All of lore.kernel.org
 help / color / mirror / Atom feed
From: Daniel J Walsh <dwalsh@redhat.com>
To: Ian jonhson <jonhson.ian@gmail.com>, SE Linux <selinux@tycho.nsa.gov>
Subject: Re: About the SELinux in FedoraCore
Date: Mon, 27 Aug 2007 11:53:32 -0400	[thread overview]
Message-ID: <46D2F37C.6030209@redhat.com> (raw)
In-Reply-To: <8f34198c0708260055t3206d9eajb5e51f9274e99f57@mail.gmail.com>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ian jonhson wrote:
> It sounds very good.
> 
> Can I change the context of object in user mode dynamically? What I
> mean is that I can fork some processes and allocate different context
> (or domain context) to them; so they can create their own files
> (object) holding different file context.
> 
> I google some references about the selinux in internet, and found many
> cases can be dealt with by Apol, and maybe it also needs to compile
> the policy file, right? Is it possible that I build a daemon to
> allocate different domain context to its child processes? how to do ?
Yes if selinux policy allows, programs can change the context of
processes that they fork/exec.  You can also just change the context of
the current running process, but this is not as secure.  You should ask
your questions on the selinux@tycho.nsa.gov list
> 
> Thank you very much for  your advices.
> 
> Ian
> 
> 
> 
> On 8/25/07, Daniel J Walsh <dwalsh@redhat.com> wrote:
> Ian jonhson wrote:
>>>> Dear Daniel,
>>>>
>>>>
>>>> I studied your wiki of FedoraCore, but still don't know how to start
>>>> my jobs. What I want to do is:
>>>>
>>>> With the help of SELinux,
>>>>
>>>> 1. add some identity tag in subject's processes. The tag maybe is a
>>>> integer, which can be set in SID of SELINUX.
>>>>
> SID are inside the kernel.  What you call tags are called security
> contexts "strings" are used for processes and files/directories.  When
> they are associated with a process they are sometimes called a domain.
> When they are with a physical object they are called a file context.
> 
>>>> 2. the tag mentioned above can be stored in local filesystem, if the
>>>> subject's processes create his files or temporary files. In other
>>>> words, objects (here, it is files) can hold a tag identified who
>>>> created them.
>>>>
> Well in SELinux there are four parts of the security context.  The
> SELinux user will be associated with any file created by the process
> that creates it.  But there is also a file context.  So as an example
> 
> system_u:system_r:smbd_t:s0 is the default security context of the
> running sampa process.  We can set it up so that it has read/only access
> to files/directories  labeled system_u:object_r:public_content_rw_t:s0
> root:system_r:httpd_t:s0 is the process domain of the apache server, if
> it had been restarted by the root SELinux user.  It could be setup with
> read/write access to system_u:object_r:public_content_rw_t:s0, depending
> on how the policy is setup.  If apache creates a file in a directory
> labeled system_u:object_r:public_content_rw_t:s0, it will get a label
> of root:object_r:public_content_rw_t:s0.
> 
> If a third process say named running as system_u:object_r:named_t:s0
> tries to read this file, selinux will deny it.
> 
> 
> All three of these processes had UID=0
> 
> Read danwalsh.livejournal.com from the beginning for a full discussion
> of how SELinux works.
> 
>>>> 3. when two processes with different tag access a file holding owner's
>>>> tag, the SELINUX can distinguish the processed with different tag and
>>>> do access control.
>>>>
>>>> The two processes with different tag can have different uid or,
>>>> evenly, same uid, but their tags are not the same.
>>>>
>>>> How to implement these functionalities?
>>>>
>>>> Could you give me some advices?
>>>>
>>>> Thanks advance,
>>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFG0vN7rlYvE4MpobMRAgN/AJ9iLQnUYhuEhmuYZhEKPzZwWM/ItgCfSOBg
i30HYwWoxY3awdVUGMXtvmI=
=ch01
-----END PGP SIGNATURE-----

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

       reply	other threads:[~2007-08-27 15:53 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <8f34198c0708250022v194622eaqb7926a1ef3508eeb@mail.gmail.com>
     [not found] ` <46CFED5B.5010607@redhat.com>
     [not found]   ` <8f34198c0708260055t3206d9eajb5e51f9274e99f57@mail.gmail.com>
2007-08-27 15:53     ` Daniel J Walsh [this message]
2007-08-28  5:00       ` About the SELinux in FedoraCore Ian jonhson
2007-08-28 13:31         ` Daniel J Walsh

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=46D2F37C.6030209@redhat.com \
    --to=dwalsh@redhat.com \
    --cc=jonhson.ian@gmail.com \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.