All of lore.kernel.org
 help / color / mirror / Atom feed
* MCS and unconfined_t
@ 2006-03-28 13:01 KaiGai Kohei
  2006-03-28 21:27 ` Stephen Smalley
  0 siblings, 1 reply; 12+ messages in thread
From: KaiGai Kohei @ 2006-03-28 13:01 UTC (permalink / raw)
  To: selinux

Hello,

Today, I'm considering an configuration for Fedora core 5 using MCS.

Some users are associated with restricted category 'c0,c1' at most.
If user field in security context would not change, they cannot
transit to wider range of categories.

But they can login with unconfined_t domain in default.
Because unconfined_t domain has 'execcon' permission, they can
transit to discretional range of categories by re-writing the
user field in security context.

Is it possible to control the unconfined_t processes by MCS ?
It seems a bit difficult.
Please notice me, if I have misunderstanding or misconfiguration.

Thanks,

---- current configuration ----
'ymj' logins with 'officer:system_r:unconfined_t:President'.
He can transit to 'user_t:system_t:unconfined_t:God' via an evil
program calls setexeccon().
It makes all MCS configuration nonsense.

[root@ayu ~]# semanage translation -l

Level                     Translation

s0
s0-s0:c0                  Executive
s0-s0:c0,c1               President
s0-s0:c0.c255             God
s0:c0                     Secret
s0:c0,c1                  TopSecret
[root@ayu ~]# semanage user -l

                MLS/       MLS/
SELinux User    MCS Level  MCS Range        SELinux Roles

officer         s0         President        system_r
root            s0         God              sysadm_r user_r system_r
system_u        s0         God              system_r
user_u          s0         God              sysadm_r user_r system_r
[root@ayu ~]# semanage login -l

Login Name                SELinux User              MLS/MCS Range

__default__               user_u                    s0
root                      root                      God
tak                       officer                   Executive
ymj                       officer                   President
[root@ayu ~]#

-- 
KaiGai Kohei <kaigai@kaigai.gr.jp>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-28 13:01 MCS and unconfined_t KaiGai Kohei
@ 2006-03-28 21:27 ` Stephen Smalley
  2006-03-29  0:36   ` Russell Coker
  2006-03-29 16:29   ` Christopher J. PeBenito
  0 siblings, 2 replies; 12+ messages in thread
From: Stephen Smalley @ 2006-03-28 21:27 UTC (permalink / raw)
  To: KaiGai Kohei
  Cc: Christopher J. PeBenito, Russell Coker, James Morris,
	Daniel J Walsh, selinux

On Tue, 2006-03-28 at 22:01 +0900, KaiGai Kohei wrote:
> Hello,
> 
> Today, I'm considering an configuration for Fedora core 5 using MCS.
> 
> Some users are associated with restricted category 'c0,c1' at most.
> If user field in security context would not change, they cannot
> transit to wider range of categories.
> 
> But they can login with unconfined_t domain in default.
> Because unconfined_t domain has 'execcon' permission, they can
> transit to discretional range of categories by re-writing the
> user field in security context.
> 
> Is it possible to control the unconfined_t processes by MCS ?
> It seems a bit difficult.
> Please notice me, if I have misunderstanding or misconfiguration.

Hmmm...I had thought that Russell had introduced a mlsconstraint on
process transition and dyntransition permissions in policy/mcs, see the
earlier discussion on list in Feb.  But it appears to be missing from
the current policy, which does mean that an unconfined process can
easily escape its restrictions via runcon or newrole -l.  Seems to be
missing in FC5 too.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-28 21:27 ` Stephen Smalley
@ 2006-03-29  0:36   ` Russell Coker
  2006-03-29 12:35     ` Stephen Smalley
  2006-03-29 16:29   ` Christopher J. PeBenito
  1 sibling, 1 reply; 12+ messages in thread
From: Russell Coker @ 2006-03-29  0:36 UTC (permalink / raw)
  To: sds
  Cc: KaiGai Kohei, Christopher J. PeBenito, James Morris,
	Daniel J Walsh, selinux

On Wednesday 29 March 2006 08:27, Stephen Smalley <sds@tycho.nsa.gov> wrote:
> > Is it possible to control the unconfined_t processes by MCS ?
> > It seems a bit difficult.
> > Please notice me, if I have misunderstanding or misconfiguration.
>
> Hmmm...I had thought that Russell had introduced a mlsconstraint on
> process transition and dyntransition permissions in policy/mcs, see the
> earlier discussion on list in Feb.  But it appears to be missing from
> the current policy, which does mean that an unconfined process can
> easily escape its restrictions via runcon or newrole -l.  Seems to be
> missing in FC5 too.

The problem we have is that we want su(1) to allow changing to the SE Linux 
context of the new user with the appropriate MCS categories.  To do this we 
need to have su run in it's own domain so that it is permitted to increase 
the categories while the unconfined_t domain isn't.  I plan to release this 
as an FC5 update.

For the moment KaiGai Kohei is correct and there is no way to effectively 
constrain unconfined_t.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-29  0:36   ` Russell Coker
@ 2006-03-29 12:35     ` Stephen Smalley
  0 siblings, 0 replies; 12+ messages in thread
From: Stephen Smalley @ 2006-03-29 12:35 UTC (permalink / raw)
  To: russell
  Cc: KaiGai Kohei, Christopher J. PeBenito, James Morris,
	Daniel J Walsh, selinux

On Wed, 2006-03-29 at 11:36 +1100, Russell Coker wrote:
> The problem we have is that we want su(1) to allow changing to the SE Linux 
> context of the new user with the appropriate MCS categories.  To do this we 
> need to have su run in it's own domain so that it is permitted to increase 
> the categories while the unconfined_t domain isn't.  I plan to release this 
> as an FC5 update.
> 
> For the moment KaiGai Kohei is correct and there is no way to effectively 
> constrain unconfined_t.

Hmm...but su no longer uses pam_selinux, so it isn't supposed to change
SELinux context (aside from automatic transitions).

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-28 21:27 ` Stephen Smalley
  2006-03-29  0:36   ` Russell Coker
@ 2006-03-29 16:29   ` Christopher J. PeBenito
  2006-03-29 16:45     ` Stephen Smalley
  2006-03-31 14:55     ` Russell Coker
  1 sibling, 2 replies; 12+ messages in thread
From: Christopher J. PeBenito @ 2006-03-29 16:29 UTC (permalink / raw)
  To: sds; +Cc: KaiGai Kohei, Russell Coker, James Morris, Daniel J Walsh,
	selinux

On Tue, 2006-03-28 at 16:27 -0500, Stephen Smalley wrote:
> On Tue, 2006-03-28 at 22:01 +0900, KaiGai Kohei wrote:
> > Today, I'm considering an configuration for Fedora core 5 using MCS.
> > 
> > Some users are associated with restricted category 'c0,c1' at most.
> > If user field in security context would not change, they cannot
> > transit to wider range of categories.
> > 
> > But they can login with unconfined_t domain in default.
> > Because unconfined_t domain has 'execcon' permission, they can
> > transit to discretional range of categories by re-writing the
> > user field in security context.
> > 
> > Is it possible to control the unconfined_t processes by MCS ?
> > It seems a bit difficult.
> > Please notice me, if I have misunderstanding or misconfiguration.
> 
> Hmmm...I had thought that Russell had introduced a mlsconstraint on
> process transition and dyntransition permissions in policy/mcs, see the
> earlier discussion on list in Feb.  But it appears to be missing from
> the current policy, which does mean that an unconfined process can
> easily escape its restrictions via runcon or newrole -l.  Seems to be
> missing in FC5 too.

My issue with that patch was that it had types hardcoded into the
constraints, violating encapsulation.  In the interim other parts of the
patch were fixed and resubmitted, but this piece got lost along the way.
I've committed it, using an attribute and an interface.

-- 
Chris PeBenito
Tresys Technology, LLC
(410) 290-1411 x150


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-29 16:29   ` Christopher J. PeBenito
@ 2006-03-29 16:45     ` Stephen Smalley
  2006-03-29 17:59       ` Christopher J. PeBenito
  2006-03-31 14:55     ` Russell Coker
  1 sibling, 1 reply; 12+ messages in thread
From: Stephen Smalley @ 2006-03-29 16:45 UTC (permalink / raw)
  To: Christopher J. PeBenito
  Cc: KaiGai Kohei, Russell Coker, James Morris, Daniel J Walsh,
	selinux

On Wed, 2006-03-29 at 11:29 -0500, Christopher J. PeBenito wrote:
> My issue with that patch was that it had types hardcoded into the
> constraints, violating encapsulation.  In the interim other parts of the
> patch were fixed and resubmitted, but this piece got lost along the way.
> I've committed it, using an attribute and an interface.

Ok, but it seems like something still isn't quite conceptually here in
MCS - pam_selinux was removed from su, so su isn't supposed to switch
levels, yet running su on FC5 does change to a fully ranged context,
presumably via range_transition.  Which makes no sense to me at all
given the intent of MCS.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-29 16:45     ` Stephen Smalley
@ 2006-03-29 17:59       ` Christopher J. PeBenito
  2006-03-30  3:57         ` KaiGai Kohei
  0 siblings, 1 reply; 12+ messages in thread
From: Christopher J. PeBenito @ 2006-03-29 17:59 UTC (permalink / raw)
  To: sds; +Cc: KaiGai Kohei, Russell Coker, James Morris, Daniel J Walsh,
	selinux

On Wed, 2006-03-29 at 11:45 -0500, Stephen Smalley wrote:
> On Wed, 2006-03-29 at 11:29 -0500, Christopher J. PeBenito wrote:
> > My issue with that patch was that it had types hardcoded into the
> > constraints, violating encapsulation.  In the interim other parts of the
> > patch were fixed and resubmitted, but this piece got lost along the way.
> > I've committed it, using an attribute and an interface.
> 
> Ok, but it seems like something still isn't quite conceptually here in
> MCS - pam_selinux was removed from su, so su isn't supposed to switch
> levels, yet running su on FC5 does change to a fully ranged context,
> presumably via range_transition.  Which makes no sense to me at all
> given the intent of MCS.

Agreed.  My guess is that it is left over from when su did have
pam_selinux.  It probably should be removed.

-- 
Chris PeBenito
Tresys Technology, LLC
(410) 290-1411 x150


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-29 17:59       ` Christopher J. PeBenito
@ 2006-03-30  3:57         ` KaiGai Kohei
  2006-03-30 12:09           ` Russell Coker
  2006-03-30 12:31           ` Stephen Smalley
  0 siblings, 2 replies; 12+ messages in thread
From: KaiGai Kohei @ 2006-03-30  3:57 UTC (permalink / raw)
  To: Christopher J. PeBenito
  Cc: sds, KaiGai Kohei, Russell Coker, James Morris, Daniel J Walsh,
	selinux

Christopher J. PeBenito wrote:
> On Wed, 2006-03-29 at 11:45 -0500, Stephen Smalley wrote:
>> On Wed, 2006-03-29 at 11:29 -0500, Christopher J. PeBenito wrote:
>>> My issue with that patch was that it had types hardcoded into the
>>> constraints, violating encapsulation.  In the interim other parts of the
>>> patch were fixed and resubmitted, but this piece got lost along the way.
>>> I've committed it, using an attribute and an interface.
>> Ok, but it seems like something still isn't quite conceptually here in
>> MCS - pam_selinux was removed from su, so su isn't supposed to switch
>> levels, yet running su on FC5 does change to a fully ranged context,
>> presumably via range_transition.  Which makes no sense to me at all
>> given the intent of MCS.
> 
> Agreed.  My guess is that it is left over from when su did have
> pam_selinux.  It probably should be removed.

Does 'that patch' mean what Russell posted on 03/Feb, doesn't it?
I think there is another issue other than violating encapsulation.

+mlsconstrain process { transition dyntransition } (( h1 dom h2 ) or
+		( t1 == getty_t ) or ( t1 == init_t ) or ( t1 == initrc_t ) or
+		( t1 == kernel_t ));

It says an process can transit to more restricted categories only
by (h1 dom h2). I felt it's over restriction.
For example, a user login with 's0' cannot transit to any wider range
categories, even if he would be allowed to belong 's0-s0:c0.c2' at most.

I modified my desktop environment (FC5). At a moment, the following
configuration seems to me working fine.
Do you think it's a reasonable solution ?

1. remove range_transition for su/sudo
 'range_transition unconfined_t su_exec_t s0 - s0:c0.c255;'
 is not necessary for su, I also think.

2. add a constraint for changing user
 'constrain process { transition } (u1 == system_u) or (u1 == u2);'
 is necessary to restrict unbounded transition between categories.
 system_u is an exception because logind/sshd need to change user name.
 (It should be replaced by macros from the refpolicy sight.)

3. associate root with system_u
 Because transition from root to system_u is denied by constrain (2),
 starting or restarting any services by hand is impossible.
 Threfore, I associate root with same user for any daemons.

Thanks,

-------------------------------------------
[root@saba ~]# semanage login -l
Login Name        SELinux User       MLS/MCS Range
__default__       user_u             s0
root              system_u           God
tak               officer            Executive
ymj               officer            President

[root@saba ~]# semanage user -l
                MLS/       MLS/
SELinux User    MCS Level  MCS Range          SELinux Roles
officer         s0         President          system_r
root            s0         God                sysadm_r user_r system_r
system_u        s0         God                system_r
user_u          s0         God                sysadm_r user_r system_r

[root@saba ~]# semanage translation -l
Level                     Translation
s0
s0-s0:c0                  Manager
s0-s0:c0,c1               Executive
s0-s0:c0.c2               President
s0-s0:c0.c255             God
s0:c0                     Confidential
s0:c0.c1                  Secret
s0:c0.c2                  TopSecret


[tak@saba ~]$ id -Z
officer:system_r:unconfined_t:Executive
[tak@saba ~]$ runcon -u user_u /bin/bash
execvp: Permission denied
[tak@saba ~]$ runcon -l President /bin/bash
[tak@saba ~]$ id -Z
officer:system_r:unconfined_t:President
[tak@saba ~]$ runcon -l God /bin/bash
officer:system_r:unconfined_t:God is not a valid context

--
KaiGai Kohei <kaigai@kaigai.gr.jp>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-30  3:57         ` KaiGai Kohei
@ 2006-03-30 12:09           ` Russell Coker
  2006-03-30 12:31           ` Stephen Smalley
  1 sibling, 0 replies; 12+ messages in thread
From: Russell Coker @ 2006-03-30 12:09 UTC (permalink / raw)
  To: KaiGai Kohei
  Cc: Christopher J. PeBenito, sds, James Morris, Daniel J Walsh,
	selinux

On Thursday 30 March 2006 14:57, KaiGai Kohei <kaigai@kaigai.gr.jp> wrote:
> Christopher J. PeBenito wrote:
> > On Wed, 2006-03-29 at 11:45 -0500, Stephen Smalley wrote:
> >> On Wed, 2006-03-29 at 11:29 -0500, Christopher J. PeBenito wrote:
> >>> My issue with that patch was that it had types hardcoded into the
> >>> constraints, violating encapsulation.  In the interim other parts of
> >>> the patch were fixed and resubmitted, but this piece got lost along the
> >>> way. I've committed it, using an attribute and an interface.
> >>
> >> Ok, but it seems like something still isn't quite conceptually here in
> >> MCS - pam_selinux was removed from su, so su isn't supposed to switch
> >> levels, yet running su on FC5 does change to a fully ranged context,
> >> presumably via range_transition.  Which makes no sense to me at all
> >> given the intent of MCS.
> >
> > Agreed.  My guess is that it is left over from when su did have
> > pam_selinux.  It probably should be removed.
>
> Does 'that patch' mean what Russell posted on 03/Feb, doesn't it?
> I think there is another issue other than violating encapsulation.

Yes.

> +mlsconstrain process { transition dyntransition } (( h1 dom h2 ) or
> +		( t1 == getty_t ) or ( t1 == init_t ) or ( t1 == initrc_t ) or
> +		( t1 == kernel_t ));
>
> It says an process can transit to more restricted categories only
> by (h1 dom h2). I felt it's over restriction.
> For example, a user login with 's0' cannot transit to any wider range
> categories, even if he would be allowed to belong 's0-s0:c0.c2' at most.

That is intentional.  The reason for this is that a user may want to run a 
process with a sub-set of their access.  One reason for doing so is dealing 
with untrusted code.  Another reason is to avoid having to make manual 
decisions about labeling and avoiding accidental relabeling.  If the user has 
categories c0 and c1, then they can use s0:c0-s0:c0 for accessing files with 
sensitivity s0:c0, this prevents reading files with category c1 and also 
prevents accidentally reading data from a s0:c0 file and writing it to a s0 
file (files will be created as s0:c0 by default).

> I modified my desktop environment (FC5). At a moment, the following
> configuration seems to me working fine.
> Do you think it's a reasonable solution ?
>
> 1. remove range_transition for su/sudo
>  'range_transition unconfined_t su_exec_t s0 - s0:c0.c255;'
>  is not necessary for su, I also think.

Yes, I believe that this is required as su no longer supports changing roles.

> 2. add a constraint for changing user
>  'constrain process { transition } (u1 == system_u) or (u1 == u2);'
>  is necessary to restrict unbounded transition between categories.
>  system_u is an exception because logind/sshd need to change user name.
>  (It should be replaced by macros from the refpolicy sight.)

Currently when the administrator restarts sshd the sshd process gets the 
identity of the administrator (usually "root").  I don't think that we want 
to go down the path of changing the mlsconstrain rules when adding new user 
identities.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-30  3:57         ` KaiGai Kohei
  2006-03-30 12:09           ` Russell Coker
@ 2006-03-30 12:31           ` Stephen Smalley
  2006-04-02 13:55             ` KaiGai Kohei
  1 sibling, 1 reply; 12+ messages in thread
From: Stephen Smalley @ 2006-03-30 12:31 UTC (permalink / raw)
  To: KaiGai Kohei
  Cc: Christopher J. PeBenito, Russell Coker, James Morris,
	Daniel J Walsh, selinux

On Thu, 2006-03-30 at 12:57 +0900, KaiGai Kohei wrote:
> +mlsconstrain process { transition dyntransition } (( h1 dom h2 ) or
> +		( t1 == getty_t ) or ( t1 == init_t ) or ( t1 == initrc_t ) or
> +		( t1 == kernel_t ));
> 
> It says an process can transit to more restricted categories only
> by (h1 dom h2). I felt it's over restriction.
> For example, a user login with 's0' cannot transit to any wider range
> categories, even if he would be allowed to belong 's0-s0:c0.c2' at most.
> 
> I modified my desktop environment (FC5). At a moment, the following
> configuration seems to me working fine.
> Do you think it's a reasonable solution ?

The reason that we need the stronger restriction above is that there is
not a one-to-one mapping from Linux users to SELinux users, and we are
now relying on the seusers mapping and initial setup by login to bound
what is reachable by a given Linux user.  For example, two different
Linux users might be mapped to user_u but with different category sets
by seusers, and the underlying policy will authorize user_u for the
combination of those category sets so that both security contexts are
valid.  Thus, if we allow the process to later escalate its categories
to anything permitted in the security context by policy, it can escape
the per-Linux-user restrictions.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-29 16:29   ` Christopher J. PeBenito
  2006-03-29 16:45     ` Stephen Smalley
@ 2006-03-31 14:55     ` Russell Coker
  1 sibling, 0 replies; 12+ messages in thread
From: Russell Coker @ 2006-03-31 14:55 UTC (permalink / raw)
  To: Christopher J. PeBenito
  Cc: sds, KaiGai Kohei, James Morris, Daniel J Walsh, selinux

On Thursday 30 March 2006 03:29, "Christopher J. PeBenito" 
<cpebenito@tresys.com> wrote:
> > Hmmm...I had thought that Russell had introduced a mlsconstraint on
> > process transition and dyntransition permissions in policy/mcs, see the
> > earlier discussion on list in Feb.  But it appears to be missing from
> > the current policy, which does mean that an unconfined process can
> > easily escape its restrictions via runcon or newrole -l.  Seems to be
> > missing in FC5 too.
>
> My issue with that patch was that it had types hardcoded into the
> constraints, violating encapsulation.  In the interim other parts of the
> patch were fixed and resubmitted, but this piece got lost along the way.
> I've committed it, using an attribute and an interface.

http://people.redhat.com/rcoker/pol/

At the above URL I've put some packages for rawhide that fix this issue and a 
few other things.

Among the changes is the change to file contexts to separate /usr(/.*)? 
into /usr -d and /usr/.* etc.  This causes a relabel of most of the system on 
package install (so I'm not planning to put it in FC5), but gives a small 
performance increase on setfiles/restorecon etc once it's in place.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: MCS and unconfined_t
  2006-03-30 12:31           ` Stephen Smalley
@ 2006-04-02 13:55             ` KaiGai Kohei
  0 siblings, 0 replies; 12+ messages in thread
From: KaiGai Kohei @ 2006-04-02 13:55 UTC (permalink / raw)
  To: sds, Russell Coker
  Cc: Christopher J. PeBenito, James Morris, Daniel J Walsh, selinux

>>It says an process can transit to more restricted categories only
>>by (h1 dom h2). I felt it's over restriction.
>>For example, a user login with 's0' cannot transit to any wider range
>>categories, even if he would be allowed to belong 's0-s0:c0.c2' at most.
>>
>>I modified my desktop environment (FC5). At a moment, the following
>>configuration seems to me working fine.
>>Do you think it's a reasonable solution ?
> 
> 
> The reason that we need the stronger restriction above is that there is
> not a one-to-one mapping from Linux users to SELinux users, and we are
> now relying on the seusers mapping and initial setup by login to bound
> what is reachable by a given Linux user.

Hmm... a one-to-one mapping between Linux users and SELinux users might
indeed cause managements nightmare.
Please forget my previous proposition.

Thanks Russell for providing modified RPM package. Now I'm using it with
a bit modification removing range_transition of su_exec_t.

By th way, do you think an additional mlsconstrain is necessary for
security : {load_policy setenforce setbool} ?
It also makes MCS invalid, I think.

Thanks,
-- 
KaiGai Kohei <kaigai@kaigai.gr.jp>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 12+ messages in thread

end of thread, other threads:[~2006-04-02 13:55 UTC | newest]

Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-03-28 13:01 MCS and unconfined_t KaiGai Kohei
2006-03-28 21:27 ` Stephen Smalley
2006-03-29  0:36   ` Russell Coker
2006-03-29 12:35     ` Stephen Smalley
2006-03-29 16:29   ` Christopher J. PeBenito
2006-03-29 16:45     ` Stephen Smalley
2006-03-29 17:59       ` Christopher J. PeBenito
2006-03-30  3:57         ` KaiGai Kohei
2006-03-30 12:09           ` Russell Coker
2006-03-30 12:31           ` Stephen Smalley
2006-04-02 13:55             ` KaiGai Kohei
2006-03-31 14:55     ` Russell Coker

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.