All of lore.kernel.org
 help / color / mirror / Atom feed
From: Daniel J Walsh <dwalsh@redhat.com>
To: Stephen Smalley <sds@tycho.nsa.gov>
Cc: James Morris <jmorris@namei.org>, Ken YANG <spng.yang@gmail.com>,
	SELinux List <selinux@tycho.nsa.gov>
Subject: Re: can not boot with strict policy
Date: Mon, 23 Apr 2007 14:14:52 -0400	[thread overview]
Message-ID: <462CF79C.5080804@redhat.com> (raw)
In-Reply-To: <1177350508.24282.58.camel@moss-spartans.epoch.ncsc.mil>

Stephen Smalley wrote:
> On Mon, 2007-04-23 at 13:42 -0400, James Morris wrote:
>   
>> On Mon, 23 Apr 2007, Stephen Smalley wrote:
>>
>>     
>>> /lib/libsepol.so.1 should be labeled with shlib_t, not lib_t.  Under
>>> targeted policy, they are aliases for one another.  Under strict, they
>>> are separate types.
>>>
>>> Boot with "enforcing=0 single" to come up permissive into single-user
>>> mode, then run /sbin/fixfiles relabel -F to forcible relabel everything,
>>> then reboot.
>>>       
>> I wonder if we could automate this, so that the autorelabel is also run 
>> on boot if you switch between different types of policy.
>>     
>
> rc.sysinit does have autorelabel support, but that won't help in this
> case, because here everything (including /sbin/init) will fail to run
> due to the inability to execute shared libs.  It would have to happen
> from early userspace or /sbin/init before loading policy and switching
> to enforcing mode.
>
>   
So the real question, is there much value with the division between 
lib_t and shlib_t.
When dealing with strict policy, shared libraries were always getting 
mislabeled as lib_t, and causing problems, for little security advantage. 

As we remove the differences between strict and targeted, I don't intend 
to get rid of lib_t == shlib_t.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2007-04-23 18:14 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-04-23 12:09 can not boot with strict policy Ken YANG
2007-04-23 15:01 ` Stephen Smalley
2007-04-23 17:42   ` James Morris
2007-04-23 17:48     ` Stephen Smalley
2007-04-23 18:14       ` Daniel J Walsh [this message]
2007-04-24  8:11         ` Ken YANG
2007-04-24 12:23           ` Daniel J Walsh
2007-04-24 12:26           ` Christopher J. PeBenito
2007-04-25 12:19             ` Ken YANG
2007-04-24 12:23         ` Christopher J. PeBenito
2007-04-24 12:59           ` Stephen Smalley
2007-04-24 13:08           ` Daniel J Walsh
2007-04-26  6:45     ` Russell Coker
2007-04-27 10:48       ` Ken YANG
2007-04-24  7:10 ` Russell Coker

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=462CF79C.5080804@redhat.com \
    --to=dwalsh@redhat.com \
    --cc=jmorris@namei.org \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    --cc=spng.yang@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.