Re: Selinux Apache avc denied

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2005-07-29 at 23:56 -0400, Valdis.Kletnieks@xxxxxx wrote:
> On Fri, 29 Jul 2005 23:32:01 EDT, Alain Reguera Delgado said:
> 
> > I've been stopped the web development. I feel selinux is a brilliant
> > technology I'd like to implement in my webserver.
> 
> Actually, you have that almost totally backwards - SELinux is a brilliant
> technology that gets implemented in the kernel 

One of the good things about SELinux actually is that it covers more
than the kernel; e.g. dbus acts as a "userspace object manager" in
concert with the kernel to secure the whole system.  Similarly, there
are patches for Xorg.  I think it does make sense in some situations to
patch the webserver.

> Unfortunately, this is *much* too big a can of worms to solve directly - it
> would be technically possible to just add a rule that says 'httpd_t can
> exec shell_exec_t' - but that would be a *really* *bad* idea because then
> any exploit could get a shell (and exec_no_trans only partially minimizes
> the problem).

I don't see a problem with execute_no_trans; it stays within the httpd_t
security domain.  

> Policy Gurus:  How big a hole would adding a 'can_exec(sendmail_exec_t)' or
> 'domain_auto_trans(sendmail_t)' cause?  And how many of these common "web interface
> wants to send mail" problems would it solve?

I think policy already has this as httpd_t has the privmail attribute,
and policy grants:

./macros/program/mta_macros.te:63:domain_auto_trans(privmail, sendmail_exec_t, system_mail_t)

My guess is all we need for this problem is:
can_exec(httpd_t, shell_exec_t)


--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
http://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux