From: Joshua Brindle <jbrindle@tresys.com>
To: Luke Kenneth Casson Leighton <lkcl@lkcl.net>
Cc: SE-Linux <selinux@tycho.nsa.gov>
Subject: Re: banning copying of binaries (e.g. mozilla etc).
Date: Mon, 30 Aug 2004 19:33:12 -0400 [thread overview]
Message-ID: <4133B938.3070201@tresys.com> (raw)
In-Reply-To: <20040830222355.GI31497@lkcl.net>
Luke Kenneth Casson Leighton wrote:
>okay, got a weird issue where i am curious as to whether selinux could
>help.
>
>imagine that ipt_owner has been successfully hacked up (hacked as in
>the literal and true meaning of the word not the one the press associate
>with it) to support program names (or as a last resort inodes) as part
>of the checking / filtering rules.
>
>i.e. like fireflier's rather buggy userspace support for allowing
>e.g. mozilla to do port 80 and port 445 but NOT any other program,
>only done properly and in the kernel.
>
>now imagine that someone bypasses these rules by simply copying the
>binary.
>
>in this way, they would be able to at the very least bypass "DENY"
>rules.
>
>my question is, therefore, is there an easy way to ban users from
>copying binaries, whilst still allowing users to run them?
>
>l.
>
>
>
I'm not sure what you are talking about here, there is no such thing as
a "deny" rule in selinux, everything is denied by default.
What you want to do is simply restrict the user domains from doing the
things you don't want, and giving only, say, mozilla the access it
needs. That way if they do copy the binary to their home it'll be
staff_home_t and can 1) either be denied execute by staff_t or 2) be
allowed to execute_no_trans so that anything it does is contrained by
the users domain restrictions. Futher, you can give user domains access
to execute binaries without reading them, this should work fine but that
is an incomplete solution. The bottom line is you can not easily keep
users from getting binaries onto the system, all you can do is prevent
them from executing them or only let them execute them in their
restricted domains.
Joshua Brindle
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2004-08-30 23:33 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2004-08-30 22:23 banning copying of binaries (e.g. mozilla etc) Luke Kenneth Casson Leighton
2004-08-30 23:33 ` Joshua Brindle [this message]
2004-08-31 9:24 ` Luke Kenneth Casson Leighton
2004-08-31 11:29 ` Stephen Smalley
2004-08-31 12:25 ` Luke Kenneth Casson Leighton
2004-08-31 12:34 ` Stephen Smalley
2004-08-31 13:27 ` Luke Kenneth Casson Leighton
2004-08-31 13:29 ` Stephen Smalley
2004-08-31 16:25 ` Joshua Brindle
2004-08-31 16:49 ` Stephen Smalley
2004-08-31 17:00 ` Joshua Brindle
2004-08-31 17:21 ` Stephen Smalley
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4133B938.3070201@tresys.com \
--to=jbrindle@tresys.com \
--cc=lkcl@lkcl.net \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.