All of lore.kernel.org
 help / color / mirror / Atom feed
From: Joshua Brindle <jbrindle@tresys.com>
To: Stephen Smalley <sds@tycho.nsa.gov>
Cc: <selinux@tycho.nsa.gov>,
	William Roberts <bill.c.roberts@gmail.com>,
	Joman Chu <jcchu@tycho.ncsc.mil>
Subject: Re: seandroid and policy version
Date: Tue, 18 Sep 2012 13:56:09 -0400	[thread overview]
Message-ID: <5058B5B9.5090409@tresys.com> (raw)
In-Reply-To: <1347990196.31966.70.camel@moss-pluto.epoch.ncsc.mil>

Stephen Smalley wrote:
> On Tue, 2012-09-18 at 13:40 -0400, Joshua Brindle wrote:
>> Stephen Smalley wrote:
>>> On Wed, 2012-07-11 at 15:49 -0400, Stephen Smalley wrote:
>> <snip>
>>> So this issue has come up again in the context of implementing device
>>> admin APIs and a sample device admin app.  The device admin API
>>> implementation in the system_server needs to know how to name the file
>>> it creates under /data/system for the kernel policy, but it has no way
>>> to determine the actual policy version of the supplied policy.  So it
>>> doesn't know what suffix to use.  Options:
>>> - Get rid of the version suffix altogether, or at least for the sepolicy
>>> file under /data/system.
>>> - Have the system_server parse the header of the policy image to
>>> determine the policy version, and use that as the suffix.
>>>
>>> Thoughts?
>>>
>> Can the MDM server not provide the device admin API with the correct
>> filename to use? How are you feeding the policy to the API?
>
> At the moment it is being passed directly as a byte array (similar to
> security_load_policy).  Passing by pathname would require that the
> system_server have read/search access to a private file created by the
> device admin app, and passing by open fd would require that the device
> admin app first write the policy image to local storage before passing
> it to the system_server.  So passing it directly seems preferable.
>

I assumed byte array but is the API going to basically be "here's your 
policy blob" and the system_server has to figure out what to do with it? 
I strongly believe that we will outgrow an API like that very quickly. 
MDM vendors want to do some interesting things and always doing it on 
the server side isn't going to be feasible I think (holding >10k SELinux 
policies in order to update them when new 
containers/apps/features/whatever are added is not ideal).


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2012-09-18 17:56 UTC|newest]

Thread overview: 22+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-07-11  0:07 seandroid and policy version Joshua Brindle
2012-07-11 12:50 ` Stephen Smalley
2012-07-11 19:45   ` Joshua Brindle
2012-07-11 19:49     ` Stephen Smalley
2012-09-18 17:33       ` Stephen Smalley
2012-09-18 17:40         ` Joshua Brindle
2012-09-18 17:43           ` Stephen Smalley
2012-09-18 17:56             ` Joshua Brindle [this message]
2012-09-18 18:21               ` Stephen Smalley
2012-09-18 17:46         ` William Roberts
2012-09-18 17:50           ` Stephen Smalley
2012-09-18 17:54           ` William Roberts
2012-09-18 17:57             ` William Roberts
2012-09-18 18:10               ` Stephen Smalley
2012-09-18 18:15             ` Stephen Smalley
2012-09-18 18:25               ` William Roberts
2012-09-18 18:26                 ` William Roberts
2012-09-18 18:52                 ` Stephen Smalley
2012-09-18 18:59                   ` William Roberts
2012-09-18 19:04                   ` Joshua Brindle
2012-09-18 19:07                     ` William Roberts
2012-09-18 19:10                       ` Joshua Brindle

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5058B5B9.5090409@tresys.com \
    --to=jbrindle@tresys.com \
    --cc=bill.c.roberts@gmail.com \
    --cc=jcchu@tycho.ncsc.mil \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.