All of lore.kernel.org
 help / color / mirror / Atom feed
From: Luke Kenneth Casson Leighton <lkcl@lkcl.net>
To: Ivan Gyurdiev <ivg2@cornell.edu>
Cc: SELinux@tycho.nsa.gov
Subject: Re: Multiple contexts
Date: Mon, 10 Jan 2005 23:23:12 +0000	[thread overview]
Message-ID: <20050110232312.GI6967@lkcl.net> (raw)
In-Reply-To: <1105390249.8093.21.camel@cobra.ivg2.net>

On Mon, Jan 10, 2005 at 01:50:49PM -0700, Ivan Gyurdiev wrote:
> Why doesn't SElinux support multiple contexts per file?
> It seems to me that this feature would be very useful. 
> Is this technically not feasible?
> 
> I've been trying to get the following setup working on FC3 (rawhide):
> 
> /var/www/html.userX  - 
> 	virtual server for userX.mydomain labeled httpd_sys_content_t
> /home/userX - 
> 	home folder for userX, exported via Samba (not yet, but
> 	it will be, once dwalsh puts in booleans for samba reading home)
> 
> /home/userX/webserver - symlink to /var/www/html.userX 
> 
> Now, /var/www/html.userX needs to be accessed both by smbd and httpd.
> I need to label it with both samba_share_t and httpd_sys_content_t.
 
 i understand the mindset of selinux enough now to be able to say that
 the recommended approach would be for you to create a file type
 samba_share_httpd_sys_content_t and then for you to modify the
 selinux policy to grant the programs requiring access to those
 filetypes in the samba.te and the apache.te policy files.

> I have to edit the cryptic m4 policy file to add a type that's
> accessible by both. Why is this necessary? Why can't selinux
> either

> 	(1) Label the file with both contexts, and permit
> 	the operation if any context permits it
> 
> 	or
> 		
> 	(2) Create a type with the properties of both
> 	with less user interaction (without needing to 
> 	modify the policy manually)
> 
> Since I'm unfamiliar with how SElinux works internally,
> this might be a stupid question, but it seems to me that 
> the user should not be required to understand how a policy
> file works to label a file for use by two restricted programs.

 yes, it does seem a little curious: taking NT security descriptors
 (actually VMS SDs) as an example, and ignoring the fact that NT/VMS
 SDs contain DAC (discretionary) ACLs - each ACL is just that - an
 access control LIST.

 whereas in NT, the SD contains ACLs and the ACLs can be extended,
 modified and edited (and are better understood!), SElinux turns things
 roundabout somewhat: providing a reference (handle) into a binary
 policy.

 what i _am_ aware of is that by having the policies in a structured
 language, formal analysis tools can be applied to make certain
 guarantees and proofs.

 in paranoid security environments, it's far more important
 to be able to prove that someone _could_ break in than to
 not _know_ if they could break in (!)

 i can only hazard a hazardous guess therefore that the more
 "normal" ACL system [that we are used to seeing] was rejected
 because it makes the formal proof methodology more difficult.

 *shrug*.  *clueless*.  anyone know?

 l.


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2005-01-10 23:58 UTC|newest]

Thread overview: 42+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-01-10 20:50 Multiple contexts Ivan Gyurdiev
2005-01-10 23:23 ` Luke Kenneth Casson Leighton [this message]
2005-01-11  1:51   ` Luke Kenneth Casson Leighton
2005-01-11 20:09   ` Stephen Smalley
2005-01-11 21:48     ` Luke Kenneth Casson Leighton
2005-01-12 14:00       ` Stephen Smalley
2005-01-12 14:44         ` Luke Kenneth Casson Leighton
2005-01-12 15:00           ` Stephen Smalley
2005-01-12 18:18             ` Luke Kenneth Casson Leighton
2005-01-12 18:03               ` Stephen Smalley
2005-01-12 18:29                 ` Luke Kenneth Casson Leighton
2005-01-12 21:27                   ` Stephen Smalley
2005-01-12 22:41                     ` Luke Kenneth Casson Leighton
2005-01-13 15:55                       ` Stephen Smalley
2005-01-12 23:01                     ` Luke Kenneth Casson Leighton
2005-01-13 16:03                       ` Stephen Smalley
2005-01-13 16:44                       ` Stephen Smalley
2005-01-13 17:17                         ` Luke Kenneth Casson Leighton
2005-01-13 17:08                           ` Stephen Smalley
2005-01-12 19:07                 ` Luke Kenneth Casson Leighton
2005-01-11 15:18 ` Stephen Smalley
2005-01-11 20:08 ` Stephen Smalley
2005-01-12 20:11   ` Ivan Gyurdiev
2005-01-12 21:40     ` Stephen Bennett
2005-01-12 21:48       ` Stephen Smalley
2005-01-12 23:07       ` Luke Kenneth Casson Leighton
2005-01-13 16:06         ` Stephen Smalley
2005-01-12 21:47     ` Stephen Smalley
2005-01-12 23:08       ` Ivan Gyurdiev
2005-01-13 16:10         ` Stephen Smalley
2005-01-13 18:37           ` Luke Kenneth Casson Leighton
2005-01-13 23:17         ` Thomas Bleher
2005-01-14  7:07           ` Ivan Gyurdiev
2005-01-20 20:52             ` Ivan Gyurdiev
2005-01-12 23:32       ` Luke Kenneth Casson Leighton
2005-01-13 13:56         ` James Carter
2005-01-13 16:46           ` Luke Kenneth Casson Leighton
2005-01-13 16:16         ` Stephen Smalley
2005-01-13 16:48           ` Luke Kenneth Casson Leighton
2005-01-13 16:37             ` Stephen Smalley
2005-01-13 17:19               ` Luke Kenneth Casson Leighton
2005-01-13 17:10                 ` Stephen Smalley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20050110232312.GI6967@lkcl.net \
    --to=lkcl@lkcl.net \
    --cc=SELinux@tycho.nsa.gov \
    --cc=ivg2@cornell.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.