* Updated Release
@ 2003-12-05 20:28 Howard Holm
2003-12-10 2:27 ` Questions: (was Updated Release) Nick
0 siblings, 1 reply; 3+ messages in thread
From: Howard Holm @ 2003-12-05 20:28 UTC (permalink / raw)
To: selinux
The SELinux web site <http://www.nsa.gov/selinux/> including the mail
list archive has been updated. The site includes a new release of the
LSM-based SELinux prototype. The base kernel versions have been updated
to 2.4.23 and 2.6.0-test11. In 2.6.0-test11 controls have been added for
inheritance of signal-related state and resource limits and the network
interface and node controls have been reimplemented. SysVinit has been
patched to eliminate the need for a modified initrd. Login now uses a
pam_selinux module. Many other updates have been made to the tools,
utilities and userland patches.
--
Howard Holm <hdholm@epoch.ncsc.mil>
Office of Defensive Computing Research
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 3+ messages in thread
* Questions: (was Updated Release)
2003-12-05 20:28 Updated Release Howard Holm
@ 2003-12-10 2:27 ` Nick
2003-12-10 11:44 ` Russell Coker
0 siblings, 1 reply; 3+ messages in thread
From: Nick @ 2003-12-10 2:27 UTC (permalink / raw)
To: Howard Holm; +Cc: SE Linux
Experts,
#1
I have finally caught up with the current version. I downloaded the
ISOs from a mirror site. And created CDs. The first thing I noticed is
that when you select the packages, there doesn't seem to be a way to
select individual packages anymore. This cause me several delays in
installing SELinux. I had to install packages that I would have selected
during the original install. The compilation process would fail and I
would have to start it again.
Did I miss a menu or are other people noticing the same thing?
#2
The next thing I noticed was that when I boot up the system tries to
mount /selinux IAW the entry I put in the fstab (as per the README). But
the system is giving me an error about it being mounted or in use.
Or am I missing something again?
#3
When I log in initially as root I have the staff_r role and staff_t
domain. I immediately get the context error of trying to access my home
dir which is system_u:object_r:sysadm_home_dir_t.
It seems to me that this dir should be set to
system_u:object_r:staff_home_dir_t. or system_u:object_r:root_home_dir_t
so that this isn't a context failure. Another way to do this is set the
root account to sysadm_r:sysadm_t initially.
--
Nick (Nix) Gray
Senior Systems Engineer
Bruzenak Inc.
(512) 331-7998
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Questions: (was Updated Release)
2003-12-10 2:27 ` Questions: (was Updated Release) Nick
@ 2003-12-10 11:44 ` Russell Coker
0 siblings, 0 replies; 3+ messages in thread
From: Russell Coker @ 2003-12-10 11:44 UTC (permalink / raw)
To: nagray; +Cc: SE Linux
On Wed, 10 Dec 2003 13:27, Nick <nagray@austin.rr.com> wrote:
> I have finally caught up with the current version. I downloaded the
> ISOs from a mirror site. And created CDs. The first thing I noticed is
This is apparently a question about a Linux distribution, not about SE Linux.
As you don't mention which distribution it's not possible to answer the
question. In any case this isn't the best list.
> #2
> The next thing I noticed was that when I boot up the system tries to
> mount /selinux IAW the entry I put in the fstab (as per the README). But
> the system is giving me an error about it being mounted or in use.
In my Debian package I have /selinux mounted but not umounted, so for Debian
the thing to do is to use "noauto" in /etc/fstab. For Fedora the last
package of Dan's that I tested would umount /selinux so the /etc/fstab needed
to have "defaults". It sounds like you were using a Debian package (or
similar code) and had the /etc/fstab entry that would work for Fedora.
> When I log in initially as root I have the staff_r role and staff_t
> domain. I immediately get the context error of trying to access my home
> dir which is system_u:object_r:sysadm_home_dir_t.
I suggest putting sysadm_r:sysadm_t as the first entry in the local_login_t
line. I think that a console login to an administrative account should
default to the administrative role.
> It seems to me that this dir should be set to
> system_u:object_r:staff_home_dir_t. or system_u:object_r:root_home_dir_t
> so that this isn't a context failure. Another way to do this is set the
> root account to sysadm_r:sysadm_t initially.
I don't think that this is a good idea. I created staff_r based on user_r to
be a user role with extra privs. The idea being that staff_r could be for
professors and user_r for students, or managers and employees. So staff_t
can do all the same things as user_t but be protected from attack by user_t,
also staff_t can be given privs to kill user_t processes or have other
controll. But staff_r does not grant system administration privs.
If staff_t is given write access to /root, and if /root is the home directory
for the main administrative account then anyone who has staff_r can get
sysadm_r by creative replacement of .login type files (it's been done on play
machines).
In the example of an academic environment you don't expect a professor to try
to hack the university server (although it probably has happened), but you do
expect professors to choose bad passwords and to type them in while students
can watch. Having a professor's account get taken over by students has
happened at least once to my knowledge (the students told me, I told the
sys-admin, the sys-admin refused to believe and the students in question kept
the professor's account).
So in the case of a staff_r non-root account being taken over, if staff_t can
write to /root without restriction then all that's needed to get full access
is to transition to UID 0. SE Linux makes this much more difficult than a
regular Unix system, but it's still much easier to go from UID > 0 to
UID == 0 than to go from staff_r to sysadm_r.
Speaking of this, it would be useful to have a tool that could check for:
transitions from a domain to another domain with setuid capability or other
important privs.
--
http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/ Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/ My home page
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2003-12-10 11:46 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-12-05 20:28 Updated Release Howard Holm
2003-12-10 2:27 ` Questions: (was Updated Release) Nick
2003-12-10 11:44 ` Russell Coker
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.