From: "Török Edwin" <edwin@gurde.com>
To: "Stephen Smalley" <sds@tycho.nsa.gov>
Cc: "Joshua Brindle" <jbrindle@tresys.com>,
"Christopher J. PeBenito" <cpebenito@tresys.com>,
selinux@tycho.nsa.gov, fireflier-devel@lists.sourceforge.net,
marius@cs.utt.ro
Subject: Re: Labeling only policy and problems with booleans
Date: Wed, 26 Apr 2006 21:13:00 +0300 [thread overview]
Message-ID: <200604262113.01211.edwin@gurde.com> (raw)
In-Reply-To: <1146058670.28745.117.camel@moss-spartans.epoch.ncsc.mil>
On Wednesday 26 April 2006 16:37, Stephen Smalley wrote:
> On Sun, 2006-04-23 at 22:58 +0300, Török Edwin wrote:
> > domain_auto_trans(unlabeled_t,myapp_exec_t,myapp_t)
>
> No process should be running in unlabeled_t (a process might be
> re-mapped to unlabeled_t if its type was removed from policy and policy
> was reloaded while the process was still running, but this would quickly
> lead to death for the process as it would lose access to its resources).
Ok, I won't add rules for unlabeled_t.
> > But why didn't the booleans work? I tried setting their default values in
> > booleans.conf to true, and still the same result, they weren'
> > t taken into consideration.
>
> I think we need more details to see whether this is a bug or not.
> What
> version of refpolicy?
20060307
> What version of checkpolicy?
checkpolicy 1.30-1, runnning on AMD64, kernel 2.6.16, debian sid.
I also tried:checkpolicy-1.30.3-1.fc5 on fedora core 5.
The virtual machine I tested my policy is emulating an x86_64 too.
I tried loading the policies generated by both versions, and I had
the "boolean problem" with both.
> There was a problem
> with the boolean mapping at link time with the optionals-in-base changes
> to refpolicy and certain versions of checkpolicy, but I think that has
> been resolved in the current version (although optionals-in-base still
> doesn't work properly, but that doesn't affect you as long as you are
> building everything you need into base).
If I have only the base module loaded (and anything else besides
unconfined.pp) then setting secure_mode_policyload works as expected. However
if I load unconfined.pp, I can change the policy even after
secure_mode_policyload
As soon as I remove unconfined.pp (and its dependencies),
secure_mode_policyload works again.
>
> > (btw, I also ran into a make bug:
> > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358903, I hope this
> > booleans problems isn't another build-tool related bug, if needed I can
> > make the compiled policy module available for analysis)
>
> Yes, that would be helpful.
The policy where I had unconfined linked (boolean not working)
http://edwintorok.googlepages.com/policybad.tar.gz
The policy where I didn't have unconfined linked:
http://edwintorok.googlepages.com/policyok.tar.gz
kernel messages: http://edwintorok.googlepages.com/messages
full build directory: http://edwintorok.googlepages.com/refpolicy.tgz
Let me know if anything else is needed to trace the problem.
There is another thing that worries me.
I was able to do mknod xx c 1 2 creating an equivalent of /dev/kmem, and it
wasn't labeled memory_device_t, it was labeled unlabeled_t.
So I guess giving access to unlabeled_t files is very dangerous (as you say
below). I assume one could exploit this by writing a program that creates a
kmem equivalent, and then he can do anything he wishes, including replacing
policy, loading another kernel module, patch syscalls...., am I right?
>
> Originally, attributes were all expanded when policy was compiled, and
> the kernel just dealt with the individual pairs. But current kernels
> and policies retain attributes in the rules when feasible, so the
> representation is more compact if you use attributes in your rules. So
> you save memory that way. Runtime processing itself is largely
> unaffected, as the access vector cache provides most of the security
> decisions, so security server computations are infrequent.
So I shouldn't worry about the number of types/attributes in my policy as far
as performance is concerned. I might optimize when the policy is final, to
save some memory.
