From: Daniel J Walsh <dwalsh@redhat.com>
To: Stephen Smalley <sds@epoch.ncsc.mil>
Cc: SELinux <SELinux@tycho.nsa.gov>, Colin Walters <walters@redhat.com>
Subject: Re: Proposed patch for libselinux
Date: Fri, 22 Oct 2004 10:24:39 -0400 [thread overview]
Message-ID: <41791827.6050709@redhat.com> (raw)
In-Reply-To: <1098454526.7614.97.camel@moss-spartans.epoch.ncsc.mil>
Stephen Smalley wrote:
>On Fri, 2004-10-22 at 09:45, Daniel J Walsh wrote:
>
>
>>Why is this not covered by the current checks of setting file context.
>>I don't think this is a special case.
>>If a domain can setfilecon, they should be able to set it permanently
>>
>>
>
>Debatable. Today, a domain may be able to relabel files, but an
>explicit relabel of the filesystem will always override those settings,
>which may be exactly what you want if you are doing a major policy
>upgrade. In general, one shouldn't be running setfiles on a system
>after installation except for major policy upgrades anyway. Allowing a
>domain to opt-out of subsequent relabels by default is new
>functionality; I think it requires a separate permission from
>relabelfrom.
>
>
>
>>setfileconfixed?
>>setfileconpermanent?
>>lockfilecon?
>>customizefilecon?
>>
>>I don't care what we call it.
>>
>>
>
>Do we think it possible that we may support other flags related to file
>contexts in the future? If so, then perhaps this should be a general
>flags field associated with the file context with a
>setfileconflags(path, flags), getfileconflags(path, flags) API and a
>single flag defined initially for marking the context as explicitly
>customized.
>
>
>
That seems like a good idea. But are are these different flags going to
require different Access Controls?
Dan
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2004-10-22 14:24 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2004-10-21 21:35 Proposed patch for libselinux Daniel J Walsh
2004-10-22 12:48 ` Stephen Smalley
2004-10-22 13:22 ` Daniel J Walsh
2004-10-22 13:44 ` Stephen Smalley
2004-10-22 14:22 ` Daniel J Walsh
2004-10-22 15:56 ` Luke Kenneth Casson Leighton
2004-10-22 19:55 ` Daniel J Walsh
2004-10-22 20:22 ` Daniel J Walsh
2004-10-25 14:52 ` Stephen Smalley
2004-10-25 15:31 ` Colin Walters
2004-10-25 18:00 ` Daniel J Walsh
2004-10-26 14:21 ` Luke Kenneth Casson Leighton
2004-10-26 14:13 ` Stephen Smalley
2004-10-26 15:21 ` Luke Kenneth Casson Leighton
2004-10-26 18:05 ` Luke Kenneth Casson Leighton
2004-10-29 23:28 ` Proposed patch for libselinux -- xdr ??? Nifty Hat Mitch
2004-10-22 13:23 ` Proposed patch for libselinux Stephen Smalley
2004-10-22 13:45 ` Daniel J Walsh
2004-10-22 14:15 ` Stephen Smalley
2004-10-22 14:24 ` Daniel J Walsh [this message]
2004-10-22 14:30 ` Stephen Smalley
2004-10-22 18:01 ` Daniel J Walsh
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=41791827.6050709@redhat.com \
--to=dwalsh@redhat.com \
--cc=SELinux@tycho.nsa.gov \
--cc=sds@epoch.ncsc.mil \
--cc=walters@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.