All of lore.kernel.org
 help / color / mirror / Atom feed
* Re: SELinux To Do list
@ 2002-12-30 20:44 Stephen D. Smalley
  2002-12-31  2:44 ` Paul Greene
                   ` (2 more replies)
  0 siblings, 3 replies; 10+ messages in thread
From: Stephen D. Smalley @ 2002-12-30 20:44 UTC (permalink / raw)
  To: selinux, KAMUELA.D.GUERRA


> According to http://www.nsa.gov/selinux/todo.html there is still work to be
> done on the documentation tasks.
> 
> What still needs to be done and how can I help?

I don't think anyone has written any of the three documents listed on the 
todo.html page.  Prior to starting to work on any such documentation, you should 
review the existing papers and technical reports available from the NSA site 
(http://www.nsa.gov/selinux/docs.html).  Tresys Technology has also written a 
few policy whitepapers, available from their site 
(http://www.tresys.com/selinux), but be aware that some things have changed 
since those whitepapers were written.

We would welcome contributions of HOWTO-style documents.  In creating such
documents, please don't start from scratch; you should be able to leverage
some of the content of the existing papers and reports.  The published
papers and older technical reports were originally written in LaTeX, and
the newer technical reports were written in DocBook.

--
Stephen Smalley, NSA
sds@epoch.ncsc.mil


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 10+ messages in thread
* Re: SELinux To Do list
@ 2003-01-02 13:36 Stephen D. Smalley
  0 siblings, 0 replies; 10+ messages in thread
From: Stephen D. Smalley @ 2003-01-02 13:36 UTC (permalink / raw)
  To: kerry, selinux, russell


> Note that denying avc_toggle does not stop you from entering enforcing mode if 
> you boot in permissive mode (for obvious reasons ;).
> 
> Actually now that I consider this, it doesn't seem to make much sense to 
> compile a kernel that doesn't support switching between enforcing and 
> permissive modes.  It would make more sense to compile a kernel to default to 
> enforcing (without needing a parameter).  Steve, what do you think?

We could provide the latter (a config option to default to enforcing while 
retaining development support), without removing the former (a config option to 
completely disable development support).  I think that some users will still 
want the former, preferring to keep an entirely separate kernel from their 
production kernel that can be booted for development/maintenance operations.

--
Stephen Smalley, NSA
sds@epoch.ncsc.mil


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 10+ messages in thread
* Re: SELinux To Do list
@ 2003-01-02 13:30 Stephen D. Smalley
  0 siblings, 0 replies; 10+ messages in thread
From: Stephen D. Smalley @ 2003-01-02 13:30 UTC (permalink / raw)
  To: selinux, kerry


> I've made a start on a technical-level FAQ, currently at 
> 
> http://www.crypt.gen.nz/selinux/faq.html
> 
> and I'm working on back-tracking through the list archives for more material. 
> Any comments or corrections are most welcome.

Thanks for creating this FAQ.  I've made a few comments below.

1) Some of your questions and answers are also covered in the Configuring the 
SELinux Policy report, http://www.nsa.gov/selinux/policy2-abs.html, in 
particular the Building and Applying the Policy section and the Customizing the 
Policy section of that report.  Feel free to use it as a resource and to refer 
people to it as well.  Please report any errors in it and feel free to submit 
patches to it (the document source is included in the selinux archive, under 
selinux/doc/policy).  

2) You can relabel a specified list of files via the -s option to setfiles 
rather than rechecking the entire filesystem.  This option was added by Russell 
Coker.

3) If you want to deny avc_toggle permission, you need to change 'allow' rules 
in the configuration, not 'auditallow' rules.  'auditallow' rules specify what 
permissions should be audited when they are allowed (granted) to a process.  By 
default, permissions are only audited when they are denied to a process (unless 
they are suppressed via 'dontaudit' rules).  You can enable auditing of allowed 
permissions via auditallow in order to maintain a record of all uses of a given 
permission, e.g. to provide accountability for a highly privileged operation.  
Removing the 'auditallow' rules merely turns off auditing when the permission is 
granted; it has no effect on allowing the permission.

To remove avc_toggle permission in the example policy, you would need to edit 
macros/admin_macros.te and replace the 'allow $1_t kernel_t:system *;' with 
'allow $1_t kernel_t:system ~avc_toggle;'.  You would also need to edit 
domains/program/initrc.te and replace the 'allow initrc_t kernel_t:system *;' 
rule with 'allow initrc_t kernel_t:system ~avc_toggle;'.  To ensure that you 
have removed all such instances, you can edit assert.te and replace 'neverallow 
~{ admin initrc_t } kernel_t:system avc_toggle;' with 'neverallow domain 
kernel_t:system avc_toggle;'.  The policy compiler (checkpolicy) will then 
verify that no domain is granted this permission and report any violations of 
this assertion when it compiles the policy.

To remove the ability to reload the policy on a running system, you would remove 
load_policy permission from all domains, and completely remove the load_policy 
domain.   As above, you can define an assertion so that checkpolicy will catch 
any exceptions to this, e.g. 'neverallow domain security_t:security 
load_policy;'.

--
Stephen Smalley, NSA
sds@epoch.ncsc.mil


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 10+ messages in thread
[parent not found: <200212302226.04411.russell@coker.com.au>]
* SELinux To Do list
@ 2002-12-30 18:38 Guerra, Kamuela D.
  0 siblings, 0 replies; 10+ messages in thread
From: Guerra, Kamuela D. @ 2002-12-30 18:38 UTC (permalink / raw)
  To: selinux

According to http://www.nsa.gov/selinux/todo.html there is still work to be
done on the documentation tasks.

What still needs to be done and how can I help?

---Kam Guerra

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2003-01-15 22:11 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-12-30 20:44 SELinux To Do list Stephen D. Smalley
2002-12-31  2:44 ` Paul Greene
2002-12-31 19:43 ` Kerry Thompson
2002-12-31 21:54   ` Russell Coker
2003-01-15 21:37 ` Faye
2003-01-15 22:06   ` Tom
  -- strict thread matches above, loose matches on Subject: below --
2003-01-02 13:36 Stephen D. Smalley
2003-01-02 13:30 Stephen D. Smalley
     [not found] <200212302226.04411.russell@coker.com.au>
2002-12-30 21:37 ` Faye
2002-12-30 18:38 Guerra, Kamuela D.

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.