SELinux domains for relabeling

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello all

i'm trying to investigate what domains in the Fedora 12 policy are allowed to 
modify SELinux labels (in particular domain entrypoints). After reading the 
article of D. J. Walsh "Confined processes statistics in Fedora 12?" i removed 
the "unconfined" package in order to get a shorter list.
For the selection process i'm considering not only domains which are directly 
allowed to do relabeling, but also those that are allowed to directly interact 
with the system by:
 - loading the selinux policy
 - performing the setenforce command
 - loading kernel modules
 - accessing to /dev/mem device
 
Since domains are grouped by attributes and the last have a name which 
suggests the type of action that can be performed on the system, i selected 
those that seems to meet the criteria described before.

admindomain
can_change_object_identity
can_change_process_identity
can_change_process_role
can_load_kernmodule
can_load_policy
can_relabelto_binary_policy
can_relabelto_shadow_passwords
can_setenforce
can_system_change
can_write_binary_policy
can_setsecparam
kern_unconfined
memory_raw_read
memory_raw_write
selinux_unconfined_type
sysadm_usertype
staff_usertype
unconfined_domain_type
unconfined_file_type

Then i have expanded the list by listing all domains included in each 
attribute.
Just for verifying i verified using the command 

sesearch --allow -d -t <file label> -p relabelto 

that, for some file labels, the domains obtained are included in the list 
built.

Does this approach can be considered valid to meet the goal? 
Any comment about this argument may be appreciated.

Thanks in advance.



Attachment: smime.p7s
Description: S/MIME cryptographic signature

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux