All of lore.kernel.org
 help / color / mirror / Atom feed
From: Daniel J Walsh <dwalsh@redhat.com>
To: Stephen Smalley <sds@tycho.nsa.gov>
Cc: Klaus Weidner <klaus@atsec.com>,
	Joshua Brindle <jbrindle@tresys.com>,
	James Antill <jantill@redhat.com>,
	Linda Knippers <linda.knippers@hp.com>,
	redhat-lspp <redhat-lspp@redhat.com>,
	SE Linux <selinux@tycho.nsa.gov>
Subject: Re: [redhat-lspp] Re: [PATCH 2/3] Re: MLS enforcing PTYs,	sshd,	and newrole
Date: Fri, 05 Jan 2007 11:24:02 -0500	[thread overview]
Message-ID: <459E7BA2.1050109@redhat.com> (raw)
In-Reply-To: <1168012584.18961.161.camel@moss-spartans.epoch.ncsc.mil>

newrole patch. for checking securetty.


diff --exclude-from=exclude --exclude POTFILES.in --exclude='*.po' 
--exclude='*.pot' -N -u -r nsapolicycoreutils/newrole/newrole.c 
policycoreutils-1.33.8/newrole/newrole.c
--- nsapolicycoreutils/newrole/newrole.c        2007-01-04 
17:01:41.000000000 -0500
+++ policycoreutils-1.33.8/newrole/newrole.c    2007-01-05 
11:17:36.000000000 -0500
@@ -733,6 +734,7 @@
                                        security_context_t *new_context,
                                        int *preserve_environment)
 {
+       int i;                  /* index for open file descriptors */
        int flag_index;         /* flag index in argv[] */
        int clflag;             /* holds codes for command line flags */
        char *role_s = NULL;    /* role spec'd by user in argv[] */
@@ -741,6 +743,8 @@
        char *level_s = NULL;   /* level spec'd by user in argv[] */
        char *range_ptr = NULL;
        security_context_t new_con = NULL;
+       security_context_t tty_con = NULL;
+       int securetty=0;
        context_t context = NULL; /* manipulatable form of new_context */
        const struct option long_options[] = {
                {"role", 1, 0, 'r'},
@@ -793,6 +797,18 @@
                                        "specified\n"));
                                return -1;
                        }
+                       for (i=0; i < 3; i++) {
+                               securetty=0;
+                               if (fgetfilecon(i,&tty_con) >= 0) {
+                                       securetty = 
(selinux_check_securetty_context(tty_con) == 1);
+                                       freecon(tty_con);
+                               }
+                               if (!securetty) {
+                                       fprintf(stderr, "Error: you are 
not allowed to change levels on a non secure terminal\n");
+                                       return -1;
+                               }
+                       }
+
                        level_s = optarg;
                        break;
                default:


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  parent reply	other threads:[~2007-01-05 16:24 UTC|newest]

Thread overview: 61+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2006-10-12  7:33 MLS enforcing PTYs, sshd, and newrole Klaus Weidner
2006-10-12 10:25 ` Russell Coker
2006-10-12 14:48   ` Klaus Weidner
2006-10-12 15:16     ` Michael C Thompson
2006-10-12 16:54     ` [redhat-lspp] " Casey Schaufler
2006-10-12 15:37   ` Casey Schaufler
2006-10-19 13:21     ` [redhat-lspp] " Daniel J Walsh
2006-10-19 13:30       ` Stephen Smalley
2006-10-19 14:06         ` Daniel J Walsh
2006-10-19 14:32           ` Stephen Smalley
2006-10-21  4:37           ` Casey Schaufler
2006-10-23 16:14         ` James Antill
2006-10-23 16:39           ` Casey Schaufler
2006-10-23 16:45             ` Paul Moore
2006-10-23 18:41               ` Casey Schaufler
2006-10-24 20:37           ` James Antill
2006-10-25  0:19             ` George C. Wilson
2006-10-25 11:48             ` Stephen Smalley
2006-10-25 12:22               ` Stephen Smalley
2006-10-25 13:50                 ` James Antill
2006-10-25 13:59                   ` Stephen Smalley
2006-10-25 19:15                     ` James Antill
2006-10-25 19:24                       ` Stephen Smalley
     [not found]                         ` <1161970810.29689.88.camel@code.and.org>
     [not found]                           ` <1161974293.1306.167.camel@moss-spartans.epoch.ncsc.mil>
2006-10-30 20:03                             ` [PATCH 1/3] " James Antill
2006-10-30 20:16                               ` [PATCH 2/3] " James Antill
2006-10-30 20:22                                 ` [PATCH 3/3] " James Antill
2006-10-31 14:23                                 ` [PATCH 2/3] " Stephen Smalley
2006-10-31 14:24                                   ` Stephen Smalley
2006-10-31 15:00                                     ` James Antill
2006-10-31 15:11                                       ` Stephen Smalley
2006-10-31 16:04                                         ` James Antill
2006-10-31 16:21                                           ` Stephen Smalley
2006-10-31 18:33                                             ` James Antill
2006-11-01 12:36                                               ` Stephen Smalley
2007-01-04 21:34                                                 ` [redhat-lspp] " Daniel J Walsh
2007-01-04 21:57                                                   ` Linda Knippers
2007-01-04 22:19                                                     ` Daniel J Walsh
2007-01-04 23:19                                                       ` Linda Knippers
2007-01-05  1:07                                                         ` Klaus Weidner
2007-01-05  3:05                                                           ` Joshua Brindle
2007-01-05  3:33                                                             ` Klaus Weidner
2007-01-05  3:35                                                               ` Joshua Brindle
2007-01-05  4:01                                                                 ` Klaus Weidner
2007-01-05 15:56                                                                   ` Stephen Smalley
2007-01-05 16:23                                                                     ` Daniel J Walsh
2007-01-05 16:24                                                                     ` Daniel J Walsh [this message]
2007-01-05 17:05                                                                       ` Daniel J Walsh
2007-01-05 18:34                                                                         ` Stephen Smalley
2007-01-05 18:43                                                                       ` Stephen Smalley
2007-01-05 15:55                                                                 ` Stephen Smalley
2007-01-04 22:13                                                   ` Casey Schaufler
2007-01-04 22:20                                                     ` Daniel J Walsh
2006-10-31 14:20                               ` [PATCH 1/3] " Stephen Smalley
2006-10-25 21:36                       ` [redhat-lspp] " Stephen Smalley
2006-10-26 14:09                         ` Daniel J Walsh
2006-10-19 13:32       ` Steve Grubb
2006-10-19 13:39         ` Stephen Smalley
2006-10-20  7:00       ` Russell Coker
2006-10-27 15:36         ` Valdis.Kletnieks
2006-10-27 23:04           ` Russell Coker
2006-10-31 14:29             ` Stephen Smalley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=459E7BA2.1050109@redhat.com \
    --to=dwalsh@redhat.com \
    --cc=jantill@redhat.com \
    --cc=jbrindle@tresys.com \
    --cc=klaus@atsec.com \
    --cc=linda.knippers@hp.com \
    --cc=redhat-lspp@redhat.com \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.