>
> > Also since all programs will have unlabeled_t by default, there is no
> > point to do an initial relabeling, so either:
> > - mount -o context=unconfined_t
> > - do nothing, and the programs will get by default unlabeled_t, or
> > file_t, right?
>
> Using unlabeled_t in this way is a bad idea; it is used internally for
> various purposes to identity unlabeled entities or entities that have
> become unlabeled due to label invalidation.
I'll avoid using unlabeled_t.
What is the best practice to do when: most of the programs on the system will
run as unconfined_t, so they'll all have the same (default) label (on my
system file_t seems to be the default label) except:
- devices in /dev (handled by udev policy?)
- selinux policy loading programs (loadpolicy, semodule)
But I do want to be able to label individual files (when fireflier generates
policies for them).
If I don't run setfiles, and I run restorecon only for the: selinux policy
loading programs, and fireflier, will that be safe? (will an unlabeled
program be able to gain access to another domain besides unconfined_t)
Also, should I consider doing the policy loading myself in fireflier (via
libselinux,libsemanage...) instead of relying on an external program?
>
> > One of the other goals is the ability to be able to boot the system in
> > enforcing mode, without any manual policy modifications. If all programs
> > are unconfined_t/default_t will this be possible?
>
> If everything is unconfined, then naturally enforcing mode has no real
> impact on behavior.
Ok. But let me clarify, by unconfined_t I don't mean unconfined_t from the
targeted policy, since that has policy loading allowed.
I want to allow unconfined_t everything except:
- loading policy
- changing labels
- kernel module loading (boolean controlled, if I get booleans working)
- changing iptables rules
- writing to raw memory
Fireflier doesn't aim to be a full security solution, I just want it to create
proper labels for skfilter to use, and as such there should be no way for an
unconfined_t process to change labels/load policy.
I however don't care (maybe in a future version of fireflier I will) if an
unconfined_t writes to raw disk devices for example, etc. as long as it
doesn't "escape" the packet filtering rules.
I could have just created a policy that imposes no restrictions (like
secure_mode_policyload, protection from raw memory writes, protection from
security context transitions), since a program that is able to do that is
root, and if he is root he could just 'iptables -F', and all is over.
But I considered to provide some of the protections of the targeted policy,
since if people see fireflier creates&uses selinux policies,
will think "ah it uses selinux, this must be safe, so if I put this iptables
rule here it will make sure that only this program is allowed to receive on
that port. Not even if somebody gains root, will he be able to alter my
iptables rules". I'll document clearly that fireflier doesn't aim at
protecting you from root exploits, and the actions of root; but I think that
offering "some" protection against root is better, than none at all.
>
> > I also thought of creating an even more minimal base policy, but I am not
> > sure what I should remove from there, without breaking anything (I've
> > seen class, inherit, constrain, sid, portcon, fs_xattr,... I think these
> > are critical for selinux policy work, aren't they?) Would a more minimal
> > policy make selinux work faster?
>
> The flask definitions (classes, initial SIDs, access vectors) shouldn't
> be disturbed, as they are generated into definitions that are built into
> the kernel. The fs_use definitions are fundamental and shouldn't be
> modified except possibly to add new ones if appropriate for some
> filesystem type that you are using.
I won't touch them.
> Constraints do slow down processing
> of the security server computation, but most security decisions are
> provided by the AVC after the first such computation, so it isn't really
> critical, and the constraints do provide important restrictions.
So I'll leave these ones alone too.
> Object
> context definitions like portcon, netifcon, etc. can be omitted if you
> aren't truly using the SELinux network access controls. Primarily, you
> just want to minimize the TE rules for memory efficiency.
Ok, I'll do this as a final optimization step.
>
> > Since all the programs that need access to the socket are running already
> > (we are generating policies on-the-fly), we can ask the user which
> > programs he wants to give access to the socket, and create a policy for
> > that. Maybe creating an attribute, and applying that attribute to those
> > programs' types, and create a "neverallow ~myattribute" rule for the
> > socket access.
>
> neverallow rules don't grant access; they just specify invariants that
> should be checked when policy is compiled (or in the case of modules,
> when policy is linked and expanded to kernel policy).
I intend to use neverallow to catch policy generation bugs, and ...policy
creating logic errors. Also will it stop somebody from loading a policy
module that overrides my restrictions?
>
>
> Hmmm...there used to be a clone statement in the language, but it was
> ultimately dropped because the semantics were ambiguous and what you
> usually want is not truly complete equivalence, just structural
> parallel. e.g. for the new type, you don't want to allow it access to
> private/derived types of the old type - you want to allow it to access
> its own private/derived types. And you don't necessarily want to allow
> the same relationships with ancestors and descendants.
Consider this scenario:
- there is a type: original_exec_t, that transitions to original_t domain;
and 10 programs are labeled with it
- files created by original_t can be written by another_t
- I want to create a rule for only 2 programs out of those, so I create a new
type: sub_original_exec_t, sub_original_t and apply this label to these 2
programs. (and I'll create skfilter rules for these labels).
I want to keep the allowed interactions between the 10 programs in original_t,
so I'll have to give programs that are now sub_original_t, the same right
they would have had if they stayed original_t. And I also want to be give
another_t write access to files created by sub_original_t (creating files
that have the same label as original_t would have gave them should he
enough?)
Is this what you referred to as structural equivalence?
But you are right, if somebody creates descendant types he has to consider
which type he actually wants original_t, or sub_original_t .
How can I create a type that is structurally equivalent? (read all rules
associated with that type from the binary policy, and generate
allow/transition/etc. rules based on them?)
Thanks in advance,
Edwin
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2006-04-26 18:13 UTC|newest]
Thread overview: 272+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-04-02 9:40 [RFC] packet/socket owner match (fireflier) using skfilter Török Edwin
2006-04-03 15:18 ` James Morris
2006-04-03 15:39 ` Török Edwin
2006-04-05 15:06 ` Stephen Smalley
2006-04-07 17:34 ` Török Edwin
2006-04-07 18:24 ` [RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner) Török Edwin
2006-04-07 18:27 ` [RFC][PATCH 1/7] " Török Edwin
2006-04-12 19:11 ` Stephen Smalley
2006-04-14 20:02 ` Török Edwin
2006-04-07 18:38 ` [RFC][PATCH 2/7] implementation of LSM hooks Török Edwin
2006-04-12 17:42 ` Stephen Smalley
2006-04-14 20:01 ` [RESEND][RFC][PATCH " Török Edwin
2006-04-17 16:06 ` Stephen Smalley
2006-04-17 16:23 ` Christoph Hellwig
2006-04-17 17:03 ` Stephen Smalley
2006-04-17 17:08 ` Arjan van de Ven
2006-04-17 17:33 ` Christoph Hellwig
2006-04-17 18:02 ` Casey Schaufler
2006-04-17 18:15 ` Stephen Smalley
2006-04-17 19:26 ` Serge E. Hallyn
2006-04-17 19:31 ` James Morris
2006-04-17 19:47 ` Serge E. Hallyn
2006-04-17 20:02 ` Stephen Smalley
2006-04-19 14:52 ` David Safford
2006-04-19 15:26 ` Stephen Smalley
2006-04-19 17:57 ` Emily Ratliff
2006-04-19 18:33 ` Stephen Smalley
2006-04-20 12:27 ` Stephen Smalley
2006-04-19 15:47 ` Stephen Smalley
2006-04-17 22:15 ` Gerrit Huizenga
2006-04-17 22:48 ` Alan Cox
2006-04-17 22:58 ` James Morris
2006-04-18 2:00 ` Crispin Cowan
2006-04-17 22:55 ` Christoph Hellwig
2006-04-18 1:44 ` Gerrit Huizenga
2006-04-18 11:58 ` Christoph Hellwig
2006-04-18 16:50 ` Gerrit Huizenga
2006-04-18 17:27 ` Karl MacMillan
2006-04-18 19:31 ` Crispin Cowan
2006-04-18 19:50 ` Arjan van de Ven
2006-04-18 20:13 ` [Fireflier-devel] " Török Edwin
2006-04-18 20:31 ` Alan Cox
2006-04-18 19:33 ` [Fireflier-devel] Re: [RESEND][RFC][PATCH 2/7] implementationof " David Lang
2006-04-18 20:42 ` [Fireflier-devel] Re: [RESEND][RFC][PATCH 2/7] implementation of " Serge E. Hallyn
2006-04-18 20:23 ` Serge E. Hallyn
2006-04-19 18:32 ` Crispin Cowan
2006-04-19 18:48 ` Arjan van de Ven
2006-04-19 19:50 ` Jan Engelhardt
2006-04-19 18:50 ` Valdis.Kletnieks
2006-04-19 23:24 ` Tony Jones
2006-04-18 20:14 ` Stephen Smalley
2006-04-18 20:35 ` Crispin Cowan
2006-04-18 21:07 ` Greg KH
2006-04-19 12:22 ` Stephen Smalley
2006-04-18 20:26 ` Alan Cox
2006-04-18 20:57 ` Crispin Cowan
2006-04-18 21:36 ` James Morris
2006-04-18 23:09 ` Crispin Cowan
2006-04-18 23:27 ` Chris Wright
2006-04-18 23:57 ` James Morris
2006-04-19 1:48 ` Casey Schaufler
2006-04-19 6:40 ` Kyle Moffett
2006-04-19 6:56 ` Valdis.Kletnieks
2006-04-19 11:41 ` Serge E. Hallyn
2006-04-19 15:51 ` Valdis.Kletnieks
2006-04-19 16:00 ` Gene Heskett
2006-04-20 6:51 ` Kyle Moffett
2006-04-20 12:40 ` Stephen Smalley
2006-04-21 1:00 ` Nix
2006-04-21 14:24 ` Stephen Smalley
2006-04-24 8:14 ` Lars Marowsky-Bree
2006-04-25 0:19 ` Valdis.Kletnieks
2006-04-25 7:21 ` Nix
2006-04-19 7:44 ` Arjan van de Ven
2006-04-19 11:53 ` Serge E. Hallyn
2006-04-19 12:56 ` Stephen Smalley
2006-04-19 12:54 ` Stephen Smalley
2006-04-19 16:42 ` Casey Schaufler
2006-04-19 18:01 ` Stephen Smalley
2006-04-20 4:10 ` Casey Schaufler
2006-04-20 4:29 ` James Morris
2006-04-20 4:56 ` Chris Wright
2006-04-18 23:16 ` Casey Schaufler
2006-04-18 23:19 ` Christoph Hellwig
2006-04-19 5:22 ` Arjan van de Ven
2006-04-19 12:40 ` Stephen Smalley
2006-04-18 23:09 ` Casey Schaufler
2006-04-19 5:23 ` Arjan van de Ven
2006-04-18 18:46 ` Alan Cox
2006-04-18 19:59 ` Serge E. Hallyn
2006-04-18 20:20 ` Stephen Smalley
2006-04-18 20:36 ` Serge E. Hallyn
2006-04-18 23:00 ` Casey Schaufler
2006-04-19 9:03 ` Bernhard R. Link
2006-04-18 21:38 ` Kurt Garloff
2006-04-19 7:04 ` Valdis.Kletnieks
2006-04-19 7:36 ` Arjan van de Ven
2006-04-19 12:10 ` Serge E. Hallyn
2006-04-19 12:55 ` Yuichi Nakamura
2006-04-19 15:44 ` Greg KH
2006-04-19 16:02 ` Stephen Smalley
2006-04-19 16:06 ` Greg KH
2006-04-19 21:10 ` Crispin Cowan
2006-04-19 21:48 ` Yuichi Nakamura
2006-04-20 12:44 ` Karl MacMillan
2006-04-19 13:09 ` Stephen Smalley
2006-04-18 11:59 ` Stephen Smalley
2006-04-17 23:09 ` Chris Wright
2006-04-17 19:37 ` Stephen Smalley
2006-04-18 13:05 ` Kazuki Omo(Company)
2006-04-18 13:37 ` James Morris
2006-04-18 14:45 ` Greg KH
2006-04-18 15:51 ` Casey Schaufler
2006-04-18 16:07 ` Greg KH
2006-04-17 19:20 ` Time to remove LSM (was Re: [RESEND][RFC][PATCH 2/7] implementation of LSM hooks) James Morris
2006-04-17 19:51 ` Greg KH
2006-04-17 20:08 ` Arjan van de Ven
2006-04-17 21:26 ` Alan Cox
2006-04-17 23:26 ` Casey Schaufler
2006-04-18 2:29 ` Valdis.Kletnieks
2006-04-18 12:22 ` Serge E. Hallyn
2006-04-18 12:59 ` Stephen Smalley
[not found] ` <20060418132121.GE7562@sergelap.austin.ibm.com>
2006-04-18 13:40 ` Stephen Smalley
2006-04-18 20:13 ` Crispin Cowan
2006-04-18 23:01 ` Valdis.Kletnieks
2006-04-20 0:19 ` Crispin Cowan
2006-04-20 15:27 ` Valdis.Kletnieks
2006-04-21 15:23 ` Ken Brush
2006-04-21 19:51 ` Valdis.Kletnieks
2006-04-22 20:52 ` Ken Brush
2006-04-23 9:45 ` Valdis.Kletnieks
2006-04-24 8:24 ` Lars Marowsky-Bree
2006-04-24 12:42 ` Alan Cox
2006-04-24 12:44 ` Lars Marowsky-Bree
2006-04-24 12:45 ` Olivier Galibert
2006-04-24 12:54 ` Arjan van de Ven
2006-04-24 13:09 ` Serge E. Hallyn
2006-04-24 13:16 ` Arjan van de Ven
2006-04-24 13:29 ` Serge E. Hallyn
2006-04-24 13:40 ` Arjan van de Ven
2006-04-24 13:54 ` Serge E. Hallyn
2006-04-24 14:07 ` Arjan van de Ven
2006-04-25 19:06 ` Serge E. Hallyn
2006-04-25 4:07 ` Casey Schaufler
2006-04-24 14:08 ` Olivier Galibert
2006-04-25 16:29 ` Stephen Smalley
2006-04-25 22:26 ` Olivier Galibert
2006-04-26 12:14 ` Stephen Smalley
2006-04-26 16:03 ` Olivier Galibert
2006-04-27 6:56 ` Thomas Bleher
2006-04-24 12:55 ` Serge E. Hallyn
2006-04-24 12:56 ` Serge E. Hallyn
2006-04-24 14:02 ` Alan Cox
2006-04-24 14:04 ` Serge E. Hallyn
2006-04-24 14:31 ` Alan Cox
2006-04-24 14:28 ` Serge E. Hallyn
2006-04-24 14:45 ` David Lang
2006-04-24 16:50 ` Arjan van de Ven
2006-04-25 16:31 ` Stephen Smalley
2006-04-25 16:23 ` Stephen Smalley
2006-04-25 2:06 ` Valdis.Kletnieks
2006-04-25 7:36 ` Lars Marowsky-Bree
2006-04-20 21:13 ` Pavel Machek
2006-04-23 3:50 ` Crispin Cowan
2006-04-23 9:33 ` Valdis.Kletnieks
2006-04-23 14:58 ` Thomas Bleher
2006-04-24 8:28 ` Lars Marowsky-Bree
2006-04-24 8:37 ` Arjan van de Ven
2006-04-24 8:54 ` Lars Marowsky-Bree
2006-04-24 9:12 ` Arjan van de Ven
2006-04-25 0:31 ` Valdis.Kletnieks
2006-04-20 17:46 ` Pavel Machek
2006-04-18 2:38 ` Valdis.Kletnieks
2006-04-19 8:16 ` Jan Engelhardt
2006-04-19 15:40 ` Greg KH
2006-04-19 16:33 ` James Morris
2006-04-19 18:10 ` Greg KH
2006-04-19 19:33 ` Chris Wright
2006-04-20 12:39 ` Stephen Smalley
2006-04-20 12:51 ` Serge E. Hallyn
2006-04-20 15:00 ` Removing EXPORT_SYMBOL(security_ops) (was Re: Time to remove LSM) Greg KH
2006-04-20 14:20 ` Stephen Smalley
2006-04-20 16:15 ` Greg KH
2006-04-20 16:23 ` Christoph Hellwig
2006-04-20 16:34 ` Stephen Smalley
2006-04-20 16:46 ` Greg KH
2006-04-20 17:00 ` Stephen Smalley
2006-04-20 17:01 ` [PATCH] make security_ops EXPORT_SYMBOL_GPL() Greg KH
2006-04-20 18:08 ` Linus Torvalds
2006-04-20 19:34 ` Greg KH
2006-04-21 16:50 ` Greg KH
2006-04-21 17:34 ` Chris Wright
2006-04-20 17:02 ` Removing EXPORT_SYMBOL(security_ops) (was Re: Time to remove LSM) Tony Jones
2006-04-20 20:14 ` Chris Wright
2006-04-19 19:22 ` Time to remove LSM (was Re: [RESEND][RFC][PATCH 2/7] implementation of LSM hooks) Jan Engelhardt
2006-04-19 20:48 ` Greg KH
2006-04-19 20:59 ` Serge E. Hallyn
2006-04-19 21:08 ` Randy.Dunlap
2006-04-19 16:00 ` Arjan van de Ven
2006-04-19 19:06 ` Jan Engelhardt
2006-04-19 20:11 ` Greg KH
2006-04-19 20:52 ` Randy.Dunlap
2006-04-19 20:54 ` Arjan van de Ven
2006-04-19 21:05 ` Jan Engelhardt
2006-04-20 12:20 ` Stephen Smalley
2006-04-21 13:30 ` Jan Engelhardt
2006-04-21 15:05 ` Greg KH
2006-05-01 13:45 ` [PATCH 0/4] MultiAdmin LSM Jan Engelhardt
2006-05-01 13:48 ` [PATCH 1/4] security_cap_extra() and more Jan Engelhardt
2006-05-01 13:49 ` [PATCH 2/4] Use of capable_light() Jan Engelhardt
2006-05-01 13:49 ` [PATCH 3/4] task_post_setgid() Jan Engelhardt
2006-05-01 13:50 ` [PATCH 4/4] MultiAdmin module Jan Engelhardt
2006-05-01 14:56 ` James Morris
2006-05-01 15:05 ` Greg KH
2006-05-01 13:50 ` [PATCH 0/4] MultiAdmin LSM Arjan van de Ven
2006-05-01 16:03 ` [PATCH 4a/4] MultiAdmin LSM (LKCS'ed) Jan Engelhardt
2006-05-01 16:47 ` Greg KH
2006-05-01 17:42 ` Jan Engelhardt
2006-05-01 18:07 ` Greg KH
2006-05-01 20:19 ` Jan Engelhardt
2006-05-01 21:47 ` Adrian Bunk
2006-05-01 20:56 ` [PATCH 0/4] MultiAdmin LSM Pavel Machek
2006-05-02 4:22 ` James Morris
2006-04-21 16:25 ` Time to remove LSM (was Re: [RESEND][RFC][PATCH 2/7] implementation of LSM hooks) Stephen Smalley
2006-04-21 18:57 ` Jan Engelhardt
2006-04-21 19:56 ` Stephen Smalley
2006-04-22 11:13 ` Jan Engelhardt
2006-04-20 23:41 ` Pavel Machek
2006-04-19 17:00 ` Valdis.Kletnieks
2006-04-17 20:20 ` Chris Wright
2006-04-17 20:24 ` Arjan van de Ven
2006-04-17 20:27 ` Time to remove LSM David S. Miller
2006-04-17 20:27 ` Time to remove LSM (was Re: [RESEND][RFC][PATCH 2/7] implementation of LSM hooks) Chris Wright
2006-04-17 20:34 ` Greg KH
2006-04-17 20:38 ` Chris Wright
2006-04-17 20:43 ` Arjan van de Ven
2006-04-17 20:53 ` Chris Wright
2006-04-17 20:45 ` alan
[not found] ` <2e00cdfd0604171437g1d6c6923w5db82f317ed0f56@mail.gmail.com>
2006-04-17 22:07 ` Chris Wright
2006-04-17 22:10 ` Arjan van de Ven
2006-04-17 20:51 ` Adrian Bunk
2006-04-17 20:08 ` [RESEND][RFC][PATCH 2/7] implementation of LSM hooks David S. Miller
2006-04-17 18:20 ` Török Edwin
2006-04-23 19:58 ` Labeling only policy and problems with booleans Török Edwin
2006-04-26 13:37 ` Stephen Smalley
2006-04-26 14:13 ` Christopher J. PeBenito
2006-04-26 18:18 ` Török Edwin
2006-04-26 19:23 ` Christopher J. PeBenito
2006-04-26 18:13 ` Török Edwin [this message]
2006-04-26 19:26 ` Stephen Smalley
2006-04-26 20:08 ` Török Edwin
2006-04-27 19:17 ` Török Edwin
2006-04-27 19:53 ` Karl MacMillan
2006-05-01 16:06 ` [PATCH ] consistent labeling of block|character devices Török Edwin
2006-05-01 19:51 ` Stephen Smalley
2006-05-01 16:17 ` [1/4] Labeling only policy for fireflier Török Edwin
2006-05-01 16:34 ` [2/4] Labeling only policy for fireflier (fireflier.pp) Török Edwin
2006-05-01 16:38 ` [3/4] Labeling only policy for fireflier (example module) Török Edwin
2006-05-03 14:35 ` [2/4] Labeling only policy for fireflier (fireflier.pp) Christopher J. PeBenito
2006-05-01 16:43 ` [4/4] Labeling only policy for fireflier (install) Török Edwin
2006-05-01 18:55 ` [1/4] Labeling only policy for fireflier Christopher J. PeBenito
2006-05-02 15:36 ` Török Edwin
2006-04-07 18:39 ` [RFC][PATCH 3/7] sidtab - hashtable to store SIDs Török Edwin
2006-04-07 18:41 ` [RFC][PATCH 4/7] exports Török Edwin
2006-04-07 18:43 ` [RFC][PATCH 5/7] debugging/testing support Török Edwin
2006-04-07 18:44 ` [RFC][PATCH 6/7] userspace Török Edwin
2006-04-07 18:46 ` [RFC][PATCH 7/7] stacking support for capability module Török Edwin
2006-04-07 19:18 ` Serge E. Hallyn
2006-04-07 19:45 ` [RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner) Chris Wright
2006-04-08 7:41 ` edwin
2006-04-21 15:26 ` [RFC] packet/socket owner match (fireflier) using skfilter Mikado
2006-04-21 16:18 ` Török Edwin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200604262113.01211.edwin@gurde.com \
--to=edwin@gurde.com \
--cc=cpebenito@tresys.com \
--cc=fireflier-devel@lists.sourceforge.net \
--cc=jbrindle@tresys.com \
--cc=marius@cs.utt.ro \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.