All of lore.kernel.org
 help / color / mirror / Atom feed
* role dominance
@ 2008-01-07 15:41 Joshua Brindle
  2008-01-07 17:53 ` Stephen Smalley
  0 siblings, 1 reply; 8+ messages in thread
From: Joshua Brindle @ 2008-01-07 15:41 UTC (permalink / raw)
  To: SE Linux, Stephen Smalley

While working on policyrep we've found that role dominance is pretty 
difficult to implement correctly, and apparently there is some ambiguity 
about how it works. The main problem we are running into now is that 
converting the role bitmaps of an old module (compatibility) back to a 
role dominance statement is very difficult.

Also it seems like noone has really used role dominance. During 
conversations about it here Chris PeBenito suggests that he wants 
something like it for refpolicy but a role attribute kind of system may 
be much simpler and easier to implement/understand.

Thoughts?


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 8+ messages in thread
* Re: role dominance
@ 2002-11-27 14:48 Stephen D. Smalley
  0 siblings, 0 replies; 8+ messages in thread
From: Stephen D. Smalley @ 2002-11-27 14:48 UTC (permalink / raw)
  To: guttman; +Cc: selinux, giorgio.zanin, selinux-list


> role dominance seems not to be used in the current example policy.  I
> had the impression that you were planning to deprecate it or remove
> it.   Is that wrong?  

We don't use role dominance in the example policy, but the example
policy only defines a few roles and those roles are relatively orthogonal.
If people start defining more complex sets of roles, then they may wish
to define role dominance hierarchies.  For analysis purposes, you can
just expand the role dominance relation into the user-role and role-domain
relations.

The present RBAC language and logic is very simple; I would expect that
people might want to eventually expand it to directly represent more
complex relationships among roles, drawing from prior work that has
been done on RBAC models.  Our own focus has been more on the TE component.

--
Stephen Smalley, NSA
sds@epoch.ncsc.mil


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 8+ messages in thread
* Re: role dominance
@ 2002-11-27 14:07 Stephen D. Smalley
  2002-11-27 14:19 ` Joshua D. Guttman
  0 siblings, 1 reply; 8+ messages in thread
From: Stephen D. Smalley @ 2002-11-27 14:07 UTC (permalink / raw)
  To: selinux, giorgio.zanin


> As explained in SELinux documentation, a role automatically inherits the 
> domains authorized for any role that it dominates in the hierarchy. What 
> I don't know is about user-roles associations. Consider the following 
> situation:
> 
> U1: SELinux user identity
> R1, R2: roles
> T1, T2: types
> 
> R1 dominates R2
> R1 is authorized for type T1 and R2 for type T2
> 
> it follows R1 is authorized for type T2 too.
> 
> If U1 is authorized for role R1, certainly (U1, R1, T2) is a valid 
> security context, because of the dominance relation between R1 and R2. 
> What about (U1,R2,T2)? In other words, if a role dominates another role 
> and a user is explicitly authorized to the dominant role, is then the 
> user implicitly authorized to the dominated role?

Yes, the user is implicitly authorized for the dominated role, and (U1,R2,T2) 
would be a valid security context.  

--
Stephen Smalley, NSA
sds@epoch.ncsc.mil


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2008-01-08 20:48 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-01-07 15:41 role dominance Joshua Brindle
2008-01-07 17:53 ` Stephen Smalley
2008-01-07 18:22   ` Christopher J. PeBenito
2008-01-07 18:28   ` Joshua Brindle
2008-01-08 20:48     ` Joshua Brindle
  -- strict thread matches above, loose matches on Subject: below --
2002-11-27 14:48 Stephen D. Smalley
2002-11-27 14:07 Stephen D. Smalley
2002-11-27 14:19 ` Joshua D. Guttman

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.