From: Luke Kenneth Casson Leighton <lkcl@lkcl.net>
To: Ivan Gyurdiev <ivg2@cornell.edu>
Cc: SELinux@tycho.nsa.gov
Subject: Re: Multiple contexts
Date: Mon, 10 Jan 2005 23:23:12 +0000 [thread overview]
Message-ID: <20050110232312.GI6967@lkcl.net> (raw)
In-Reply-To: <1105390249.8093.21.camel@cobra.ivg2.net>
On Mon, Jan 10, 2005 at 01:50:49PM -0700, Ivan Gyurdiev wrote:
> Why doesn't SElinux support multiple contexts per file?
> It seems to me that this feature would be very useful.
> Is this technically not feasible?
>
> I've been trying to get the following setup working on FC3 (rawhide):
>
> /var/www/html.userX -
> virtual server for userX.mydomain labeled httpd_sys_content_t
> /home/userX -
> home folder for userX, exported via Samba (not yet, but
> it will be, once dwalsh puts in booleans for samba reading home)
>
> /home/userX/webserver - symlink to /var/www/html.userX
>
> Now, /var/www/html.userX needs to be accessed both by smbd and httpd.
> I need to label it with both samba_share_t and httpd_sys_content_t.
i understand the mindset of selinux enough now to be able to say that
the recommended approach would be for you to create a file type
samba_share_httpd_sys_content_t and then for you to modify the
selinux policy to grant the programs requiring access to those
filetypes in the samba.te and the apache.te policy files.
> I have to edit the cryptic m4 policy file to add a type that's
> accessible by both. Why is this necessary? Why can't selinux
> either
> (1) Label the file with both contexts, and permit
> the operation if any context permits it
>
> or
>
> (2) Create a type with the properties of both
> with less user interaction (without needing to
> modify the policy manually)
>
> Since I'm unfamiliar with how SElinux works internally,
> this might be a stupid question, but it seems to me that
> the user should not be required to understand how a policy
> file works to label a file for use by two restricted programs.
yes, it does seem a little curious: taking NT security descriptors
(actually VMS SDs) as an example, and ignoring the fact that NT/VMS
SDs contain DAC (discretionary) ACLs - each ACL is just that - an
access control LIST.
whereas in NT, the SD contains ACLs and the ACLs can be extended,
modified and edited (and are better understood!), SElinux turns things
roundabout somewhat: providing a reference (handle) into a binary
policy.
what i _am_ aware of is that by having the policies in a structured
language, formal analysis tools can be applied to make certain
guarantees and proofs.
in paranoid security environments, it's far more important
to be able to prove that someone _could_ break in than to
not _know_ if they could break in (!)
i can only hazard a hazardous guess therefore that the more
"normal" ACL system [that we are used to seeing] was rejected
because it makes the formal proof methodology more difficult.
*shrug*. *clueless*. anyone know?
l.
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2005-01-10 23:58 UTC|newest]
Thread overview: 42+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-01-10 20:50 Multiple contexts Ivan Gyurdiev
2005-01-10 23:23 ` Luke Kenneth Casson Leighton [this message]
2005-01-11 1:51 ` Luke Kenneth Casson Leighton
2005-01-11 20:09 ` Stephen Smalley
2005-01-11 21:48 ` Luke Kenneth Casson Leighton
2005-01-12 14:00 ` Stephen Smalley
2005-01-12 14:44 ` Luke Kenneth Casson Leighton
2005-01-12 15:00 ` Stephen Smalley
2005-01-12 18:18 ` Luke Kenneth Casson Leighton
2005-01-12 18:03 ` Stephen Smalley
2005-01-12 18:29 ` Luke Kenneth Casson Leighton
2005-01-12 21:27 ` Stephen Smalley
2005-01-12 22:41 ` Luke Kenneth Casson Leighton
2005-01-13 15:55 ` Stephen Smalley
2005-01-12 23:01 ` Luke Kenneth Casson Leighton
2005-01-13 16:03 ` Stephen Smalley
2005-01-13 16:44 ` Stephen Smalley
2005-01-13 17:17 ` Luke Kenneth Casson Leighton
2005-01-13 17:08 ` Stephen Smalley
2005-01-12 19:07 ` Luke Kenneth Casson Leighton
2005-01-11 15:18 ` Stephen Smalley
2005-01-11 20:08 ` Stephen Smalley
2005-01-12 20:11 ` Ivan Gyurdiev
2005-01-12 21:40 ` Stephen Bennett
2005-01-12 21:48 ` Stephen Smalley
2005-01-12 23:07 ` Luke Kenneth Casson Leighton
2005-01-13 16:06 ` Stephen Smalley
2005-01-12 21:47 ` Stephen Smalley
2005-01-12 23:08 ` Ivan Gyurdiev
2005-01-13 16:10 ` Stephen Smalley
2005-01-13 18:37 ` Luke Kenneth Casson Leighton
2005-01-13 23:17 ` Thomas Bleher
2005-01-14 7:07 ` Ivan Gyurdiev
2005-01-20 20:52 ` Ivan Gyurdiev
2005-01-12 23:32 ` Luke Kenneth Casson Leighton
2005-01-13 13:56 ` James Carter
2005-01-13 16:46 ` Luke Kenneth Casson Leighton
2005-01-13 16:16 ` Stephen Smalley
2005-01-13 16:48 ` Luke Kenneth Casson Leighton
2005-01-13 16:37 ` Stephen Smalley
2005-01-13 17:19 ` Luke Kenneth Casson Leighton
2005-01-13 17:10 ` Stephen Smalley
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20050110232312.GI6967@lkcl.net \
--to=lkcl@lkcl.net \
--cc=SELinux@tycho.nsa.gov \
--cc=ivg2@cornell.edu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.