Re: SELinux - way of the future or good idea but !!!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Tuesday 07 December 2010 16:59:22 Benjamin Franz wrote:
> On 12/07/2010 08:12 AM, Daniel J Walsh wrote:
> > Yes SELinux and all MAC systems require that if the administrator puts
> > files in non default directories, then they have to have to be told.  In
> > the case of SELinux, this involves correcting the labeling.  DAC has
> > similar problems, in that you need to make sure the permission flags and
> > ownership is correct.  Of course admins have been dealing with DAC for
> > years so they understand it, and the number of UID/Permision
> > combinations is more limited then the amounts of labels that SELinux
> > presents.
> 
> The fact remains that as the old saw goes: Make it hard enough to do
> something and people will quit doing it.

Precisely --- make it hard enough for people to keep files in non-default 
location, and use the broken/unsafe configuration of various services, and 
eventually people will learn how to do things properly. ;-)
 
> SELinux remains *hard* for most non-default users. As the lead SE
> developer, things you find utterly routine and only slightly annoying
> are major roadblocks to many other people. You aren't the average user.
> You aren't even close to one. A *sophisticated* user will see the
> suggestion given by sealeart to run chcon, follow it, *and have no idea
> that a system relabel can screw it up again*. sealert doesn't even
> mention the issue! It is as if the person who wrote the sealert messages
> never considered that people would like things fixed permanently rather
> than just until the next SELinux update relabels the system.

Oh, come on, any "sophisticated" user will RTFM !! Hopefully *before* 
executing anything completely blindly, as root.

Just man semanage and man restorecon. How hard can that be?!
 
> I have 15 years experience running Linux servers. And I find SELinux
> damn annoying. I can work with it at need - but I'm generally pissed off
> when I find 'yet another SELinux issue'. My boss, who is the fallback
> admin here, would find it utterly opaque. He would have no idea where to
> even start looking for an SELinux issue.

Two man pages are too hard for your boss to read and understand?! I find it 
hard to believe that any tech-savvy admin is too incompetent to learn how to 
use a new tool (any new tool, including SELinux). Computers in general are a 
fast-moving target, and people who cannot keep up should get retired and find 
something else to do, or hire someone to help/teach them.

I find the slow adoption of SELinux to be a psychological rather than a 
technical issue. Once, out of nowhere, there just appeared this new thing, 
going by the name "Security Enhanced Linux", and it tells people in the face 
that the way they configured their systems for the past n years is unsafe, 
insecure, full of security holes and a Bad Idea in general. And since their 
ego gets hurt in the process, they choose to disable SELinux rather than learn 
how to use it properly.

On that note, I know people who still routinely log into X as root, and refuse 
to acknowledge that it is a Very Bad Idea. Just look at the mess in Windows 
world --- there *are* proper user accounts with limited permissions and all, 
quite available and easy to configure. And how many people bother to use them? 
It's much easier to just be root, right? Why bother with all that permissions 
stuff? After all, it's so utterly opaque to any sophisticated user, right? My 
boss would never even think of executing "ls -l" to check for proper file 
permissions, let alone read a manual for chmod and chown...

I mean, what are we talking about here? SELinux is another security layer, and 
it reduces the number of wrong ways you can configure your system. And if you 
insist to do things in the wrong way, it yells at you and you need to decide 
what to do about it (either shut it up or reconfigure things properly). Every 
serious admin finds such a tool quite useful, at least as a real-time guide to 
proper system configuration, let alone intrusion prevention mechanism.

And it isn't really rocket science. It's just an extension to the existing 
classical permissions system --- it works in analogous way, just with greater 
flexibility and power. If you know how to understand and use file permissions, 
you will easily grasp all about SELinux.

And if you are running 3rd party software which isn't SELinux aware, you have 
several choices, in order of preference:

1) contact the software devs and complain that their software is broken
2) contact your boss and tell him that running such software is bad for 
securuty and that he should consider migrating to something with better 
support
3) use semanage, restorecon, audit2allow to modify the local policy, and have 
your boss sign a document releasing you of any responsibility if an intrusion 
happens through this vector
4) run SELinux in permissive mode, and try to learn from the alerts about all 
the things your system is doing wrong
5) disable SELinux and be ignorant about security.

If you choose 5), feel free to also disable iptables, log in as root all the 
time, and make sure that the root password is clearly visible on the company 
website. Why bother with all that stuff, anyway? ;-)

HTH, :-)
Marko

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux