All of lore.kernel.org
 help / color / mirror / Atom feed
From: dE <de.techno@gmail.com>
To: selinux@tycho.nsa.gov
Subject: Re: Why is SELINUXTYPE policy specific?
Date: Tue, 22 Apr 2014 10:29:12 +0530	[thread overview]
Message-ID: <5355F720.7010605@gmail.com> (raw)
In-Reply-To: <CAPzO=Nzkn13La7VDcFjCah8CGmhW7R6Vm+zoMFR80DhPNgD3wg@mail.gmail.com>

On 04/21/14 13:31, Sven Vermeulen wrote:
> On Sun, Apr 20, 2014 at 2:23 PM, dE <de.techno@gmail.com> wrote:
>> There are 3 security models in which SELinux can work -- TE, RBAC and MLS.
>>
>> And there are 6 types of SELinux policies --
>>
>> targeted, mls, mcs, standard, strict or minimum.
>>
>> Each security model requires it's own set of policies and the policies can
>> be 1 of the 6 types. So can all the 3 security modles and 6 types be
>> intermixed? Won't there be conflicts like with MLS and RBAC?
> The SELINUXTYPE value should be seen as the name given to a policy
> store. The contents (the actual policy, the features it supports, the
> fact that it is MLS-enabled or not) have nothing to do with the name
> of the store per se. It is just a matter of convenience that policy
> stores are named in a particular way so that, cross-distributions,
> security administrators can deduce the type and features of the policy
> based on the name.
>
> For instance, on RHEL6, "targeted" is the name given to the policy
> store that contains an MCS policy with support for unconfined domains.
> On Gentoo, this name is rather used for non-MCS policy with support
> for unconfined domains.
>
> Afaik, there is no conflict between RBAC and MLS. With MLS, the
> SELinux subsystem allows or denies access based on the dominance rules
> between the domains' security clearance and the resource sensitivity
> level. RBAC instead allows or denies a SELinux role to be associated
> with a particular domain.
>
> Wkr,
>    Sven Vermeulen

So can policies which support RBAC can be made to have a different 
SELINUXTYPE?

Can targeted, mls, mcs, standard, strict or minimum also be considered 
as different security models? Since all these are made based on the TE 
model, can we make a custom security model based on TE and give it a 
different SELINUXTYPE.

Thanks for the response.

  reply	other threads:[~2014-04-22  5:01 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-04-20 12:23 Why is SELINUXTYPE policy specific? dE
2014-04-21  8:01 ` Sven Vermeulen
2014-04-22  4:59   ` dE [this message]
2014-04-22 12:53     ` Stephen Smalley
2014-04-26  7:06       ` dE
2014-04-26 14:17         ` Dominick Grift
2014-04-27  8:26           ` dE
2014-04-21 14:53 ` Stephen Smalley
2014-04-22  5:03   ` dE
2014-04-22 12:33     ` Stephen Smalley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5355F720.7010605@gmail.com \
    --to=de.techno@gmail.com \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.