All of lore.kernel.org
 help / color / mirror / Atom feed
From: Miroslav Grepl <mgrepl@redhat.com>
To: Dominick Grift <dac.override@gmail.com>,
	Russell Coker <russell@coker.com.au>
Cc: selinux@tycho.nsa.gov
Subject: Re: user_r/sysadm_r/staff_r/unconfined_r
Date: Wed, 05 Nov 2014 11:23:19 +0100	[thread overview]
Message-ID: <5459FA97.2080000@redhat.com> (raw)
In-Reply-To: <1415111931.22097.11.camel@joe.localdomain>

On 11/04/2014 03:38 PM, Dominick Grift wrote:
> On Tue, 2014-11-04 at 22:37 +1100, Russell Coker wrote:
>> The role separation seems to give no benefit apart from sysadm_r/unconfined_r given that we have seuser based constraints and MCS labels to separate users and that they all use the same types.
>>
>> The current policy doesn't support even logging in with a user other than unconfined_r on Debian/Unstable without significant changes.
>>
>> Is there any reason for not ripping out all but 2 roles, one for root (and other sysadmin accounts but not GNOME/KDE sessions) and the other for regukar users?
>>
>> Doing that will make the policy smaller and simpler (for us and users) while not losing any functionality for most users. Where most users probably means everyone who doesn't develop their own policy. The people who do develop their own policy which depends on multiple roles probably have to do plenty of work on systems with the current policy anyway.
>>
>> I think that sysadm_r/unconfined_r should not transition for programs like gpg.
>>
>> NB staff_r is my invention. Before that we only had sysadm_r and user_r. I invented staff_r before MCS and the seuser constraints were developed.
> Wrong list.
>
> Should refpolicy have user domains at all? Should it have more than a
> single domain? As soon as one starts defining a domain one starts
> assuming.
>
> In my view plain refpolicy should be nothing more that what is currently
> in the kernel layer plus unconfined module and maybe the libraries
> module. Maybe constraints.
>
> For sure not an init, authlogin modules etc.
>
> the sole domain kernel_t should in my view ship unconfined, and if for
> some reason one really want a user domain then add a unconfined user
>
> Ref policies job would be to maintain core objects like devices, top
> level file partitioning, network objects. That is it.
>
> It would be very small and it would be base for all, because there are
> almost no decisions made for who ever builds on it
>
> Then on the side there could be a repository with individual add-on
> scenario's
>
> It kind of like base and contrib now, but taken further
Yes. I believe this is good for a discussion. Let's move it on the 
proper list.
>
>
>
> _______________________________________________
> Selinux mailing list
> Selinux@tycho.nsa.gov
> To unsubscribe, send email to Selinux-leave@tycho.nsa.gov.
> To get help, send an email containing "help" to Selinux-request@tycho.nsa.gov.

  reply	other threads:[~2014-11-05 10:23 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-11-04 11:37 user_r/sysadm_r/staff_r/unconfined_r Russell Coker
2014-11-04 13:31 ` user_r/sysadm_r/staff_r/unconfined_r Sven Vermeulen
2014-11-04 14:11   ` user_r/sysadm_r/staff_r/unconfined_r Russell Coker
2014-11-04 14:38 ` user_r/sysadm_r/staff_r/unconfined_r Dominick Grift
2014-11-05 10:23   ` Miroslav Grepl [this message]
2014-11-05 16:00 ` user_r/sysadm_r/staff_r/unconfined_r Dominick Grift

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5459FA97.2080000@redhat.com \
    --to=mgrepl@redhat.com \
    --cc=dac.override@gmail.com \
    --cc=russell@coker.com.au \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.