Re: more fine grained access in /etc

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Torbjørn Lindahl wrote:
> I see. In that case I am not going to push this topic much further. Thanks
> for your assistance!
> 
> But wouldn't it be nice to have an allow mechanism in SELinux in which I
> could grant access based on it's existing access. What I want to achieve is
> to be able to add a rule like "If process can read etc_t, then it can also
> read etc_foo_t"
> 
> That would allow me to change context of individual files, and grant access
> to them by process who already have etc_t, and I wouldn't have to redefine
> almost the entire selinux context tree just to target a few individual files
> in /etc for my app.
> 
> T.
> 
> On 9/18/07, Daniel J Walsh <dwalsh@xxxxxxxxxx> wrote:
> Torbjørn Lindahl wrote:
>>>> Good point.
>>>> I probably can live with that.
>>>>
>>>> Still I am not sure if I would like it to have full access to all files
>>>> labelled etc_t . It would be nice to be able to single out only a few of
>>>> them. Perhaps I should look at something other than the targeted policy.
>>>>
>>>> On 9/17/07, Daniel J Walsh <dwalsh@xxxxxxxxxx> wrote:
>>>> Torbjørn Lindahl wrote:
>>>>>>> Hello, I am writing an application that I want to limit using
> selinux.
>>>>>>> audit.log shows that it wants access to /etc/nsswitch.conf and
>>>> /etc/hosts -
>>>>>>> which doesn't seem to unreasonable, however both these have types
> etc_t
>>>> ,
>>>>>>> and allowing myapp_t to read etc_t would also give it access to for
>>>> example
>>>>>>> /etc/passwd, which i do not want.
>>>>>>>
>>>>>>>
>>>>>>> Do I have to invent a new type for these two files to be able to keep
> my
>>>>>>> application from the other etc_t files in /etc ?
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
> ------------------------------------------------------------------------
>>>>>>> --
>>>>>>> fedora-selinux-list mailing list
>>>>>>> fedora-selinux-list@xxxxxxxxxx
>>>>>>> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
>>>> Yes you can, but the more different file_context that you have in /etc,
>>>> the harder they will be to maintain.
>>>>
>>>> Reading /etc/passwd is not as dangerous as being able to read
>>>> /etc/shadow.  So consider if this is really necessary.
>>>> ------------------------------------------------------------------------
>>>> --
>>>> fedora-selinux-list mailing list
>>>> fedora-selinux-list@xxxxxxxxxx
>>>> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
> All of the current policies including mls allow reading of etc_t for
> most domains, and /etc/passwd is labeled etc_t.
>>

> ------------------------------------------------------------------------

> --
> fedora-selinux-list mailing list
> fedora-selinux-list@xxxxxxxxxx
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list

We could do something like this with attributes.

If you created an attribute of etc_filetype

Then gave etc_t this attribute, change the interfaces that say
files_read_etc_files()
to use the attribute instead of the file.

Now when you create new file types, you could define them as etc_filetype.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFG88X1rlYvE4MpobMRAh/8AJ9uoVJrZiiC+tTtTxvbbShtBA0cgACgu/uq
cE+Qw2lNiysCa+OBX1+prVk=
=MjEE
-----END PGP SIGNATURE-----

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux