Re: Policy for webalizer

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 27 Jun 2004 21:33, Yuichi Nakamura <himainu-ynakam@xxxxxxxxx> wrote:
> I found that webalizer does not work from cron on FedoraCore2.
>
> It seems that there is no policy for webalizer.
> I wrote policy for webalizer.
> I tested it from command line and cron.
> Please use.

I think you should use etc_domain(webalizer) instead of defining 
webalizer_conf_t and var_lib_domain(webalizer) instead of webalizer_write_t.

We could have /var/www/usage labelled as httpd_sys_content_t.  That gives less 
types (less pain) for no significant decrease in security.  I should probably 
make a similar change to calamaris_t.

For access to locale_t you want read_locale(webalizer_t).

As a general rule we don't want to allow any daemons access to the 
administrator console if we can avoid it.  I'm not sure what the best thing 
to do for webalizer is in this regard.

I've made some minor changes, please check the attached files and tell me what 
you think.


PS  I've been running webalizer in logrotate_t domain for a couple of years.  
This isn't ideal though as I needed to put some entries in custom.te for it - 
not something I could distribute.  Having a webalizer_t is a good 
improvement.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page
##webalizer_t: domain for webalizer
# 2004.6.19
# by Yuichi Nakamura (ynakam @ selinux.gr.jp)

application_domain(webalizer)
# to use from cron
system_crond_entry(webalizer_exec_t,webalizer_t)
role system_r types webalizer_t;

##type definision
# type for usage file
type webalizer_usage_t,file_type,sysadmfile;
# type for /var/lib/webalizer
type webalizer_write_t,file_type,sysadmfile;
# type for webalizer.conf
etc_domain(webalizer)

#read apache log
allow webalizer_t var_log_t:dir r_dir_perms;
r_dir_file(webalizer_t, httpd_log_t)

#r/w /var/lib/webalizer
var_lib_domain(webalizer)

#read /var/www/usage
create_dir_file(webalizer_t, httpd_sys_content_t)

#read system files under /etc
allow webalizer_t { etc_t etc_runtime_t }:file { getattr read };
read_locale(webalizer_t)

# can use tmp file
tmp_domain(webalizer)

# can read /proc
read_sysctl(webalizer_t)
allow webalizer_t proc_t:dir { search };
allow webalizer_t proc_t:file r_file_perms;

# network
can_network(webalizer_t)

#process communication inside webalizer itself
general_domain_access(webalizer_t)

allow webalizer_t self:capability { dac_override };
/usr/bin/webalizer		system_u:object_r:webalizer_exec_t
/var/lib/webalizer(/.*)?	system_u:object_r:webalizer_var_lib_t
/etc/webalizer.conf		system_u:object_r:webalizer_etc_t

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux