All of lore.kernel.org
 help / color / mirror / Atom feed
From: dE <de.techno@gmail.com>
To: selinux@tycho.nsa.gov
Subject: Re: Why is SELINUXTYPE policy specific?
Date: Sat, 26 Apr 2014 12:36:22 +0530	[thread overview]
Message-ID: <535B5AEE.2020806@gmail.com> (raw)
In-Reply-To: <5356664E.7050309@tycho.nsa.gov>

On 04/22/14 18:23, Stephen Smalley wrote:
> On 04/22/2014 12:59 AM, dE wrote:
>> On 04/21/14 13:31, Sven Vermeulen wrote:
>>> On Sun, Apr 20, 2014 at 2:23 PM, dE <de.techno@gmail.com> wrote:
>>>> There are 3 security models in which SELinux can work -- TE, RBAC and
>>>> MLS.
>>>>
>>>> And there are 6 types of SELinux policies --
>>>>
>>>> targeted, mls, mcs, standard, strict or minimum.
>>>>
>>>> Each security model requires it's own set of policies and the
>>>> policies can
>>>> be 1 of the 6 types. So can all the 3 security modles and 6 types be
>>>> intermixed? Won't there be conflicts like with MLS and RBAC?
>>> The SELINUXTYPE value should be seen as the name given to a policy
>>> store. The contents (the actual policy, the features it supports, the
>>> fact that it is MLS-enabled or not) have nothing to do with the name
>>> of the store per se. It is just a matter of convenience that policy
>>> stores are named in a particular way so that, cross-distributions,
>>> security administrators can deduce the type and features of the policy
>>> based on the name.
>>>
>>> For instance, on RHEL6, "targeted" is the name given to the policy
>>> store that contains an MCS policy with support for unconfined domains.
>>> On Gentoo, this name is rather used for non-MCS policy with support
>>> for unconfined domains.
>>>
>>> Afaik, there is no conflict between RBAC and MLS. With MLS, the
>>> SELinux subsystem allows or denies access based on the dominance rules
>>> between the domains' security clearance and the resource sensitivity
>>> level. RBAC instead allows or denies a SELinux role to be associated
>>> with a particular domain.
>>>
>>> Wkr,
>>>     Sven Vermeulen
>> So can policies which support RBAC can be made to have a different
>> SELINUXTYPE?
> You can use any SELINUXTYPE value you want; it is just an arbitrary name
> for the policy.  No inherent relationship to the underlying model or
> configuration.
>
>> Can targeted, mls, mcs, standard, strict or minimum also be considered
>> as different security models? Since all these are made based on the TE
>> model, can we make a custom security model based on TE and give it a
>> different SELINUXTYPE.
> No, they are not different security models, just different
> configurations of the same model, and you are mixing the notions of
> SELINUXTYPE, TYPE and NAME.  At most, you might say that mcs and mls are
> different "models" since they use different sets of constraint
> definitions but that's all just configuration data for SELinux...

Sorry for the late response -- I was really busy setting up that 
graphics card.

So I dont understand the purpose of SELINUXTYPE. Can someone please explain?

  reply	other threads:[~2014-04-26  7:09 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-04-20 12:23 Why is SELINUXTYPE policy specific? dE
2014-04-21  8:01 ` Sven Vermeulen
2014-04-22  4:59   ` dE
2014-04-22 12:53     ` Stephen Smalley
2014-04-26  7:06       ` dE [this message]
2014-04-26 14:17         ` Dominick Grift
2014-04-27  8:26           ` dE
2014-04-21 14:53 ` Stephen Smalley
2014-04-22  5:03   ` dE
2014-04-22 12:33     ` Stephen Smalley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=535B5AEE.2020806@gmail.com \
    --to=de.techno@gmail.com \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.