All of lore.kernel.org
 help / color / mirror / Atom feed
* xen 2.0 - adding selinux permissions
@ 2004-11-23 22:03 Luke Kenneth Casson Leighton
  2004-11-24 13:39 ` Stephen Smalley
  0 siblings, 1 reply; 11+ messages in thread
From: Luke Kenneth Casson Leighton @ 2004-11-23 22:03 UTC (permalink / raw)
  To: SE-Linux

i'm considering doing some mods on xen 2.0's management interface,
if i can justify the work.

at present, the xen "master", which is the first virtual machine fired up,
is allowed access to the xen control system (running in x86 ring 0) via
/proc/xen.

some ioctl commands represent things like "start a new virtual machine",
"stop one", "suspend this session to disk" that sort of thing.

then, what the xen developers have done is to write a web
interface (using twisted python *gibber*) which presents
virtually unrestricted (*gibber*) access to that /proc/xen
interface on port 8000, using HTTP.

then there is a command xm which connects to port 8000 and issues
commands over the network port.

apparently it is possible to implement authentication with
the twisted python framework, so it's not _all_ bad - plus,
if you're running a cluster, security restrictions just... get
in the way!!!


what i would _like_ to do is:

- take out the HTTP access and merge the xm http client with the xend
  http server.

- add in some new selinux security ids representing the xen commands
  (create virtual machine, list virtual machines, shutdown a machine,
   suspend-a-session-to-disk, etc.)

- write an selinux policy restricting the xm command to be the only
  thing that is allowed to perform those operations.


so: is this a practical proposition?

i've looked at security/selinux/hooks.c - is it a simple matter of, say,
copying the file ioctl command?

should i be adding a new function to the LSM function table, examining
the xen ioctl kernel call and calling the new security function in the
xen ioctl?

if i add a new function to the LSM function table, then presumably that
means that someone could write a linux "capabilities" function too, yes?

l.

-- 
--
<a href="http://lkcl.net">http://lkcl.net</a>
--

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2004-11-25  9:11 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-11-23 22:03 xen 2.0 - adding selinux permissions Luke Kenneth Casson Leighton
2004-11-24 13:39 ` Stephen Smalley
2004-11-24 15:09   ` Luke Kenneth Casson Leighton
2004-11-24 15:06     ` Stephen Smalley
2004-11-24 15:49       ` Luke Kenneth Casson Leighton
2004-11-24 15:54         ` Stephen Smalley
2004-11-24 17:10           ` Luke Kenneth Casson Leighton
2004-11-24 18:13         ` Colin Walters
2004-11-24 20:19           ` Luke Kenneth Casson Leighton
2004-11-25  1:15             ` Colin Walters
2004-11-25  9:22               ` Luke Kenneth Casson Leighton

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.