RE: Confining Applications running as root user

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks everyone for their responses.
I have another followup question.

Is it mandatory to add all the neverallow rules to assert.te. If so does
that imply that we need to maintain  our own version of assert.te with
the modifications.

Thanks
Anamitra & Radha

-----Original Message-----
From: Daniel J Walsh [mailto:dwalsh@xxxxxxxxxx] 
Sent: Wednesday, August 12, 2009 1:34 PM
To: Anamitra Dutta Majumdar (anmajumd)
Cc: fedora-selinux-list@xxxxxxxxxx
Subject: Re: Confining Applications running as root user

On 08/11/2009 06:54 PM, Anamitra Dutta Majumdar (anmajumd) wrote:
>  
> 
> We are trying to migrate our existing security policies to SELinux. We

> are new to SELinux and hence are finding it difficult to map our 
> existing policies.
> 
> In our existing policy, all applications (including ones running as 
> root
> user) with the exception of insmod and modprobe, are denied access to 
> /lib directory. How would we go about writing such a policy without 
> actually confining every application manually, since that would indeed

> be cumbersome?
> 
> Thanks,
> Anamitra & Radha.
> 
So you want to control an administrator that is logged in as root from
writing to /lib?

Not very easy to do.  If he can disable selinux, load kernel modules,
install rpm ...

He can easily circumvent your protection.
> --
> fedora-selinux-list mailing list
> fedora-selinux-list@xxxxxxxxxx
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list


--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux