Re: avc: smartcard token login

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/06/2010 05:57 PM, Daniel J Walsh wrote:
> On 12/06/2010 10:18 AM, Dominick Grift wrote:
>> On 12/06/2010 03:43 PM, Daniel J Walsh wrote:
>>> On 12/05/2010 04:44 PM, Dominick Grift wrote:
>>>> On 12/05/2010 10:29 PM, Mr Dash Four wrote:
> 
>>>>>> I've been through this duplicate declaration/out of scope issues many
>>>>>> times. It is one of the reason that i maintain my own policy instead of
>>>>>> using fedoras' policy.
>>>>>>   
>>>>> I do something similar - for different machines (which have different
>>>>> requirements) I have prepared separate patches based on the version of
>>>>> the fedora policy used and I just apply them (looking for
>>>>> failures/hunks) when a new version of the policy is released.
> 
>>>>> One of the things which annoys me no end in the fedora policy is using
>>>>> the scatter-gun approach and granting access to the 'generic'
>>>>> net/node/interface to a host of modules as well as granting access to
>>>>> all 'client' packets. That is fundamentally wrong imo!
> 
>>>> That is actually not a Fedora specific issue. Upstream refpolicy has the
>>>> same. It is done to preserve compatibility. People that use the
>>>> networking controls are expected to be able to customize the policy i
>>>> believe.
> 
>>>> I think that Fedora and refpolicy are discussing to make this work in
>>>> other ways. I personally have no problem with it since i do not use the
>>>> network controls any ways.
> 
>>>> My issue with Fedora policy is:
> 
>>>> stuffing stuff into base.
>>>> - Means module cannot be disabled/replaced. Means youll more often get
>>>> into duplicate declaration / out of scope issues.
> 
>>>> fedora (and refpolicies for that matter) vision for the user space.
>>>> - they both have different visions that cannot co-exist in one policy.
>>>> (fedora's unconfineduser module is one issue)
> 
>>>> Both Fedora and refpolicy do not have the desktop layer confined. which
>>>> means users interact directly with the system layer basically bypassing
>>>> the desktop layer. (which means the userdomains need much more
>>>> privileges than they would if the desktop layer was confined)
> 
>>>> Fedora easily permits access to all user home content which is not good
>>>> for confinement of the user space. ( i like to keep things least privilege)
> 
>>>> Fedora and refpolicy both have many unconfined domains.
>>>> - Means that it you want to make an unconfined domain, confined. you
>>>> will most likely first have to fix a bunch of bugs (because fedora
>>>> developed the policy as being unconfined) In my view all domains should
>>>> atleast in rawhide be confined. When it goes stable they can make them
>>>> unconfined but it should as much as possible work confined as well.
> 
>>>> Not that when i remove the unconfined_domain() interface that i have to
>>>> spend a week to make things work.
> 
>>>> But easier said then done. Fedora in the meanwhile also has to deliver a
>>>> workable product for the general audience.
> 
>>>> I dont have that problem with my personal branch, and thats why i just
>>>> maintain my own stuff. No one to tell me what to do... no pressure..
>>>> just fun and security.
> 
>>>>>> Sorry, i have not tested it.
>>>>>> Yet, i am pretty sure it would work in my personal policy.
>>>>>>   
>>>>> I'll do that tomorrow when I have the chance!
> 
> 
> 
> 
>>> Dominick did you check these changes into the Rawhide branch?
> 
>> No, some issues are easier to solve than others. Some issues would have
>> a pretty big impact on policy in the short term.
> 
>> issues should in my view be discussed in depth first with all parties
>> involved, and should find common ground first (fedora and refpolicy)
>> because implementing this would require a lot of work and changes. I
>> also do not have all answers to all issues yet and i would want input
>> from other experienced parties first.
> 
>> My view is that Fedora/refpolicy should foster modifications by
>> end-users. That means that we should at least make it possible to
>> tighten policy more.
> 
>> So i am *not* saying:
> 
>> - no unconfined_domains().
>>   i am just saying not by default. Atleast not in the development branch
>>   i guess we could make them conditional and just toggle them off in
>> rawhide and toggle them on when it gets branched.
> 
>> - no access to all user content.
>>   i am just saying preferably not by default (atleast make it
>> conditional). and that we should aim to make it also work without in
>> some scenarios. This is related to bypassing the desktop layer. so for
>> example if the "use desktop layer" conditional is true then dont allow
>> access to all user content (where possible) else be a bit more permissive.
> 
>> - no bypassing of desktop layer.
>>  i am just saying lets try not bypassing it possible and maybe even
>> default. Maybe make the bypassing of the desktop layer optional/conditional.
> 
>> Like i said its easier said than done. I have some good ideas that work
>> for me but my policy does not have as many requirements as fedoras
>> policy has.
> 
>> If i thought i could deal with all these issues by my self, then i would
>> have made the changes to the fedora branch myself. I think instead we
>> all need to understand and share the same vision and goals so that we
>> can combine our efforts.
> 
>> Getting modules in fedora out of base will mean in my view that large
>> chunks of policy will no longer work in the current shape and will
>> likely need to be reimplemented. (i guess we would probably need to take
>> a few steps back in order to clear the way forward.)
> 
>> Tough issues in my view and this should certainly not be seen as
>> criticism to fedora- or refpolicy. I am just trying to highlight some of
>> the issues i see, that make it hard(er) to build on both policies.
> 
>> The initial thing i can do is refer to my custom branch that at least
>> makes an initial attempt at solving these issues and even that is a work
>> in progress and in its current shape far from my vision of how it should
>> look (it requires a lot of time and a lot of hands-on experience in
>> order to figure out how to best tackle particular issues. Some of which
>> i was able to identify and others that i have yet to identify.
> 
>> http://fedorapeople.org/gitweb?p=domg472/public_git/refpolicy.git;a=summary
> 
> 
>>> selinux mailing list
>>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
> 

just pushed it here:

http://git.fedorahosted.org/git/?p=selinux-policy.git;a=blobdiff;f=policy/modules/system/authlogin.if;h=ceadd0092afc825311e34ab099309561da7329da;hp=652110960f4d5b35b9ed187439ecac3a639b6b40;hb=afc9bf6c38c9eaafde0318927cc158f4f663f74d;hpb=7adc2a72c5665dd5506a8c214f189bcd910987a5
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkz9FzYACgkQMlxVo39jgT99HACeIbW0R9oxupgmw0mp2/HpJ9Na
EYAAnRzisEKGvqlAcHqL/pCz0b1tRLCb
=U9Bv
-----END PGP SIGNATURE-----
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux