All of lore.kernel.org
 help / color / mirror / Atom feed
* RE: Compiling for SuSE 7.2
@ 2001-10-05 17:09 Westerman, Mark
  0 siblings, 0 replies; 18+ messages in thread
From: Westerman, Mark @ 2001-10-05 17:09 UTC (permalink / raw)
  To: 'Stephen Smalley', Russell Coker; +Cc: James Bishop, selinux

The gdm program is working, I have modified it for the
lsm-selinux. I any body wi=ould like a copy please let me know.

Work ok for me.

Mark
mark.westerman@csoconline.com

-----Original Message-----
From: Stephen Smalley [mailto:sds@tislabs.com]
Sent: Friday, October 05, 2001 10:35 AM
To: Russell Coker
Cc: James Bishop; selinux@tycho.nsa.gov
Subject: Re: Compiling for SuSE 7.2



On Fri, 5 Oct 2001, Russell Coker wrote:

> /bin/login is for console logins, telnetd, and I think rshd.  sshd doesn't
> use it (but there's a patch to sshd).  X logins use an X program, options
> include xdm, kdm, gdm, and many others.  I intend to develop a patch for
kdm
> after getting everything else working (if no-one beats me to it).

The simplest approach is to obtain the default security context for the
user (via the get_default_user_sid function in libsecure) and use it in
the appropriate exec*_secure call, and then let the user run newrole if
necessary to change roles after login.  Also, as with login, the ?dm
program should set the security context for the user's terminal device.
Mark Westerman experimented with a patch for gdm that is available on
his sourceforge selinux project site, but I'm not sure how far he got.

Note that some policy customization will be necessary to properly support
the use of the ?dm programs.  A separate domain should be defined for
these programs, and some of their helper programs may also need separate
domains to provide least privilege.

Longer term, it would be nice to change ?dm and its helper programs to
permit users to specify a security context upon login.  But this would
be more complicated and require a more invasive patch.

> Initially using startx after logging in on the console is easiest.

Yes, this is what we recommend if you want to run X.  However, please note
that you must uncomment some allow rules in the
policy/domains/program/xserver.te file to grant the X server the necessary
permissions.  And note that this is dangerous - X is far too privileged,
and needs to be restructured to support least privilege.

--
Stephen D. Smalley, NAI Labs
ssmalley@nai.com




--
You have received this message because you are subscribed to the selinux
list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov
with
the words "unsubscribe selinux" without quotes as the message.

--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 18+ messages in thread
* Compiling for SuSE 7.2
@ 2001-10-03 13:17 James Bishop
  2001-10-03 14:01 ` Stephen Smalley
  2001-10-04 12:47 ` Russell Coker
  0 siblings, 2 replies; 18+ messages in thread
From: James Bishop @ 2001-10-03 13:17 UTC (permalink / raw)
  To: selinux

Good afternoon,

This is my first posting to this list, so "hello world!\n".

I'm building the lsm-selinux-200109261436.tgz distribution on my SuSE 
7.2 system. Up to item 6) in the installation instructions, everything 
has worked without a hitch.

Compilation of the modified applications in the selinux/utils 
sub-directory required commenting out the contents of the 
fileutils-4.0/m4/isc-posix.m4 file (I don't know m4); and changing the 
Makefile in psmisc to link pstree with the ncurses library instead of 
the termcap library.

Now I'm up against the differences between the RedHat 7.1 and SuSE 7.2 
distributions. The MCONFIG files of the util-linux package are different 
(also SuSE 7.2 uses util-linux-2.11). I know from past experience that 
getting things wrong with util-linux is "a bit of a bore".

If I proceed to install the utils package as is, can anyone tell me 
whether login will still work? Or could / should I modify the MCONFIG 
file of SELinux to bring it closer into line with the SuSE 7.2 version?

I see that the SELinux Makefile moves the original /bin/login to 
/bin/login.old and then installs the new /bin/login. If I could ensure 
that /bin/login.old was used (perhaps on the basis of the result of the 
uname command - SuSE 7.2 is kernel version 2.4.4)I would feel better. 
How could I do this?

Should I remove shadow passwords from the SuSE 7.2 system before 
proceeding, or can I leave them in place?

All the best,
James Bishop


--
You have received this message because you are subscribed to the selinux list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 18+ messages in thread

end of thread, other threads:[~2001-10-15 15:33 UTC | newest]

Thread overview: 18+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <Pine.GSO.4.33.0110111248230.18477-100000@raven>
2001-10-15 15:33 ` Compiling for SuSE 7.2 James Bishop
2001-10-05 17:09 Westerman, Mark
  -- strict thread matches above, loose matches on Subject: below --
2001-10-03 13:17 James Bishop
2001-10-03 14:01 ` Stephen Smalley
2001-10-04 12:58   ` James Bishop
2001-10-04 15:24     ` Stephen Smalley
2001-09-04 21:45       ` John Scroggins
2001-10-05 12:56         ` Stephen Smalley
2001-10-05  7:21       ` James Bishop
2001-10-05 12:40         ` Russell Coker
2001-10-05 15:35           ` Stephen Smalley
2001-10-05 13:39         ` Stephen Smalley
2001-10-08 10:14           ` James Bishop
2001-10-08 13:50             ` Stephen Smalley
2001-10-08 16:31               ` James Bishop
2001-10-08 17:41                 ` Stephen Smalley
2001-10-11 16:43                   ` James Bishop
2001-10-04 12:47 ` Russell Coker

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.