Re: selinux breaks revisor

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu January 24 2008, Stephen Smalley wrote:

> I think it would be a property of the chroot'd process and its
> descendants, not of the directory, as processes operating non-chroot'd
> may still access the contents of that directory and should still be
> handled by the host policy.  So a per-task policy attribute that would

Yes, I did not think about this direction.

> usually always refer to the host/global policy, but could be unshared
> and then have a private policy loaded for it and its descendants.
>
> The main problem is detecting and handling accesses that cross the
> policy boundary (non-chroot'd process attempts to access file within the
> directory, chroot'd process manages to break out of the chroot and
> attempts to access file outside of chroot).

When there were different "namespaces" for the inner and outer selinux, then 
the outer selinux could handle the access trough the chroot bondary using the 
normal host namespace and the inner selinux would only handle the access 
within the chroot, using its own namespace.

Regards,
Till

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux