From: Joshua Brindle <method@manicmethod.com>
To: Robert Story <Robert.Story@sparta.com>
Cc: SE Linux <selinux@tycho.nsa.gov>,
Stephen Smalley <sds@tycho.nsa.gov>,
Karl MacMillan <kmacmillan@tresys.com>
Subject: Re: Policy Access Control
Date: Wed, 18 Mar 2009 14:59:51 -0400 [thread overview]
Message-ID: <49C144A7.3010401@manicmethod.com> (raw)
In-Reply-To: <20090318143856.3abf45ef@sparta.com>
Robert Story wrote:
> On Wed, 21 Jan 2009 15:05:15 -0500 Joshua wrote:
> JB> class policy.bool inherits policy
> JB> Like users and roles, booleans are created and set using the same
> JB> declaration. Booleans may not be further modified; thus they have no
> JB> class-specific permissions.
>
> I find this an odd omission... If I were delegating responsibility for
> modifying policy, booleans are something I'd definitely want to be able to
> lock down. For example, I might not want my ftp admin (or anyone else that
> can tweak policy) turning on allow_ftpd_anon_write...
>
Boolean state at run time can be controlled via filesystem labeling of the
selinuxfs filesystem (as is done in Fedora today).
Persistent changes to the policy can't currently controlled because the policy
access control doesn't "diff" the policies as such and therefore can't see a
change vs. a remove/add. This is something we want to work on at a later time.
semanage changes to booleans require hooks in libsemanage which wasn't part of
this effort, which was to nail down an acceptable way to do access control on
policy additions and subtractions.
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
prev parent reply other threads:[~2009-03-18 18:59 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-01-21 20:05 Policy Access Control Joshua Brindle
[not found] ` <20090318143856.3abf45ef@sparta.com>
2009-03-18 18:59 ` Joshua Brindle [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=49C144A7.3010401@manicmethod.com \
--to=method@manicmethod.com \
--cc=Robert.Story@sparta.com \
--cc=kmacmillan@tresys.com \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.