Re: Proposal: Improving SELinux <--> user interaction on Fedora - Kerneloops for SELinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



2008/7/22 David Nielsen <gnomeuser@xxxxxxxxx>:
>
>
> 2008/7/22 max <maximilianbianco@xxxxxxxxx>:
[ snip ]
>> Don't implement it or if you do make that nonsense optional and not the
>> default. Everyone wants things to be simpler, there is no easy way out.
>> System security is not something simple.  Developer's continue to indulge in
>> running permissive or turning SELinux off entirely, all this accomplishes is
>> to make it take longer to establish good policy, SELinux isn't going
>> anywhere. People need to get used to it. There are a number of tools
>> available to troubleshoot any issue but nobody seems to want to use any of
>> them. The kerneloops for SELinux is a good idea but it isn't going to
>> instantly solve anyone's problems. All those reports still have to sorted
>> and reviewed to determine how to fix policy to suit the majority of users,
>> it still may take weeks to sort it all out. People often are not even trying
>> the fixes suggested by SETroubleshoot. SETroubleshoot does a good job of
>> suggesting fixes. Audit2allow is great for this until upstream can figure
>> out how to work it out. All this talk of allow/deny buttons is absolute
>> insanity and it will ruin one of the few useful security tools that exist.
>
> Any suggested solution that starts with "open a terminal" scares users,
> additionally if they are required to be root in said terminal I would
> hestitate to guess that we lose everyone except a bare minimum of users when
> looking at the big picture

While I understand this sentiment, no one in this thread as suggested
this as a solution.


> my mother surely should not be asked to do
> this, the mere thought of her with the root password in hand terrifies me

In this regard, Ubuntu's use of sudo is useful


> add to that firing off random commands she has no idea what does - it's a
> wonder Hollywood has yet to make a blockbuster horror movie following this
> plot.

Again, no one in this thread has suggested this.


> In terms of what SELinux does currently, it's an improvement over the
> older releases but it's still far from being something I would let my mother
> ticker with - and the policy currently has plenty of holes in terms of what
> an average user might do, just the other day I discovered SELinux utter fail
> when plugging in my iPod (this was fixed within days of being filed and as I
> recall an update was pushed soon there after, so the response is generally
> good but that is still some 2 weeks where aunt tilly can't use her iPod).

Fair enough. We can't do everything for the sake of aunty tilly though.


> Should asking the user to drop to a terminal as root and issue commands
> really be our first line of defence.. I certainly hope not. We really need
> to be more proactive in gathering failures instead of relying on the user to
> patch up the policy with mysterious cli magic.

What are you responding to?


-- 
Fedora 7 : sipping some of that moonshine
( www.pembo13.com )

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux