Re: Is there a SELinux tutorial for ISVs ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 28 Apr 2005 11:54:30 -0400, Daniel J Walsh wrote:
> Anyways I think we need more discussion on handling third party and user 
> customization of policy outside of the current make tree stuff.

Sorry for posting so late ... one thing I'd also like to see is some
formal rules for policy compatibility. For instance, if FC4 ships and says
"Shared libraries with text relocations are no longer allowed by default"
then this breaks things. If FC5 ships and now you need special tagging to
connect to the X server, well ....

(I don't know if this has actually happened or not yet but it seems to
keep coming up)

It may be decided that it's an acceptable price to pay for the additional
security, or it may not. I don't think that discussion should happen
now. But I think ISVs would feel a lot more secure if this sort of
decision appeared not to be arbitrary and if there was some way to plan
and work with the OS base policy writers.

A basic system could be to have widely adopted (cross-distro) and
documented security levels, ie:

Level 1: Basic targetted - optin, only affects daemons, no restrictions
         on anything else

Level 2: Targetted + additional restrictions, execshield enabled (ie 
         this is not just an SELinux thing), apps which require special
         privs must have custom policy

Level 3: Strict

or something similar to that. This means users can adjust their security
level to adapt to what programs they run, and ISVs can say "Minimum
Requirements: Level 2 or lower security level".

thanks -mike

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
http://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux