Re: SELinux domains for relabeling

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello

I tried to execute:

for i in `seinfo -aexec_type -x`; do
        if [ $i = "exec_type" ]; then
                continue;
        fi
        sesearch --allow -s domain -t $i -c file -p relabelto | awk 
'/allow/{print $2}' >> domains.tmp
done;
cat domains.tmp | sort | uniq -c

This is the result:
    552 prelink_t
      1 pulseaudio_t
    552 restorecond_t
    552 rpm_script_t
    552 rpm_t
    552 setfiles_mac_t
    552 setfiles_t
      4 seunshare_t
      4 staff_t
    552 sysadm_t
      1 unconfined_t
      1 useradd_t
      4 user_t
     14 webadm_t


OK, i hope this is the correct list (for now, until the setools bug will be 
solved). 
Another aspect of the policy which i need to understand is the list of domains 
which are allowed to modify the file labelling behaviour, when it is enforced. 
For example, when i enter the sysadm_t domain, i can disable the enforcement 
or i can load a custom policy module that add new rules. What are the criteria 
to pass to the sesearch tool in order to get the correct list?
Thanks. 

On Tuesday 26 January 2010 18:14:42 Stephen Smalley wrote:
> On Tue, 2010-01-26 at 17:54 +0100, Dominick Grift wrote:
> > On 01/26/2010 05:40 PM, Stephen Smalley wrote:
> > > On Tue, 2010-01-26 at 17:14 +0100, Dominick Grift wrote:
> > >> On 01/26/2010 02:27 PM, Roberto Sassu wrote:
> > >>> Hello all
> > >>>
> > >>> i'm trying to investigate what domains in the Fedora 12 policy are
> > >>> allowed to modify SELinux labels (in particular domain entrypoints).
> > >>
> > >> sesearch --allow -s domain -t exec_type -c file -p relabelto
> > >> sesearch --allow -s domain -t exec_type -c file -p relabelfrom
> > >>
> > >> This lists all source domain types relabelto and relabelfrom access to
> > >> executable file types (entry types)
> > >
> > > Does that work for you?
> >
> > You are right it does not work. I wonder why. Why would sysadm_t be a
> > "domain" and unconfined_t not?
> 
> # seinfo -adomain -x | grep unconfined_t
>       qemu_unconfined_t
>       unconfined_t
> 
> unconfined_t is a domain.  This appears to be a bug in setools.
> 
> > > sesearch --allow -s domain -t exec_type -c file -p relabelto | awk
> > > '/allow/{print $2}' | sort | uniq -c 1 prelink_t
> > >     568 restorecond_t
> > >     568 rpm_t
> > >     568 sysadm_t
> > >
> > > Where is unconfined_t and friends?
> > >
> > > sesearch --allow -s unconfined_t -t sshd_exec_t -c file -p relabelto
> > > Found 1 semantic av rules:
> > >    allow files_unconfined_type file_type : file { ioctl read write
> > > create getattr setattr lock relabelfrom relabelto append unlink link
> > > rename execute swapon quotaon mounton execute_no_trans entrypoint
> > > open } ;
> 
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux