Re: SELinux user domain policy question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/14/2010 05:55 AM, Roberto Sassu wrote:
> Thanks for answers. I'm trying to find a set of types executable by regular users which are managed by few and high privileged domains.
> Unfortunately, regarding 'etc_t',  there's a non administrative domain, 'postgresql_t', which is allowed to create it. 
That seems wrong,  I have no idea why postgresql would be able to manage
etc files.  Chris do you have any idea?   (Hopefully this did not come
from me.  )  BTW there is no way for user_t to execute something as
postgresql_t

> The case of 'noxattrfs' seems to be solvable by turning off the booleans
> 'user_rw_noexattrfile' and 'xguest_mount_media'.
> 
> I have just another question: it's possible to write a policy which creates a new attribute and assign to it types of another attribute with addition/subtraction of others types?
> For example:
> 
> attribute subset_exec_type;
> typeattribute { exec_type -cifs_t } subset_exec_type;
> 
> 
> Just to simplify how to make queries which involves attributes minus some types i write a small patch for the 'setools' software, which introduces two new arguments (-u -v) to the command line utility 'sesearch' in order to indicate a type/attribute to exclude respectively from the source and the target.
> It works for now for av rules searched semantically and i post it as attachment for evaluation.
> 
This patch should be sent to the selinux@xxxxxxxxxxxxx list where the
maintainers of setools would be more likely to see it.
> 
> 
> On Monday 13 September 2010 20:27:01 Daniel J Walsh wrote:
> On 09/13/2010 12:29 PM, Roberto Sassu wrote:
>>>> Hi all
>>>>
>>>> i'm investigating what types the domain user_t is allowed to execute, in
>>>> particular those that don't belong to the exec_type attribute.  I need
>>>> more details about the attribute 'noxattrfs' and the type 'etc_t', more
>>>> precisely in which circumstances they are executed by a regular user.
>>>> Thanks in advance for replies.
>>>>
>>>> Roberto Sassu
> 
> In addition to Domick's comments.
> 
> Remember the user_t is still governed by DAC.  Meaning that an
> executable labeled etc_t would only be executable by the user if he
> could execute it, even if SELinux was disabled.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkyPmnUACgkQrlYvE4MpobMWlwCghPQFzuI5KMtS/i+l0RBNn0Ps
daMAn3hM/vhClDg1Ij7N1Xm5zLK7yNcb
=kvUd
-----END PGP SIGNATURE-----
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux