From: Russell Coker <russell@coker.com.au>
To: nagray@austin.rr.com
Cc: SE Linux <selinux@tycho.nsa.gov>
Subject: Re: Questions: (was Updated Release)
Date: Wed, 10 Dec 2003 22:44:46 +1100 [thread overview]
Message-ID: <200312102244.46741.russell@coker.com.au> (raw)
In-Reply-To: <1071023275.4060.685.camel@hawaii.efficax.net>
On Wed, 10 Dec 2003 13:27, Nick <nagray@austin.rr.com> wrote:
> I have finally caught up with the current version. I downloaded the
> ISOs from a mirror site. And created CDs. The first thing I noticed is
This is apparently a question about a Linux distribution, not about SE Linux.
As you don't mention which distribution it's not possible to answer the
question. In any case this isn't the best list.
> #2
> The next thing I noticed was that when I boot up the system tries to
> mount /selinux IAW the entry I put in the fstab (as per the README). But
> the system is giving me an error about it being mounted or in use.
In my Debian package I have /selinux mounted but not umounted, so for Debian
the thing to do is to use "noauto" in /etc/fstab. For Fedora the last
package of Dan's that I tested would umount /selinux so the /etc/fstab needed
to have "defaults". It sounds like you were using a Debian package (or
similar code) and had the /etc/fstab entry that would work for Fedora.
> When I log in initially as root I have the staff_r role and staff_t
> domain. I immediately get the context error of trying to access my home
> dir which is system_u:object_r:sysadm_home_dir_t.
I suggest putting sysadm_r:sysadm_t as the first entry in the local_login_t
line. I think that a console login to an administrative account should
default to the administrative role.
> It seems to me that this dir should be set to
> system_u:object_r:staff_home_dir_t. or system_u:object_r:root_home_dir_t
> so that this isn't a context failure. Another way to do this is set the
> root account to sysadm_r:sysadm_t initially.
I don't think that this is a good idea. I created staff_r based on user_r to
be a user role with extra privs. The idea being that staff_r could be for
professors and user_r for students, or managers and employees. So staff_t
can do all the same things as user_t but be protected from attack by user_t,
also staff_t can be given privs to kill user_t processes or have other
controll. But staff_r does not grant system administration privs.
If staff_t is given write access to /root, and if /root is the home directory
for the main administrative account then anyone who has staff_r can get
sysadm_r by creative replacement of .login type files (it's been done on play
machines).
In the example of an academic environment you don't expect a professor to try
to hack the university server (although it probably has happened), but you do
expect professors to choose bad passwords and to type them in while students
can watch. Having a professor's account get taken over by students has
happened at least once to my knowledge (the students told me, I told the
sys-admin, the sys-admin refused to believe and the students in question kept
the professor's account).
So in the case of a staff_r non-root account being taken over, if staff_t can
write to /root without restriction then all that's needed to get full access
is to transition to UID 0. SE Linux makes this much more difficult than a
regular Unix system, but it's still much easier to go from UID > 0 to
UID == 0 than to go from staff_r to sysadm_r.
Speaking of this, it would be useful to have a tool that could check for:
transitions from a domain to another domain with setuid capability or other
important privs.
--
http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/ Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/ My home page
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
prev parent reply other threads:[~2003-12-10 11:46 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2003-12-05 20:28 Updated Release Howard Holm
2003-12-10 2:27 ` Questions: (was Updated Release) Nick
2003-12-10 11:44 ` Russell Coker [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200312102244.46741.russell@coker.com.au \
--to=russell@coker.com.au \
--cc=nagray@austin.rr.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.