Re: Help with SELinux Policy for Usability Study

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 07/30/2009 10:17 AM, Cliffe wrote:
> 
> 
> Daniel J Walsh wrote:
>> On 07/30/2009 05:15 AM, Dominick Grift wrote:
>>   
>>> On Thu, 2009-07-30 at 12:04 +0800, Cliffe wrote:
>>>
>>>     
>>>> So I am not sure why opera seams to be unconfined, or if removing the
>>>> permissive line was on the right track. Any advice?
>>>>       
>>> permissive domains can be used to troubleshoot/develop policy, without
>>> exposing the whole system.
>>>
>>> eventually, after you've completed the development of your policy , and
>>> before you deploy your policy you should remove the permissive domain.
>>>
>>> But in development stages a permissive domain makes it easier to debug
>>> your policy since everything is allowed but would be denials are logged.
>>>
>>>
>>>     
>>>> Thank you,
>>>>
>>>> Cliffe.
>>>>
>>>> --
>>>> fedora-selinux-list mailing list
>>>> fedora-selinux-list@xxxxxxxxxx
>>>> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
>>>>
>>>> ------------------------------------------------------------------------
>>>>
>>>> --
>>>> fedora-selinux-list mailing list
>>>> fedora-selinux-list@xxxxxxxxxx
>>>> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
>>>>       
>> Cliffe if you remove the permissive line from your te file, SELinux will enforce the policy, however opera will probably crash.
>>
>> We default to permissive domains when we are building new policy modules, to allow you to record what an application does, and use tools like audit2allow to generate allow rules.  Sort of a learning mode.
>>
>> I would not have picked a tool like opera to build policy for, since it is very difficult to confine web browsers.  They are too integrated into the system.  You end up basically creating a usr role since the web browser tends to need to do everything the user can do.
>>   
> Thanks Dan.
> 
> I like your polgengui tool. It makes the process of creating SELinux
> policies less daunting.
> 
> When it creates the .te .if and .fc files it says that the next step
> would be to put the system into permissive mode with setenforce 0.
> However, it should probably tell the user that the new policy will be in
> a permissive domain.
> 
> I agree that creating a policy for opera is not easy, but it would be a
> good idea to restrict its actions where possible.
> 
> My usability study will involve users using SELinux and your tool (I
> think it looks simpler than slide), as well as a couple of other systems.
> 
> I'll let you know of the results when the study is complete later this year.
> 
> Thanks,
> 
> Cliffe.
> 
> 
> ------------------------------------------------------------------------
> 
> --
> fedora-selinux-list mailing list
> fedora-selinux-list@xxxxxxxxxx
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list

Cliffe

Please CC me any results you find as well as any issues with the gui tools as I'm revamping them for F12.

Christopher Pardy

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux