1256633374.3090.13.camel@localhost> (raw)
In-Reply-To: <D06FE0A2807BC145B0D38744789D4F5D077A087F@de01exm68.ds.mot.com>
On Mon, 2009-10-26 at 21:16 -0400, Hasan Rezaul-CHR010 wrote:
> Hi All,
>
> I used to have the following SELinux related package versions on my
> Linux (2.6.18) system:
>
> Checkpolicy - 1.33.1
> Libselinux - 2.0.13
> Libsemanage - 2.0.1
> Libsepol - 2.0.3
> Libsetrans - 0.1.18
> Policycoreutils - 2.0.16
>
> And I used a 'strict' Base policy from Fedora Core 6. Made the
> modifications I needed on top of that, and I was very happy...
>
>
> We get our OS packaged/delivered from a third party company, and we're
> upgrading to Linux 2.6.27, and as part of this upgrade, we are also
> migrating to much newer versions of the SELinux packages. They are:
>
> checkpolicy-2.0.19
> libselinux-2.0.85
> libsemanage-2.0.33
> libsepol-2.0.37
> policycoreutils-2.0.69
> sepolgen-1.0.17
>
>
> My questions are:
>
> 1. I believe the "strict" policy is no longer supported in the above
> versions of SELinux packages? Is this true ?
the "strict" policy model is no longer supported. The strict and target
policy have merged to a policy model that is called "targeted". You can
configure the "targeted" policy to behave like old strict policy by
removing removing the unconfined modules and by mapping your Linux
logins to strict SELinux users.
>
> 2. The entire set of policies that I have fine-tuned over the years
> under my /etc/selinux/strict/modules/active/modules/*.pp directory in
> my previous older system, can I make any use of that ?? In other words,
> can that stuff be re-used at all ? Or do I need to develop policy from
> scratch again ?
I am not sure about this but my opinion is that it should in most cases
be possible to use older binary modules in newer policy. Reference
policy should be compatible in my view.
Please note though that is encouraged to keep the source policy for your
binary modules so that you can edit policy modules easily later.
>
> 3. What will be a good base policy for me to start policy development on
> ? Will it be refpolicy, or should I grab the base 'targeted' policy from
> fedora core 11 for example ?
This depends on your distro, but generally you should be better of with
a distro specific policy. Also keep in mind that Fedora has a active
community, frequent updates and many testers.
>
> 4. Assuming 'strict' is no longer supported in the NEW package versions
> above, and I use a base 'targeted' policy as my starting point... Should
> I be able to simply remove the "unconfined.pp" policy module from the
> base targeted policy, and that essentially turns my system into
> "strict-like" mode ? Is that advisable ?
That is the idea, yes,
>
> 5. If I do continue to use the 'targeted' base policy as is, how can I
> develop policy on top of that, to make sure I still block specific
> things that I don't want to take place. For example, I DON'T want a
> user_t to be able to write to files of type etc_t for example. How do
> I go about accomplishing this given the 'targeted' framework ? I know
> how to do this in the old 'strict' framework, not sure how to go about
> it with the targeted framework. Please shed some light or point me to
> documents...
You can write your own custom policy modules on that of the policy that
is distributed. Current policy is usually modular. Basically write a
source policy module, build it and install it using the semanage or the
semodule command.
e.g. (Fedora/RedHat):
echo "policy_module(mytest, 0.0.1)" > mytest.te;
make -f /usr/share/selinux/devel/Makefile mytest.pp;
sudo semodule -i mytest.pp
sudo semodule -l | grep mytest
>
> Again, Any references or documentation links would be greatly
> appreciated.
www.selinuxproject.org/page/User_Resources
>
> Thanks in advance.
>
>
> --
> This message was distributed to subscribers of the selinux mailing list.
> If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
> the words "unsubscribe selinux" without quotes as the message.
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2009-10-27 8:49 UTC|newest]
Thread overview: 34+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-10-17 0:15 sshd error: Failed to get default security context Larry Ross
2009-10-17 11:39 ` Daniel J Walsh
2009-10-17 18:17 ` Larry Ross
2009-10-19 13:53 ` Stephen Smalley
2009-10-19 16:49 ` Larry Ross
2009-10-19 17:13 ` Stephen Smalley
2009-10-20 1:43 ` Larry Ross
2009-10-20 11:18 ` Stephen Smalley
2009-10-27 1:16 ` Where do I get a good Policy Base ? Hasan Rezaul-CHR010
2009-10-27 8:49 ` Dominick Grift [this message]
2009-10-27 12:45 ` Christopher J. PeBenito
2009-11-10 0:01 ` Hasan Rezaul-CHR010
2009-12-10 2:18 ` How to use sepolgen VS. policygentool Hasan Rezaul-CHR010
2009-12-10 2:50 ` Hasan Rezaul-CHR010
2009-12-10 16:02 ` Stephen Smalley
2009-12-10 17:11 ` Guido Trentalancia
2009-12-10 19:11 ` Daniel J Walsh
2009-12-10 15:54 ` Stephen Smalley
2009-12-10 19:38 ` Daniel J Walsh
2009-12-15 17:43 ` Policy writing philosophy Hasan Rezaul-CHR010
2009-12-15 20:14 ` Dominick Grift
2009-12-15 20:40 ` Bandan Das
2009-12-16 14:58 ` Stephen Smalley
2009-12-16 15:30 ` Hasan Rezaul-CHR010
2009-12-16 15:47 ` Stephen Smalley
2009-12-16 15:48 ` Hasan Rezaul-CHR010
2009-12-10 19:04 ` How to use sepolgen VS. policygentool Daniel J Walsh
2009-11-11 19:37 ` Where do I get a good Policy Base ? Hasan Rezaul-CHR010
2009-11-11 22:02 ` Daniel J Walsh
2009-11-11 23:25 ` Hasan Rezaul-CHR010
2009-11-12 13:06 ` Daniel J Walsh
2009-10-18 10:33 ` sshd error: Failed to get default security context Dominick Grift
2009-10-18 18:58 ` Larry Ross
2009-10-19 14:02 ` Daniel J Walsh
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1256633374.3090.13.camel@localhost \
--to=domg472@gmail.com \
--cc=CHR010@motorola.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.