All of lore.kernel.org
 help / color / mirror / Atom feed
From: dwalsh@redhat.com (Daniel J Walsh)
To: refpolicy@oss.tresys.com
Subject: [refpolicy] Fwd: Re: system_logging.patch
Date: Fri, 19 Mar 2010 11:21:53 -0400	[thread overview]
Message-ID: <4BA39691.7060209@redhat.com> (raw)
In-Reply-To: <201003191102.56364.sgrubb@redhat.com>

On 03/19/2010 11:02 AM, Steve Grubb wrote:
> On Friday 19 March 2010 10:44:22 am Christopher J. PeBenito wrote:
>    
>>> The socket is the realtime interface for audit data, so yes its got
>>> sensitive  data.
>>>        
>> No, it is a means to connect to the daemon, like the port in internet
>> domain sockets (which are all system low in refpolicy).  In my opinion
>> the process-process connectto permission is where the most
>> confidentiality-relevant check happens.
>>      
> I would keep it high to make sure a process at system low cannot gain access
> to audit data that it should not. Sure, the DAC check will require root. But
> not all root roles are the security officer. There are no checks done by the
> daemon to see who is connecting.
>
>
>    
SELinux will check.
>>> The pid file is high because the audit daemon is. It can be argued that
>>> the pid  file is used by the initscripts to locate the daemon for
>>> signalling to reload, rotate logs, terminate, or other actions that
>>> should be limited to the security officer.
>>>        
>> Knowing the pid of the auditd doesn't mean you can do anything to it.
>> What you seem to be implying is that the integrity of the file needs to
>> be preserved, which is what TE is for.
>>      
> Sure. There is that reason, too.  :)
>
> Thanks,
> -Steve
>    

      parent reply	other threads:[~2010-03-19 15:21 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-03-18 17:12 [refpolicy] Fwd: Re: system_logging.patch Daniel J Walsh
     [not found] ` <201003181615.22542.sgrubb@redhat.com>
2010-03-19 12:14   ` Christopher J. PeBenito
2010-03-19 12:22     ` Daniel J Walsh
2010-03-19 14:13       ` Christopher J. PeBenito
2010-03-19 14:18         ` Daniel J Walsh
     [not found]     ` <201003190944.18262.sgrubb@redhat.com>
2010-03-19 14:44       ` Christopher J. PeBenito
     [not found]         ` <201003191102.56364.sgrubb@redhat.com>
2010-03-19 15:21           ` Daniel J Walsh [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4BA39691.7060209@redhat.com \
    --to=dwalsh@redhat.com \
    --cc=refpolicy@oss.tresys.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.