From: dE <de.techno@gmail.com>
To: selinux@tycho.nsa.gov
Subject: Re: Why is SELINUXTYPE policy specific?
Date: Tue, 22 Apr 2014 10:29:12 +0530 [thread overview]
Message-ID: <5355F720.7010605@gmail.com> (raw)
In-Reply-To: <CAPzO=Nzkn13La7VDcFjCah8CGmhW7R6Vm+zoMFR80DhPNgD3wg@mail.gmail.com>
On 04/21/14 13:31, Sven Vermeulen wrote:
> On Sun, Apr 20, 2014 at 2:23 PM, dE <de.techno@gmail.com> wrote:
>> There are 3 security models in which SELinux can work -- TE, RBAC and MLS.
>>
>> And there are 6 types of SELinux policies --
>>
>> targeted, mls, mcs, standard, strict or minimum.
>>
>> Each security model requires it's own set of policies and the policies can
>> be 1 of the 6 types. So can all the 3 security modles and 6 types be
>> intermixed? Won't there be conflicts like with MLS and RBAC?
> The SELINUXTYPE value should be seen as the name given to a policy
> store. The contents (the actual policy, the features it supports, the
> fact that it is MLS-enabled or not) have nothing to do with the name
> of the store per se. It is just a matter of convenience that policy
> stores are named in a particular way so that, cross-distributions,
> security administrators can deduce the type and features of the policy
> based on the name.
>
> For instance, on RHEL6, "targeted" is the name given to the policy
> store that contains an MCS policy with support for unconfined domains.
> On Gentoo, this name is rather used for non-MCS policy with support
> for unconfined domains.
>
> Afaik, there is no conflict between RBAC and MLS. With MLS, the
> SELinux subsystem allows or denies access based on the dominance rules
> between the domains' security clearance and the resource sensitivity
> level. RBAC instead allows or denies a SELinux role to be associated
> with a particular domain.
>
> Wkr,
> Sven Vermeulen
So can policies which support RBAC can be made to have a different
SELINUXTYPE?
Can targeted, mls, mcs, standard, strict or minimum also be considered
as different security models? Since all these are made based on the TE
model, can we make a custom security model based on TE and give it a
different SELINUXTYPE.
Thanks for the response.
next prev parent reply other threads:[~2014-04-22 5:01 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-04-20 12:23 Why is SELINUXTYPE policy specific? dE
2014-04-21 8:01 ` Sven Vermeulen
2014-04-22 4:59 ` dE [this message]
2014-04-22 12:53 ` Stephen Smalley
2014-04-26 7:06 ` dE
2014-04-26 14:17 ` Dominick Grift
2014-04-27 8:26 ` dE
2014-04-21 14:53 ` Stephen Smalley
2014-04-22 5:03 ` dE
2014-04-22 12:33 ` Stephen Smalley
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5355F720.7010605@gmail.com \
--to=de.techno@gmail.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.