On 01/26/2010 02:27 PM, Roberto Sassu wrote: > Hello all > > i'm trying to investigate what domains in the Fedora 12 policy are allowed to > modify SELinux labels (in particular domain entrypoints). sesearch --allow -s domain -t exec_type -c file -p relabelto sesearch --allow -s domain -t exec_type -c file -p relabelfrom This lists all source domain types relabelto and relabelfrom access to executable file types (entry types) After reading the > article of D. J. Walsh "Confined processes statistics in Fedora 12?" i removed > the "unconfined" package in order to get a shorter list. > For the selection process i'm considering not only domains which are directly > allowed to do relabeling, but also those that are allowed to directly interact > with the system by: > - loading the selinux policy > - performing the setenforce command > - loading kernel modules > - accessing to /dev/mem device > > Since domains are grouped by attributes and the last have a name which > suggests the type of action that can be performed on the system, i selected > those that seems to meet the criteria described before. > > admindomain > can_change_object_identity > can_change_process_identity > can_change_process_role > can_load_kernmodule > can_load_policy > can_relabelto_binary_policy > can_relabelto_shadow_passwords > can_setenforce > can_system_change > can_write_binary_policy > can_setsecparam > kern_unconfined > memory_raw_read > memory_raw_write > selinux_unconfined_type > sysadm_usertype > staff_usertype > unconfined_domain_type > unconfined_file_type > > Then i have expanded the list by listing all domains included in each > attribute. > Just for verifying i verified using the command > > sesearch --allow -d -t <file label> -p relabelto > > that, for some file labels, the domains obtained are included in the list > built. > > Does this approach can be considered valid to meet the goal? > Any comment about this argument may be appreciated. > > Thanks in advance. > > > > > > > -- > selinux mailing list > selinux@xxxxxxxxxxxxxxxxxxxxxxx > https://admin.fedoraproject.org/mailman/listinfo/selinux
Attachment:
signature.asc
Description: OpenPGP digital signature
-- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/selinux