Re: selinux policy UBAC question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Oct 25, 2010 at 05:06:05PM +0200, Roberto Sassu wrote:
> On Monday, October 25, 2010 04:27:22 pm Dominick Grift wrote:
> > On Mon, Oct 25, 2010 at 02:45:54PM +0200, Roberto Sassu wrote:
> > > Hi all
> > > 
> > > i'm using the selinux policy shipped with Fedora 13 and UBAC turned on.
> > > I removed the unconfined package and i noted the unconfined_t domain with
> > > unconfined_u user is unable to access a file with another selinux user.
> > > I tried to build a custom module which contains the line:
> > > 
> > > ubac_process_exempt(unconfined_t)
> > 
> > like it says this only exempts the callers access to processes
> > 
> > in the sysadm module this is added:
> > 
> > ubac_process_exempt(sysadm_t)
> > ubac_file_exempt(sysadm_t)
> > ubac_fd_exempt(sysadm_t)
> > 
> > That should pretty much exempt the caller.
> > Note though that ubac has issues, i am not sure how much issues in fedora but in normal refpolicy the *_admins do not work because you want to start services as system_u else unpriv users wont be ableto access resources. There is no way to change to system_u unless i guess you use runcon.
> 
> I'm using the UBAC feature in order to identify the combination of user/program that is allowed to acces a specific label. UBAC permits to implement this access control model by
> using the policy for the user_t domain and assigning a selinux user to each user in the platform.
> My target is to have an usable system and it seems that the ubac is not yet ready to be used in desktop platforms.
> Another solution is to create different user domains by using the proper template. There are other alternatives in order to implement this access control model?

If i concerns apps started by users, then i think it may still be possible. Back in the day we used prefixes for process and files created by processes started by users. User home directories had a role prefix. now all users use the user_home(_dir)_t. But back then we had it prefixed like staff_home_t, users_home_t, someuser_home_t

that allowed use to seperate users and their resources. We used to implement these prefixes in the per role templates for user apps

like for example: allow staff_t staff_mozilla_t:file read_file_perms;

We still use per role templates but only to seperate processes, we no longer use it to seperate user home content.

The -P (prefix option) with semanage was used to define the prefix to be used for user home dirs

semanage user -a -L s0 -r s0-s0:c0.c1023 -R "staff_r sysadm_r" -P staff staff_u (i believe it was)

Not sure if this prefixing of user home dirs still works.


> Thanks.
> 
> > 
> > That brings us to the second issue that is that you probably want to build policy with sysadm_direct_initrc option enabled. That way to can for example run rpm /yum in the rpm_t domain with system_u. Else it will install files with sysadm_u id and then ubac users cannot access it.
> > 
> > Those two issues were enough reason for me to turn it of. (especially not being able to use the *_admins.
> > 
> > 
> > > 
> > > but this does not solve the issue. How do i configure the policy to allow some
> > > domains to circumvent the UBAC enforcement?
> > > Thanks in advance for replies.
> > > 
> > > Roberto Sassu
> > > --
> > > selinux mailing list
> > > selinux@xxxxxxxxxxxxxxxxxxxxxxx
> > > https://admin.fedoraproject.org/mailman/listinfo/selinux
> > 

Attachment: pgpZJ8EviCb0y.pgp
Description: PGP signature

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux