From: Murray McAllister <mmcallis@redhat.com>
To: Valdis.Kletnieks@vt.edu
Cc: SE Linux <selinux@tycho.nsa.gov>
Subject: Re: user guide drafts: "Working with SELinux" sections
Date: Fri, 03 Oct 2008 10:08:44 +1000 [thread overview]
Message-ID: <48E5628C.1070008@redhat.com> (raw)
In-Reply-To: <60227.1222833628@turing-police.cc.vt.edu>
Valdis.Kletnieks@vt.edu wrote:
> On Wed, 01 Oct 2008 10:19:15 +1000, Murray McAllister said:
>
>>> Erm. What *exactly* produces that entry in /var/log/messages?
>> Are you referring to SELinux denying access or setroubelshoot-server?
>>> AVC stuff ends up in auditd. Or is this just because the setroubleshoot
>>> RPMs aren't *quite* as mandatory as you noted above, and I don't see those
>>> messages because I don't have them installed *and enabled*? (Gotta watch
>>> out for those pesky 'chkconfig off' ;)
>> I thought I tried this before writing (thinking it only went into
>> audit.log if setroubleshoot-server was installed, otherwise it would go
>> to /var/log/messages). I will fix the text up to reflect this...
>
> AVC's go into dmesg (and wherever your syslog dumps that) if auditd isn't running.
>
> AVC's goes into audit.log if auditd *is* running.
>
> If setroubleshoot is running, it reads audit.log and pretty-prints them
> into the syslog.
I added a small section:
Which Log File is Used
In Fedora 10, the setroubleshoot-server and audit packages are installed
by default. These packages include the setroubleshootd and auditd
daemons respectively. These daemons run by default.
SELinux denial messages, such as the following, are written to
/var/log/audit/audit.log by default:
[example message]
Also, if setroubleshootd is running, which is it by default, denial
messages from /var/log/audit/audit.log are translated to an
easier-to-read form and sent to /var/log/messages:
[example message]
Denial messages are sent to a different location, depending on which
daemons are running:
[segmented list]
Daemon Log Location
auditd running /var/log/audit/audit.log
auditd off; rsyslogd running /var/log/messages
setroubleshootd /var/log/audit/audit.log. Easier-to-read denial
messages also sent to /var/log/messages
Sorry for how the table looks :(
>
>> This is coming next in a separate chapter. Why can't you do much with
>> MCS if everyone is user_u? Doesn't it use the level, not the user/role/type?
>
> Whether you're using either the level or the classification, you need to be
> able to run users at different levels/classes for it to do any real good:
>
> Consider:
>
> User1 can read classes A, B, C.
> User2 can read classes B, D, E.
> User3 can read classes A, B, and E.
>
> Wow. That works pretty nice.
>
> Now consider if you only have 1 defined user for people to run as:
>
> User_u can read classes A, B, C.
> User_u can read classes B, D, E.
> User_u can read.. oh nevermind. ;)
>
> So you need to be able to say "userid fred runs as user1, userid joe runs
> as user2, userid dept-paperwork runs as user3/levelA, userid dept-admin runs
> as user3/levelB", and so on....
>
> The stock MCS policy provides enough user classes and levels to protect the
> *system* from users - but you need to roll-your-own to protect user data to
> a similar level.
>
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2008-10-03 0:08 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-09-23 6:16 user guide drafts: "Working with SELinux" sections Murray McAllister
2008-09-26 3:30 ` Valdis.Kletnieks
2008-09-29 18:31 ` Stephen Smalley
2008-10-01 0:19 ` Murray McAllister
2008-10-01 4:00 ` Valdis.Kletnieks
2008-10-03 0:08 ` Murray McAllister [this message]
-- strict thread matches above, loose matches on Subject: below --
2008-10-06 17:01 Clarkson, Mike R (US SSA)
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=48E5628C.1070008@redhat.com \
--to=mmcallis@redhat.com \
--cc=Valdis.Kletnieks@vt.edu \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.