From: Ole Kliemann <ole@plastictree.net>
To: Russell Coker <russell@coker.com.au>
Cc: selinux@tycho.nsa.gov
Subject: Re: Information about XSELinux
Date: Tue, 7 Aug 2012 14:53:23 +0200 [thread overview]
Message-ID: <20120807125323.GD2085@telvanni> (raw)
In-Reply-To: <201207271402.15812.russell@coker.com.au>
[-- Attachment #1: Type: text/plain, Size: 2348 bytes --]
On Fri, Jul 27, 2012 at 02:02:15PM +1000, Russell Coker wrote:
> Could you blog about all the details?
>
> I've wanted to get X access control in Debian for a while.
Sure! I'm just not sure how helpful it's gonna be, because my
policy is from scratch and pretty specialised for me. I'm scared
of the reference policy and frankly believe it's faster for me to
write the things I need from scratch than to find out how to do
this within the reference policy.
Of course I could use the reference policy as a base and write
only my stuff for user separation under X from scratch. But here
Ubuntu comes into play. I have to admit I haven't extensively
tested SELinux under Ubuntu, but I did look quite old. And from
what I read, AppArmor is the supported LSM under Ubuntu and one
should not expect much support for SELinux.
I need something that is either maintained actively or can be
maintained by myself with minimal effort. Neither applies to
reference policy under Ubuntu. I wouldn't want to leave Ubuntu
unless neccessary, so I'm writing from scratch.
Besides, I have some doubts about the underlying paradigm of a
security policy that gets _that_ complicated. But that's nothing
I really thought through so far.
Getting X11 with XSELinux was pretty easy actually. I just got
the source package, changed 'debian/rules' replacing the
'--disable-selinux' with '--enable-selinux' and build and
installed the package. Did 'setsebool -P xserver_object_manager
true' and XSELinux was good to go.
I then wrote a monolithic policy. I still use traditional linux
users to separate the different contexts I work with (mail,
browser, ...), like I have done for years. But instead of using
the crappy trusted/untrusted-model of the old SECURITY extension,
I separated the user contexts under X using SELinux.
So I specificly target only user contexts and only the X-portion
of access vectors. I could send you this policy, but it's messy
and probably useless to you.
I'm currently writing a new, modular policy targeting some system
daemons and separating my user contexts by SELinux without the
need for traditional linux users. I can tell you when it's done.
But again, it will be pretty specialised for my needs.
Was there anything specific you wanted to know?
Ole
[-- Attachment #2: Digital signature --]
[-- Type: application/pgp-signature, Size: 198 bytes --]
next prev parent reply other threads:[~2012-08-07 12:53 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-07-16 16:10 Information about XSELinux Ole Kliemann
2012-07-16 18:23 ` Russell Coker
2012-07-16 22:18 ` Ole Kliemann
2012-07-19 13:29 ` Stephen Smalley
2012-07-19 14:10 ` Daniel J Walsh
2012-07-19 14:44 ` Ole Kliemann
2012-07-27 4:02 ` Russell Coker
2012-08-07 12:53 ` Ole Kliemann [this message]
2012-07-17 17:31 ` James Carter
[not found] <1342534966.11916.YahooMailClassic@web87705.mail.ir2.yahoo.com>
2012-07-19 14:18 ` Ole Kliemann
2012-07-19 17:01 ` Richard Haines
2012-07-23 14:12 ` Ted Toth
2012-07-24 11:05 ` Ole Kliemann
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20120807125323.GD2085@telvanni \
--to=ole@plastictree.net \
--cc=russell@coker.com.au \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.