From: Daniel J Walsh <dwalsh@redhat.com>
To: Hasan Rezaul-CHR010 <CHR010@motorola.com>
Cc: selinux@tycho.nsa.gov
Subject: Re: Where do I get a good Policy Base ?...
Date: Thu, 12 Nov 2009 08:06:36 -0500 [thread overview]
Message-ID: <4AFC085C.60003@redhat.com> (raw)
In-Reply-To: <D06FE0A2807BC145B0D38744789D4F5D0794B597@de01exm68.ds.mot.com>
On 11/11/2009 06:25 PM, Hasan Rezaul-CHR010 wrote:
> Thanks Dan,
>
> I cant seem to find a good place to download the selinux-policy rpm for
> Fedora 12. Can you point me to an URL link, or tell me how/where I can
> obtain it ?
>
> In general, when looking for what policy to use as a base, is it more
> important to stay consistent about the Linux Kernel version, or is it
> more important to make sure the versions of selinux-packages are
> consistent ? I am guessing it's the latter.
>
> Thanks.
>
>
> -----Original Message-----
> From: Daniel J Walsh [mailto:dwalsh@redhat.com]
> Sent: Wednesday, November 11, 2009 4:02 PM
> To: Hasan Rezaul-CHR010
> Cc: Stephen Smalley; selinux@tycho.nsa.gov
> Subject: Re: Where do I get a good Policy Base ?...
>
> On 11/11/2009 02:37 PM, Hasan Rezaul-CHR010 wrote:
>> Hi All,
>>
>> I didn't get an answer to my question below :-(
>>
>>
> F12 policy.
>
>
>> -------------------------------
>>
>> Thanks for your answers :-)
>>
>> A quick follow up question...
>>
>> What would be the most appropriate Fedora selinux-policy that I can
>> start off with as a base to build on top of, Given:
>>
>> that I have Linux 2.6.27, and I have the following latest SELinux
>> package versions :
>>
>> checkpolicy-2.0.19
>> libselinux-2.0.85
>> libsemanage-2.0.33
>> libsepol-2.0.37
>> policycoreutils-2.0.69
>> sepolgen-1.0.17
>>
>> Should I use Fedora 11 -
>> download.fedora.redhat.com/pub/fedora/linux/development/i386/os/Packag
>> es /selinux-policy-3.6.6-5.fc11.noarch.rpm
>>
>> Or should I use Fedora 10 -
>> download.fedora.redhat.com/pub/fedora/linux/updates/10/i386/selinux-po
>> li
>> cy-3.5.13-45.fc10.noarch.rpm
>>
>> Or should I use new RefPolicy from OpenSuSE -
>> ftp5.gwdg.de/pub/opensuse/repositories/security:/SELinux/openSUSE_Fact
>> or
>> y/noarch/selinux-policy-refpolicy-standard-2.20081210-1.8.noarch.rpm
>>
>>
>> Thanks in advance as usual for all your help.
>>
>>
>>
>>
>> -----Original Message-----
>> From: Dominick Grift [mailto:domg472@gmail.com]
>> Sent: Tuesday, October 27, 2009 3:50 AM
>> To: Hasan Rezaul-CHR010
>> Cc: selinux@tycho.nsa.gov
>> Subject: Re: Where do I get a good Policy Base ?...
>>
>> On Mon, 2009-10-26 at 21:16 -0400, Hasan Rezaul-CHR010 wrote:
>>> Hi All,
>>>
>>> I used to have the following SELinux related package versions on my
>>> Linux (2.6.18) system:
>>>
>>> Checkpolicy - 1.33.1
>>> Libselinux - 2.0.13
>>> Libsemanage - 2.0.1
>>> Libsepol - 2.0.3
>>> Libsetrans - 0.1.18
>>> Policycoreutils - 2.0.16
>>>
>>> And I used a 'strict' Base policy from Fedora Core 6. Made the
>>> modifications I needed on top of that, and I was very happy...
>>>
>>>
>>> We get our OS packaged/delivered from a third party company, and
>>> we're
>>
>>> upgrading to Linux 2.6.27, and as part of this upgrade, we are also
>>> migrating to much newer versions of the SELinux packages. They are:
>>>
>>> checkpolicy-2.0.19
>>> libselinux-2.0.85
>>> libsemanage-2.0.33
>>> libsepol-2.0.37
>>> policycoreutils-2.0.69
>>> sepolgen-1.0.17
>>>
>>>
>>> My questions are:
>>>
>>> 1. I believe the "strict" policy is no longer supported in the above
>>> versions of SELinux packages? Is this true ?
>>
>> the "strict" policy model is no longer supported. The strict and
>> target policy have merged to a policy model that is called "targeted".
>> You can configure the "targeted" policy to behave like old strict
>> policy by removing removing the unconfined modules and by mapping your
>
>> Linux logins to strict SELinux users.
>>
>>>
>>> 2. The entire set of policies that I have fine-tuned over the years
>>> under my /etc/selinux/strict/modules/active/modules/*.pp directory
>>> in my previous older system, can I make any use of that ?? In other
>>> words, can that stuff be re-used at all ? Or do I need to develop
>>> policy from scratch again ?
>>
>> I am not sure about this but my opinion is that it should in most
>> cases be possible to use older binary modules in newer policy.
>> Reference policy should be compatible in my view.
>>
>> Please note though that is encouraged to keep the source policy for
>> your binary modules so that you can edit policy modules easily later.
>>>
>>> 3. What will be a good base policy for me to start policy development
>
>>> on ? Will it be refpolicy, or should I grab the base 'targeted'
>>> policy
>>
>>> from fedora core 11 for example ?
>>
>> This depends on your distro, but generally you should be better of
>> with a distro specific policy. Also keep in mind that Fedora has a
>> active community, frequent updates and many testers.
>>
>>>
>>> 4. Assuming 'strict' is no longer supported in the NEW package
>>> versions above, and I use a base 'targeted' policy as my starting
>>> point... Should I be able to simply remove the "unconfined.pp" policy
>
>>> module from the base targeted policy, and that essentially turns my
>>> system into "strict-like" mode ? Is that advisable ?
>>
>> That is the idea, yes,
>>
>>>
>>> 5. If I do continue to use the 'targeted' base policy as is, how can
>>> I
>>
>>> develop policy on top of that, to make sure I still block specific
>>> things that I don't want to take place. For example, I DON'T want a
>>> user_t to be able to write to files of type etc_t for example. How
>>> do I go about accomplishing this given the 'targeted' framework ? I
>>> know how to do this in the old 'strict' framework, not sure how to go
>
>>> about it with the targeted framework. Please shed some light or point
>
>>> me to documents...
>>
>> You can write your own custom policy modules on that of the policy
>> that is distributed. Current policy is usually modular. Basically
>> write a source policy module, build it and install it using the
>> semanage or the semodule command.
>>
>> e.g. (Fedora/RedHat):
>>
>> echo "policy_module(mytest, 0.0.1)" > mytest.te; make -f
>> /usr/share/selinux/devel/Makefile mytest.pp; sudo semodule -i
>> mytest.pp sudo semodule -l | grep mytest
>>
>>>
>>> Again, Any references or documentation links would be greatly
>>> appreciated.
>>
>> www.selinuxproject.org/page/User_Resources
>>>
>>> Thanks in advance.
>>>
>>>
>>> --
>>> This message was distributed to subscribers of the selinux mailing
>> list.
>>> If you no longer wish to subscribe, send mail to
>>> majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without
>> quotes as the message.
>>
>>
>
Latest F12 packages are in koji, here is a link:
http://koji.fedoraproject.org/koji/buildinfo?buildID=140508
The Fedora Kernel can handle multiple different policies, so I am not sure I understand the question.
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2009-11-12 13:06 UTC|newest]
Thread overview: 34+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-10-17 0:15 sshd error: Failed to get default security context Larry Ross
2009-10-17 11:39 ` Daniel J Walsh
2009-10-17 18:17 ` Larry Ross
2009-10-19 13:53 ` Stephen Smalley
2009-10-19 16:49 ` Larry Ross
2009-10-19 17:13 ` Stephen Smalley
2009-10-20 1:43 ` Larry Ross
2009-10-20 11:18 ` Stephen Smalley
2009-10-27 1:16 ` Where do I get a good Policy Base ? Hasan Rezaul-CHR010
2009-10-27 8:49 ` Dominick Grift
2009-10-27 12:45 ` Christopher J. PeBenito
2009-11-10 0:01 ` Hasan Rezaul-CHR010
2009-12-10 2:18 ` How to use sepolgen VS. policygentool Hasan Rezaul-CHR010
2009-12-10 2:50 ` Hasan Rezaul-CHR010
2009-12-10 16:02 ` Stephen Smalley
2009-12-10 17:11 ` Guido Trentalancia
2009-12-10 19:11 ` Daniel J Walsh
2009-12-10 15:54 ` Stephen Smalley
2009-12-10 19:38 ` Daniel J Walsh
2009-12-15 17:43 ` Policy writing philosophy Hasan Rezaul-CHR010
2009-12-15 20:14 ` Dominick Grift
2009-12-15 20:40 ` Bandan Das
2009-12-16 14:58 ` Stephen Smalley
2009-12-16 15:30 ` Hasan Rezaul-CHR010
2009-12-16 15:47 ` Stephen Smalley
2009-12-16 15:48 ` Hasan Rezaul-CHR010
2009-12-10 19:04 ` How to use sepolgen VS. policygentool Daniel J Walsh
2009-11-11 19:37 ` Where do I get a good Policy Base ? Hasan Rezaul-CHR010
2009-11-11 22:02 ` Daniel J Walsh
2009-11-11 23:25 ` Hasan Rezaul-CHR010
2009-11-12 13:06 ` Daniel J Walsh [this message]
2009-10-18 10:33 ` sshd error: Failed to get default security context Dominick Grift
2009-10-18 18:58 ` Larry Ross
2009-10-19 14:02 ` Daniel J Walsh
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4AFC085C.60003@redhat.com \
--to=dwalsh@redhat.com \
--cc=CHR010@motorola.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.