Re: openvpn and script execution

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> The way the Samba policy module does things is to define a specific
> directory for scripts:
>
> samba.fc:
> ...
> /var/lib/samba/scripts(/.*)?
> gen_context(system_u:object_r:samba_unconfined_script_exec_t,s0)
> ...
>
> This way you keep the scripts separate from ordinary system binaries,
> they automatically get the correct type when installed from rpm, and you
> don't need to create a new file context every time you add a script.
>   
OK, but my initial question still stands - both openvpn_t and 
openvpn_sudo_t need to have access to this directory at least. So, if I 
define a new script type I have to alter openvpn.te and make the 
directory where the scripts are located (and their new domain!) 
available/accessible to openvpn_t. I have to do the same with 
openvpn_sudo_t as well.

One other possible solution would be to leave the directory where this 
scripts are as openvpn_etc_t, name the scripts with this new domain and 
then alter the new module to have (read-only) access to openvpn_etc_t 
and full access to this new domain for the scripts - in this way I am 
not altering openvpn.te (which is part of the main policy), but I am 
creating a potential security hole by granting this new domain 
(openvpn_sudo_t) access to openvpn_etc_t which includes other (mainly 
configuration) files, which belong to openvpn...not as straight-forward 
is it? Or have I missed something?

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux