From: Daniel J Walsh <dwalsh@redhat.com>
To: "Christopher J. PeBenito" <cpebenito@tresys.com>
Cc: SE Linux <selinux@tycho.nsa.gov>
Subject: Re: Latest Diffs
Date: Tue, 14 Nov 2006 15:11:48 -0500 [thread overview]
Message-ID: <455A2304.5090709@redhat.com> (raw)
In-Reply-To: <1162328409.31675.131.camel@sgc.columbia.tresys.com>
http://people.redhat.com/dwalsh/SELinux/policy-20061106.patch.gz
Christopher J. PeBenito wrote:
> On Tue, 2006-10-24 at 11:00 -0400, Daniel J Walsh wrote:
>
>> flow_in flow_out changes for labeled networking. Not sure if these are
>> still needed.
>>
>
> Dropped this since labeled networking is still up in the air.
>
>
I need to leave it in since I have already released it and any loadable
modules that have been created require it.
>> Added use_lpd_server boolean to eliminate some not needed permissions
>> from cups versions of lpr commands.
>>
>
> I would rather split out the lpr portions out to a lpr module that would
> function like the mta module. Then the rules that aren't common for lpd
> and cups can go into optionals.
>
>
Ok, when that I happens I will switch.
>> Added a userdom_executable_file type so that we can change the ability
>> to execute all commands in MLS, to only be allowed to execute commands
>> that an admin would legitimately like to execute without transition.
>>
>
> I don't like the implementation of this; the idea of a user executable
> doesn't make sense to me. It may be better defining this concept in
> terms of executables an admin wouldn't execute.
>
>
I am trying to differentiate between executing commands like tools that
run in a domain and outside a domain cvs, rsync, rpm from always
confined domains.
The requirement for this comes from MLS policy, we want to have a
failure when sysadm tries to run a SELinux utility.
So he executes setsebool he gets a exec failure rather then a partial
success.
> In addition, the corecmd_exec_all_executables() change breaks the
> meaning of the interface.
>
>
>> Redhat's Fedora Extras apd-get and apt-shell run as rpm.
>>
>
> Can't add this because it causes conflicting file contexts if the dpkg
> module is included.
>
>
I think we need a rewrite of the dpkg te file so on redhat platforms
dbkg_t is aliased to rpm_t.
> Dropped mcs_killall(rpm_script_t) and mcs_ptrace_all(rpm_script_t) since
> it does not have the requisite TE permissions.
>
>
Since these are unconfined domains, they do have the allows. This
prevents the mcs constraint from firing.
>> IBM requests javaws and bin under /opt/ibm/java2-ppc64-50/jre be labeled
>> java_exec_t
>>
>
> Dropped the other change; I'm trying to stay away from broad
> specifications since it makes more problems for sorting.
>
>
>> mv dosfs_t to nfs_t needs to work.
>>
>
> You have fs_associate_tmpfs(noxattrfs), which won't do it. My guess is
> that you want something like fs_associate_noxattr(noxattrfs).
>
>
Yes, changed in this update.
>> httpd needs to be able to rotatelogs
>>
>
> The problem with this is that it would allow apache to delete its logs.
> I suggest trying rotatelogs labeled as logrotate_exec_t instead.
>
>
apache can not delete logs, only httpd_rotatelogs_t can. We could
combine the domains together but that would give /usr/sbin/rotatelogs
more power, currently it can only touch apache logs.
>> Major changes to crontab_t to transition to user_tmp_t. Why do we have
>> a user_crond_t, would just transitioning to user_t make more sense?
>>
>
> I don't know the original intention, but my guess is to be a subset of
> the user domain.
>
>
>> Fixed for oddjob_mkhomedir_t
>>
>
> Why is domain_subj_id_change_exemption(oddjob_t) needed?
>
>
oddjob runs jobs on behalf of helper apps, It asks the kernel how to
run them.
If I restart oddjob by hand, it will be running as user_u:system_r:oddjob_t
When it asks the kernel what to run jobs on behalf of
system_u:system_r:ricci_t, it
gets back system_u:system_r:ricci_modcluster_t, which causes this access
violation.
>> squid wants to rw_tmpfs for diskd mode.
>>
>
> I'm wondering if this is tmpfs_t because there is no squid_tmpfs_t+type
> transition, or if it is because the machine is targeted.
>
Not sure, this was in the old policy as well. Never used squid.
>
>> getty needs sys_admin
>>
>
> I find this very questionable, and the bug you mentioned doesn't have
> any good information.
>
> Why does sasl need compute_av?
>
>
I think because it is running through pam and this causes the compute_av
> What program(s) have a dyntrans from unconfined to unconfined_execmem?
>
>
on ia32el you need to transition 32 bit apps from unconfined_t to
unconfined_execmem_t.
The kernel steps into do this so there is no transition.
============================================================
New changes.
amanda, krb5kdc, postfix_smtp, swat, telnetd, mount - All want to read
netlink_route
Broke allo_mount_anyfiles boolean into allow_mount_anydir and
allow_mount_anydir, So you can mount at the dir level or a bind_mount
Added boolean to allow daemons to dump core in /.
xen wants to read/write raw disks. Currenly we are allowing this via a
boolean. Eventually we want to force users to label devices as
xen_image_t. Didn't make it in to RHEL5. :^(
logwatch wants to search sysfs
prelink wants to execute privs on exe's in homedir.
rpm wants to chat with hal
remove big ugly todo at the bottom or rpm.te - They all looked broken.
Broke reserved ports in to hi_reserved_port_t and reserved_port_t, this
gives us better security to allow bindresvport, but protect ports
1-511. Current implementation was broken, in that callers to
bindresvport were failing on non-defined ports > 512.
Added netsupport, ocsp ports.
New devices
/dev/hpet
/dev/kmsg
/dev/raw1394.* (Bad def)
/dev/snapshot
/dev/xvc*
Added aide policy
New apache cache dir
+/var/cache/mod_proxy(/.*)?
gen_context(system_u:object_r:httpd_cache_t,s0)
New rules for apache.
I think crontab policy is good, to go.
cron wants to look at login keys? Might be a leak?
cupsd changes to allow it to run in MLS.
Fix policy for dbus running in chroot under bind.
Hal has a new directory /var/lib/hal
Lots of changes to kerberos to allow it to work with Public Key
Infrastructure.
Dontaudit mqueue_spool_t:dir - Talked about in other emails.
Oddjob wants to signal itself.
Procmail using nfs or samba shares
swat needs additional privs
snmp wants to look at homedir. Needs dontaudit
In order to get rhgb and X to work together had to add
+ allow $1 xdm_xserver_t:process siginh;
xdm opens stdout/stderr to an xdmerrors file and then hands that to
subprocesses. If the
subprocesses don't reopen stderr/stdout and eventually run a confined
domain, the domain will
generate avc messages
Some domains try to lock the wtmp file when they update it.
pam_console reads /var when it is mislabled. This probably could be
surrounded by a hide_broken_apps boolean
We don't want mkswap running as fsadm_exec_t. It has SELinux awareness
in it, so this causes problems.
A bunch of textrel_shlib_t changes
libraries.te has a useless hide_broken_symptoms
/var/lib/mutlipath directory needs context
We have had requests to allow /var/log to be mounted on.
Many fixes for clvmd and additional lvm_var_lib_t context
Lots of changes for lvm_t, mainly tested with new management platform
for Red Hat (ricci, and conga)
New locale directory under /usr/share/X11/locale
depmod needs to be able to delete kernel modules.
mdadm can create physical devices.
selinux utilities needs to be able to create default_context files
initscripts running setsebool need to transition.
newrole needs privs to run pam/login stuff.
realplayer context wrong
Additional unconfined_execmem_exec_t context
oddjob wants to chat with unconfined domain.
fixes for gen_require in userdomain interfaces.
secadm needs to read audit.log, and run aide
More xen changes.
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2006-11-14 20:11 UTC|newest]
Thread overview: 143+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-10-24 15:00 Latest Diffs Daniel J Walsh
2006-10-31 21:00 ` Christopher J. PeBenito
2006-11-14 20:11 ` Daniel J Walsh [this message]
2006-11-15 9:49 ` Russell Coker
2006-11-15 13:39 ` Daniel J Walsh
2006-11-15 17:33 ` Russell Coker
2006-11-16 13:49 ` Christopher J. PeBenito
2006-11-17 13:07 ` Russell Coker
2006-11-17 18:33 ` Joshua Brindle
2006-11-17 21:27 ` Russell Coker
-- strict thread matches above, loose matches on Subject: below --
2007-01-03 16:54 Latest diffs Daniel J Walsh
2007-01-03 21:37 ` Klaus Weidner
2007-01-03 21:48 ` Klaus Weidner
2007-01-08 17:48 ` Christopher J. PeBenito
2007-01-09 4:47 ` Klaus Weidner
2007-01-03 22:05 ` Russell Coker
2007-01-04 13:33 ` Steve G
2007-01-04 15:47 ` Klaus Weidner
2007-01-04 16:23 ` Russell Coker
2007-01-04 16:47 ` Casey Schaufler
2007-01-04 17:07 ` Russell Coker
2007-01-04 17:24 ` Casey Schaufler
2007-01-04 18:27 ` Erich Schubert
2006-09-29 19:05 latest diffs Daniel J Walsh
2006-09-20 16:12 Latest diffs Daniel J Walsh
2006-09-21 13:45 ` Christopher J. PeBenito
2006-09-21 14:06 ` Daniel J Walsh
2006-09-21 14:34 ` Christopher J. PeBenito
2006-09-21 16:33 ` Karl MacMillan
2006-09-21 18:05 ` Christopher J. PeBenito
2006-09-21 14:08 ` Mikel L. Matthews
2006-09-21 14:49 ` Joshua Brindle
2006-09-21 15:10 ` Mikel L. Matthews
2006-09-21 15:18 ` Stephen Smalley
2006-09-21 15:40 ` Joe Nall
2006-09-21 15:47 ` Klaus Weidner
2006-09-21 16:08 ` Casey Schaufler
2006-09-22 17:13 ` Christopher J. PeBenito
2006-09-22 20:30 ` Daniel J Walsh
2006-09-25 18:51 ` Christopher J. PeBenito
2006-09-25 19:10 ` Daniel J Walsh
2006-09-26 10:41 ` Russell Coker
2006-09-26 13:13 ` Christopher J. PeBenito
2006-09-26 13:21 ` Russell Coker
2006-09-26 14:01 ` Christopher J. PeBenito
2006-09-23 2:22 ` Russell Coker
2006-09-05 21:06 Latest Diffs Daniel J Walsh
2006-09-06 16:33 ` Christopher J. PeBenito
2006-08-02 17:33 Latest diffs Daniel J Walsh
2006-06-20 20:19 Daniel J Walsh
2006-06-21 18:31 ` Christopher J. PeBenito
2006-06-12 19:32 Daniel J Walsh
2006-06-12 21:39 ` Christopher J. PeBenito
2006-06-12 21:47 ` Christopher J. PeBenito
[not found] <44863F06.90206@comcast.net>
2006-06-07 17:46 ` Christopher J. PeBenito
2006-05-18 15:56 Daniel J Walsh
2006-05-19 14:04 ` Christopher J. PeBenito
2006-05-19 14:13 ` Daniel J Walsh
2006-05-19 17:40 ` Christopher J. PeBenito
2006-05-19 18:25 ` Daniel J Walsh
[not found] <445767D1.3040406@redhat.com>
2006-05-02 15:19 ` Christopher J. PeBenito
[not found] ` <44579740.4010708@redhat.com>
2006-05-02 17:57 ` Christopher J. PeBenito
2006-04-20 18:57 Chad Hanson
2006-04-20 18:06 Daniel J Walsh
2006-04-20 18:17 ` Christopher J. PeBenito
2006-04-19 3:16 Daniel J Walsh
2006-04-19 15:34 ` Christopher J. PeBenito
2006-02-20 22:19 Daniel J Walsh
2006-02-23 14:18 ` Christopher J. PeBenito
2006-02-09 18:39 Daniel J Walsh
2006-02-13 22:08 ` Christopher J. PeBenito
2006-02-14 14:01 ` Daniel J Walsh
2006-02-14 19:03 ` Joshua Brindle
2006-02-16 19:30 ` Christopher J. PeBenito
2006-02-01 13:33 Latest Diffs Daniel J Walsh
2006-02-06 22:50 ` Christopher J. PeBenito
2006-01-19 19:16 Daniel J Walsh
2006-01-19 23:18 ` Christopher J. PeBenito
2006-01-20 13:56 ` Daniel J Walsh
2006-01-20 14:53 ` Christopher J. PeBenito
2006-01-17 22:50 Latest diffs Daniel J Walsh
2006-01-18 14:26 ` Christopher J. PeBenito
2006-01-10 14:15 Daniel J Walsh
2006-01-11 15:55 ` Christopher J. PeBenito
2005-12-13 22:07 Latest Diffs Daniel J Walsh
2005-12-14 15:35 ` Christopher J. PeBenito
2005-12-13 15:48 Latest diffs Daniel J Walsh
2005-12-13 20:43 ` Christopher J. PeBenito
2005-12-13 21:56 ` Daniel J Walsh
2005-09-16 17:43 Latest Diffs Daniel J Walsh
2005-10-20 20:23 ` James Carter
2005-08-15 14:29 Daniel J Walsh
2005-07-19 21:12 Latest diffs Daniel J Walsh
2005-07-19 22:16 ` Ivan Gyurdiev
2005-07-20 15:02 ` Daniel J Walsh
2005-07-20 18:41 ` Ivan Gyurdiev
2005-07-20 19:37 ` Daniel J Walsh
2005-07-20 20:56 ` Ivan Gyurdiev
2005-07-20 0:05 ` Casey Schaufler
2005-07-20 2:03 ` Frank Mayer
2005-07-20 2:29 ` Casey Schaufler
2005-07-20 2:49 ` Daniel J Walsh
2005-07-20 3:33 ` Casey Schaufler
2005-07-12 20:24 Latest Diffs Daniel J Walsh
2005-07-08 1:11 Latest diffs Daniel J Walsh
2005-05-28 5:15 latest diffs Daniel J Walsh
2005-04-27 21:17 Latest diffs Daniel J Walsh
2005-04-14 20:49 Daniel J Walsh
2005-04-20 13:17 ` Russell Coker
2005-04-21 1:41 ` Daniel J Walsh
2005-04-21 12:32 ` Daniel J Walsh
2005-02-10 23:24 Daniel J Walsh
[not found] <1106940328.32737.120.camel@moss-spartans.epoch.ncsc.mil>
2005-01-28 19:48 ` Daniel J Walsh
2005-02-01 18:45 ` James Carter
2005-02-01 19:48 ` Stephen Smalley
2005-02-01 21:41 ` Ivan Gyurdiev
2005-02-02 12:57 ` Stephen Smalley
2005-02-02 13:08 ` Stephen Smalley
2005-02-02 13:17 ` Stephen Smalley
2005-02-02 13:32 ` Daniel J Walsh
2005-02-04 0:58 ` Ivan Gyurdiev
2005-02-04 12:23 ` Stephen Smalley
2005-02-04 12:42 ` Ivan Gyurdiev
2005-02-04 12:50 ` Stephen Smalley
2005-02-04 13:59 ` Daniel J Walsh
2005-02-04 14:10 ` Stephen Smalley
2005-02-04 15:28 ` Ivan Gyurdiev
2005-02-07 7:53 ` Ivan Gyurdiev
2005-02-07 19:33 ` Richard Hally
2005-02-07 19:34 ` Stephen Smalley
2005-02-10 15:16 ` James Carter
2004-10-25 21:40 latest diffs Daniel J Walsh
2004-10-27 14:35 ` James Carter
2004-10-20 15:24 Latest diffs Daniel J Walsh
2004-10-20 19:18 ` Colin Walters
2004-10-23 4:24 ` Russell Coker
2004-08-25 15:21 Latest Diffs Daniel J Walsh
2004-08-27 13:52 ` James Carter
2004-08-28 12:55 ` Russell Coker
2004-08-30 20:23 ` James Carter
2004-08-28 12:46 ` Russell Coker
2004-08-30 13:54 ` Daniel J Walsh
2004-08-30 15:50 ` Stephen Smalley
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=455A2304.5090709@redhat.com \
--to=dwalsh@redhat.com \
--cc=cpebenito@tresys.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.