From: KaiGai Kohei <kaigai@kaigai.gr.jp>
To: selinux@tycho.nsa.gov
Subject: MCS and unconfined_t
Date: Tue, 28 Mar 2006 22:01:33 +0900 [thread overview]
Message-ID: <442933AD.3040208@kaigai.gr.jp> (raw)
Hello,
Today, I'm considering an configuration for Fedora core 5 using MCS.
Some users are associated with restricted category 'c0,c1' at most.
If user field in security context would not change, they cannot
transit to wider range of categories.
But they can login with unconfined_t domain in default.
Because unconfined_t domain has 'execcon' permission, they can
transit to discretional range of categories by re-writing the
user field in security context.
Is it possible to control the unconfined_t processes by MCS ?
It seems a bit difficult.
Please notice me, if I have misunderstanding or misconfiguration.
Thanks,
---- current configuration ----
'ymj' logins with 'officer:system_r:unconfined_t:President'.
He can transit to 'user_t:system_t:unconfined_t:God' via an evil
program calls setexeccon().
It makes all MCS configuration nonsense.
[root@ayu ~]# semanage translation -l
Level Translation
s0
s0-s0:c0 Executive
s0-s0:c0,c1 President
s0-s0:c0.c255 God
s0:c0 Secret
s0:c0,c1 TopSecret
[root@ayu ~]# semanage user -l
MLS/ MLS/
SELinux User MCS Level MCS Range SELinux Roles
officer s0 President system_r
root s0 God sysadm_r user_r system_r
system_u s0 God system_r
user_u s0 God sysadm_r user_r system_r
[root@ayu ~]# semanage login -l
Login Name SELinux User MLS/MCS Range
__default__ user_u s0
root root God
tak officer Executive
ymj officer President
[root@ayu ~]#
--
KaiGai Kohei <kaigai@kaigai.gr.jp>
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next reply other threads:[~2006-03-28 13:01 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-03-28 13:01 KaiGai Kohei [this message]
2006-03-28 21:27 ` MCS and unconfined_t Stephen Smalley
2006-03-29 0:36 ` Russell Coker
2006-03-29 12:35 ` Stephen Smalley
2006-03-29 16:29 ` Christopher J. PeBenito
2006-03-29 16:45 ` Stephen Smalley
2006-03-29 17:59 ` Christopher J. PeBenito
2006-03-30 3:57 ` KaiGai Kohei
2006-03-30 12:09 ` Russell Coker
2006-03-30 12:31 ` Stephen Smalley
2006-04-02 13:55 ` KaiGai Kohei
2006-03-31 14:55 ` Russell Coker
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=442933AD.3040208@kaigai.gr.jp \
--to=kaigai@kaigai.gr.jp \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.