Should file permissions match SELinux policy?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I was porting some DNS courseware lab exercises to RHEL4 and FC3/4 and
the following came up.

In the file:

/etc/selinux/targeted/src/policy/domains/program/named.te

There exists policy so that only "named" can read named configuration
files.

# A type for configuration files of named.
type named_conf_t, file_type, sysadmfile;

[snip]

#read configuration files
r_dir_file(named_t, named_conf_t)

This is fine and works.  The question comes then that the standard file
owner and group and permission are more open (and have been
historically).

-rw-r--r--  1 root root 1323 Aug 25  2004 /etc/named.conf

Should the owner and group and permissions be made to match up with the
SELinux policy? ie:

chgrp named /etc/named.conf
chmod   640 /etc/named.conf

ala

-rw-r-----  1 root named 1323 Aug 25  2004 /etc/named.conf

How about this same question at a more general level.

What is the current practice regarding syncing up and matching SELinux
policy with the file owner/group and permissions?

Is there a current defined practice? If not, should there be? :)

Dax Kelson
Guru Labs

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
http://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux