All of lore.kernel.org
 help / color / mirror / Atom feed
From: Luke Kenneth Casson Leighton <lkcl@lkcl.net>
To: Joshua Brindle <jbrindle@tresys.com>
Cc: SE-Linux <selinux@tycho.nsa.gov>
Subject: Re: banning copying of binaries (e.g. mozilla etc).
Date: Tue, 31 Aug 2004 10:24:13 +0100	[thread overview]
Message-ID: <20040831092413.GJ31497@lkcl.net> (raw)
In-Reply-To: <4133B938.3070201@tresys.com>

On Mon, Aug 30, 2004 at 07:33:12PM -0400, Joshua Brindle wrote:
> Luke Kenneth Casson Leighton wrote:
> 
> >okay, got a weird issue where i am curious as to whether selinux could
> >help.
> >
> >imagine that ipt_owner has been successfully hacked up (hacked as in
> >the literal and true meaning of the word not the one the press associate
> >with it) to support program names (or as a last resort inodes) as part
> >of the checking / filtering rules.
> >
> >i.e. like fireflier's rather buggy userspace support for allowing
> >e.g. mozilla to do port 80 and port 445 but NOT any other program,
> >only done properly and in the kernel.
> >
> >now imagine that someone bypasses these rules by simply copying the
> >binary.
> >
> >in this way, they would be able to at the very least bypass "DENY"
> >rules.
> >
> >my question is, therefore, is there an easy way to ban users from
> >copying binaries, whilst still allowing users to run them?
> >
> >l.
> >
> > 
> >
> I'm not sure what you are talking about here, there is no such thing as 
> a "deny" rule in selinux, everything is denied by default.

 yes - and somewhere, there's a "allow read bin_t" rule which i
 naively thought it would be possible to remove in order to achieve
 the desired effect...

> What you want to do is simply restrict the user domains from doing the 
> things you don't want, and giving only, say, mozilla the access it 
> needs. That way if they do copy the binary to their home it'll be 
> staff_home_t and can 1) either be denied execute by staff_t or 2) be 
> allowed to execute_no_trans so that anything it does is contrained by 
> the users domain restrictions. Futher, you can give user domains access 
> to execute binaries without reading them, this should work fine but that 
> is an incomplete solution. The bottom line is you can not easily keep 
> users from getting binaries onto the system, all you can do is prevent 
> them from executing them or only let them execute them in their 
> restricted domains.

 ... but if i understand correctly, it would be better to look for
 where user_t is granted execute_no_trans (in the big user macros)
 to user_u:object_r:user_t (well it's going to be allow $1_t) and
 remove that?

 l.


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2004-08-31  9:13 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-08-30 22:23 banning copying of binaries (e.g. mozilla etc) Luke Kenneth Casson Leighton
2004-08-30 23:33 ` Joshua Brindle
2004-08-31  9:24   ` Luke Kenneth Casson Leighton [this message]
2004-08-31 11:29 ` Stephen Smalley
2004-08-31 12:25   ` Luke Kenneth Casson Leighton
2004-08-31 12:34     ` Stephen Smalley
2004-08-31 13:27       ` Luke Kenneth Casson Leighton
2004-08-31 13:29         ` Stephen Smalley
2004-08-31 16:25           ` Joshua Brindle
2004-08-31 16:49             ` Stephen Smalley
2004-08-31 17:00               ` Joshua Brindle
2004-08-31 17:21                 ` Stephen Smalley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20040831092413.GJ31497@lkcl.net \
    --to=lkcl@lkcl.net \
    --cc=jbrindle@tresys.com \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.