All of lore.kernel.org
 help / color / mirror / Atom feed
From: kaigai@kaigai.gr.jp (KaiGai Kohei)
To: refpolicy@oss.tresys.com
Subject: [refpolicy] [PATCH] Add a new permission to db_procedure
Date: Mon, 19 Jan 2009 00:11:11 +0900	[thread overview]
Message-ID: <4973468F.1010706@kaigai.gr.jp> (raw)

Hi,

The attached patch add a new permission named as "install" to db_procedure.

The purpose of this permission is to prevent malicious functions are invoked
as a part of server's internal tasks.

PostgreSQL allows user-defined functions to use its internal tasks.
For example, it can be used to implement an output/input handler of new data
types, an index access method, implementation of operator classes and so on.

When we defines a new type, it requires to specify its output/input handler
at least. No need to say, these functions should not be malicious ones,
because user implicitly invokes these function when he uses the type.
This permission is checked when we defines a new system catalog entry which
has a possibility to invoke user defined functions.

In the attached patch, only sepgsql_proc_t is allowed to { install }, because
any other user defined functions are not checked by DBA, so it is not safe to
use it as a part of internal/common processes.
If DBA want to apply user defined functions as a part of internal task, he has
to confirm its safeness and relabel to sepgsql_proc_t at first.

Please apply it, if no matter.

Thanks,
-- 
KaiGai Kohei <kaigai@kaigai.gr.jp>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: refpolicy-db_procedure.patch
Type: application/octect-stream
Size: 1994 bytes
Desc: not available
Url : http://oss.tresys.com/pipermail/refpolicy/attachments/20090119/db92cc45/attachment.bin 

             reply	other threads:[~2009-01-18 15:11 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2009-01-18 15:11 KaiGai Kohei [this message]
2009-01-20  8:19 ` [refpolicy] [PATCH] Add a new permission to db_procedure KaiGai Kohei
2009-01-20 14:31   ` Christopher J. PeBenito
2009-01-20 14:31     ` Christopher J. PeBenito
2009-01-20 15:11     ` KaiGai Kohei
2009-01-20 15:11       ` KaiGai Kohei
2009-01-21 22:28       ` KaiGai Kohei
2009-01-21 22:28         ` KaiGai Kohei
2009-01-22 19:58         ` Joshua Brindle
2009-01-22 22:29           ` KaiGai Kohei
2009-01-22 22:29             ` KaiGai Kohei
2009-01-23 20:07             ` Christopher J. PeBenito
2009-01-23 20:07               ` Christopher J. PeBenito

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4973468F.1010706@kaigai.gr.jp \
    --to=kaigai@kaigai.gr.jp \
    --cc=refpolicy@oss.tresys.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.