From: Dominick Grift <dominick.grift@gmail.com>
To: James Carter <jwcart2@tycho.nsa.gov>
Cc: SELinux List <selinux@tycho.nsa.gov>,
Steve Lawrence <slawrence@tresys.com>,
Richard Haines <richard_c_haines@btinternet.com>
Subject: Re: Update to CIL
Date: Sat, 19 Oct 2013 15:32:46 +0200 [thread overview]
Message-ID: <1382189566.3041.34.camel@d30> (raw)
In-Reply-To: <1382126564.3041.13.camel@d30>
On Fri, 2013-10-18 at 22:02 +0200, Dominick Grift wrote:
> On Fri, 2013-10-18 at 14:20 -0400, James Carter wrote:
> > I pushed an update of CIL to bitbucket.
>
> I had to do this, to make it compile ( not sure what i might have broken
> by doing this ):
>
> --- a/src/cil.c
> +++ b/src/cil.c
> @@ -1493,7 +1493,6 @@ void cil_userbounds_init(struct cil_userbounds
> **userbounds)
> *userbounds = cil_malloc(sizeof(**userbounds));
>
> (*userbounds)->user_str = NULL;
> - (*userbounds)->user = NULL;
> (*userbounds)->bounds_str = NULL;
> }
>
> Also a thing i noticed, which is unrelated to secilc, but related to
> cilpolicy is that object_r role is associated to identities.
>
> The object_r string is not really a role, although it looks like it.
>
> Its just a string that is used as a place holder for the role security
> attribute of objects.
>
> Anyhow, i am going to write a minimum policy with secilc tomorrow i
> think, so maybe then i will find new bugs, insights.
>
> Thanks for your work
>
Been playing with this today and so far so good except for a few things:
Not sure if its due to my incompetence or due to the line i removed
( see above) from cil.c, login programs (pam) is not able to get a valid
context for my users. I believe i set all the associations up properly
I noticed that no matter if you just want to create a default policy
model, you always have to take the option security models (MLS/MCS) into
account at least to some degree. For example you need to specify current
and clearance with filecon even if you wish to not use use MLS/MCS
Another thing i noticed which is loosely related is that if you build a
mcs policy, and install it, then run restorecon -R -v -F, it will reset
contexts using current and clearance (it has s0-s0 specified in
file_contexts) no matter how many times you run it. It will always reset
from s0 to s0-s0
As said above already, i now also encountered the object_r issue myself:
it sucks. One needs to allow object_r role access to all types...
object_r is not even a role (or atleast it should not be AFAIK)
Lastly i have to get used to the cil syntax, The documentation is a bit
inaccurate. For example it seems that typeattributetypes was renamed to
typeattributeset.
I was trying to associate 3 types to a single type attribute and i first
encountered typeattribute set, and the example showed how its supposed
to be used with "and or xor not", and so i tried that, but it turned out
you can only associate two types to a type attribute using any of those
keywords
Later on i stumbled upon typeattributetypes, and the examples looked
promissing. it mentioned that you can use it to associate more types to
the attribute with it. But when i tried it, it turned out it no longer
existed.
However, i tied the strings together and managed to associate 3 types to
a single type attribute using the typeattributetypes example with the
typeattributeset statement.
Also i was not able to write TE AV rules with two target types. e.g.
where we previously used brace expansion: allow bla_t { foo_t
bar_t }:file read;
I tried several things like: (allow (bla_t ( foo_t bar_t))
all_file_perms), but no go
It is just a matter of getting used to the new way of doing things, but
i feel that its very powerful, and i like it alot.
Also secilc seems nice and fast, especially if it also takes care of the
neverallow rules (doing that with semodule link/expand takes ages)
So, yea, the only pressing issue now for me is to get my users to log
in. I have created a nice minimal policy today with cil and other than
this issue it works great!
> Classes: 54 Permissions: 193
> Sensitivities: 1 Categories: 1024
> Types: 4 Attributes: 1
> Users: 1 Roles: 2
> Booleans: 0 Cond. Expr.: 0
> Allow: 54 Neverallow: 0
> Auditallow: 0 Dontaudit: 0
> Type_trans: 0 Type_change: 0
> Type_member: 0 Role allow: 0
> Role_trans: 0 Range_trans: 0
> Constraints: 0 Validatetrans: 0
> Initial SIDs: 27 Fs_use: 23
> Genfscon: 84 Portcon: 2
> Netifcon: 0 Nodecon: 0
> Permissives: 0 Polcap: 2
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2013-10-19 13:32 UTC|newest]
Thread overview: 27+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-10-18 18:20 Update to CIL James Carter
2013-10-18 20:02 ` Dominick Grift
2013-10-19 13:32 ` Dominick Grift [this message]
2013-10-19 18:03 ` Dominick Grift
2013-10-20 14:25 ` Dominick Grift
2013-10-21 13:25 ` Steve Lawrence
2013-10-21 18:56 ` James Carter
2013-10-21 12:35 ` Steve Lawrence
2013-10-19 16:23 ` Richard Haines
2013-10-21 13:36 ` Steve Lawrence
2013-10-21 14:22 ` Richard Haines
2013-10-21 14:46 ` Steve Lawrence
2013-10-21 15:49 ` Request for a new CIL statement Richard Haines
2013-10-21 19:14 ` Update to CIL James Carter
2013-10-23 13:59 ` Dominick Grift
2013-10-23 14:29 ` James Carter
2013-10-23 15:15 ` Dominick Grift
2013-10-23 15:58 ` James Carter
2013-10-23 17:00 ` James Carter
2013-10-23 17:27 ` Dominick Grift
2013-10-24 20:16 ` Dominick Grift
2013-10-25 17:53 ` Dominick Grift
2013-10-25 18:40 ` James Carter
2013-10-25 18:55 ` Dominick Grift
2013-10-25 18:40 ` Dominick Grift
2013-10-26 11:58 ` Dominick Grift
2013-10-31 9:45 ` Dominick Grift
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1382189566.3041.34.camel@d30 \
--to=dominick.grift@gmail.com \
--cc=jwcart2@tycho.nsa.gov \
--cc=richard_c_haines@btinternet.com \
--cc=selinux@tycho.nsa.gov \
--cc=slawrence@tresys.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.