SELinux threads, cynicism, one-upmanship, etc.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Wednesday 16 November 2005 15:45, Les Mikesell wrote:
> On Wed, 2005-11-16 at 14:12, Lamar Owen wrote:
> > The main reason I think sysadmins in general seem to hate SELinux is the
> > 'Mandatory' part of 'Mandatory Access Control' : that is, superuser power

> Not exactly.  In my case I just realize that there are 30 years of
> history behind expecting all unix access control to be in the
> filesystem in the owner, group and modes of the files.  

A single superuser who can do anything is, IMHO at least, the single worst 
feature of Unix-like systems.  No single user should ever have 'do 
everything' rights once the system is running multiuser.  Of course, there 
should be administrator oversight on making sure that 'someone' can do 
'anything' that might need to be done while in multiuser, but some things are 
best done in singleuser mode, where a superuser actually makes some sense.

> It will 
> take a while to rewrite everything based on different assumptions,
> and meanwhile things will mysteriously not work.

Judging from the contents of many messages to several lists I am on, the 
standard permissions system has its own share of 'mysteriously not work' 
issues.  Yes, with more control comes more responsibility.

> >  AND THAT IS A GOOD THING.  Yes, it really is.  The buffer overflow
> > exploit for those root-running daemons doesn't stand a chance even if it
> > gains root, as long as the selinux policies are set properly.

> We are talking about bugs here.  Why are you so convinced that the
> new code you just introduced to enforce this new policy does not
> in fact introduce new bugs?

There will always be one more bug.  (There's you a one-liner, Peter Farrow.)  
Is the bug in the filesystem?  Is it in the policies themselves?  Does it 
matter where the bug is/will be?  Regardless of code maturity, there will be 
bugs; it is a red herring to say 'turn it off' because there might be bugs in 
it; you might as well never boot at all if you really believe that mindset.

As to why am am convinced about the stability of SELinux in particular, well, 
the original developer is known for being thorough in auditing code and 
practices.  The original SELinux developer wrote the book (which is probably 
classified!) on code auditing.  The built-in distrust of the original 
developer means that more qualified eyes are on this code that virtually any 
other major piece of code in the kernel.  Is it perfect?  No, and will never 
be perfect.  Is it an improvement over permissions?  Yes, and it augments 
them nicely.

> Have you watched the changelogs to see if in fact any problems have been
> found and fixed so far?

In a cursory manner, yes.

> > The Real Root should take the time to configure in to the policies those
> > things the Real Root would normally do (you know, things like backups and
> > the like, along with other normal activities),

> Speaking of backups, have you tested the method you use to make sure
> it restores the attributes SELinux needs to work?

Yes.
-- 
Lamar Owen
Director of Information Technology
Pisgah Astronomical Research Institute
1 PARI Drive
Rosman, NC  28772
(828)862-5554
www.pari.edu

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux