All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Daniel H. Jones" <hotrats@us.ibm.com>
To: Stephen Smalley <sds@tycho.nsa.gov>, selinux@tycho.nsa.gov
Subject: Re: ANN: Virgil 0.1 released
Date: Fri, 16 Dec 2005 12:15:26 -0600	[thread overview]
Message-ID: <43A3043E.60207@us.ibm.com> (raw)
In-Reply-To: <1134744996.3421.534.camel@moss-spartans.epoch.ncsc.mil>

Stephen Smalley wrote:
> On Thu, 2005-12-15 at 10:18 -0600, Daniel H. Jones wrote:
> 
>>ANNOUNCEMENT
>>
>>Virgil 0.1 has been released and may be downloaded from:
>>http://sourceforge.net/projects/sepolicy-virgil/
>>
>>About Virgil
>>Virgil is a utility for generating SELinux policy for user domains not 
>>covered by the distributed policy packages. The Virgil GUI allows a 
>>policy creator to select options and identify file system resources, 
>>then generate the desired source policy files.
>>
>>Purpose
>>The goal is Virgil is to encourage adoption of SELinux by providing a 
>>relatively simple mechanism for creating policy. In order to achieve 
>>that goal, Virgil hides much of the complexity, and therefore 
>>flexibility, of SELinux. This trade-off makes Virgil unsuitable for 
>>creating "least privilege" policies. Nevertheless, Virgil is capable of 
>>creating useful SELinux policy that will enhance the security of 
>>programs for which no policy currently exists.
>>
>>For feedback please e-mail sepolicy-virgil-list@lists.sourceforge.net
> 
> 
> Hi,
> 
> Could you briefly summarize how you view this tool and work as differing
> from:
> - the SELinux Policy Editor project (http://seedit.sf.net),
> - the MITRE polgen tool (http://www.mitre.org/tech/selinux/),
> - the Tresys SEFramework (not yet publically released, but briefly
> described in http://tresys.com/selinux/sedev.shtml and presented at last
> year's SELinux Symposium
> 
> It would be nice to have more synergy among policy
> generation/development efforts.
> 
> Naturally, your tool will need to deal with the transition to reference
> policy and the use of binary/loadable policy modules.
> 

Hello,
If I were to create a mission statement for Virgil it would be:
* Provide SELinux policy for user domains that will coexist with 
existing shipped policy.

If it helps, I will make some comparisons to the policy tools mentioned 
above, but my comments should in no way be taken to imply the existing 
tools are deficient. I simply have a different user in mind. My target 
user is looking to include their custom domain to the shipped policy, 
and do it today.

SELinux Policy Editor (seedit)
This one comes closest to Virgil as far as I could tell from the 
documentation. However, this tool seems more suitable for replacement of 
the shipped policy, rather than integration. It looks to me like adding 
a "deny /blah/blah/blah" in the global domain could cause files to be 
relabeled in such a way that the shipped policy is affected.

By contrast, Virgil has the concept of "private" resources. Virgil only 
labels/relabels private file system objects which, by definition, are 
exclusive to the domain. Access to system (or non-private) resources is 
achieved by obtaining the label from the object.

Mitre polgen
The difference here is the top-down versus bottom-up approach. Virgil 
(as well as seedit) generate policy based on user specified criteria. 
Polgen generates policy based on program behavior (and some 
interaction). These are philosophically different approaches.

Tresys SEFramework
The most notable difference here is that Virgil is available as of 
yesterday. The SEFramework will no doubt be an industrial strength 
solution once it is released. The Tresys efforts are very forward 
looking and will change the SELinux policy development/management 
landscape. That's a good thing. In the meantime, however, a practical 
tool that can extend existing policy and be accessible to Joe Fedora is 
good for early SELinux adoption. It should not be construed as a 
competing technology.

The reference policy and loadable modules will need to be dealt with ... 
naturally.

As always, thanks for your constructive observations and comments.

-- 
Thanks,
Dan Jones
IBM Linux Technology Center, Security
512-838-1794 (T/L 678-1794)
hotrats@us.ibm.com


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

      parent reply	other threads:[~2005-12-16 18:15 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-12-15 16:18 ANN: Virgil 0.1 released Daniel H. Jones
2005-12-16 14:56 ` Stephen Smalley
2005-12-16 17:45   ` Yuichi Nakamura
2005-12-16 18:20     ` Daniel H. Jones
2005-12-16 18:15   ` Daniel H. Jones [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=43A3043E.60207@us.ibm.com \
    --to=hotrats@us.ibm.com \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.