Re: GNU Common Lisp (gcl) - need a new security context?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Paul Howarth wrote:
> On Fri, 05 Sep 2008 16:54:43 -0400 (EDT)
> "David A. Wheeler" <dwheeler@xxxxxxxxxxxx> wrote:
> 
>> I think it'd better to create an SELinux security context that grants
>> additional memory privileges that can be used ONLY when the
>> program actually _NEEDS_ those privileges (e.g., it uses
>> a gcl runtime requiring additional privileges).
>> You could document a "recipe" for how to create such a
>> thing would be a good idea - but you'd need to recreate it for
>> every program compiled by gcl, ugh. I think it'd be better to
>> have a standard context for this case (the current "unconfined" really
>> is confined; maybe the new one is "really_unconfined"?).
>> Having some processes less confined is better than disabling
>> the security mechanisms for the entire system.

Indeed.  The SELinux approach is not to disable such features for a
whole system, but to provide fine-grained access control for those
parts that need it.

> This is the approach taken for mono and java, which have similar issues.
> 
> If you use a context type of java_exec_t for something using the gcl
> runtime, does it work?

Is it every program created by gcl that needs this access, or just
gcl itself?

Andrew.

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux