Re: Strange requirement: confine unconfined

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 03/26/2015 04:08 PM, W. Michael Petullo wrote:
> I have a requirement which seems to be most easily satisfied by confining
> unconfined users. Please let me explain:
>
> Imagine some file "foo" that must remain secret. Now imagine a dynamic
> system which must allow arbitrary (possibly untrustworthy, possibly
> as-root, possibly user-installed) programs to run. Nothing matters except
> keeping "foo" secret.
>
> Is it possible to construct an SELinux policy which would satisfy such
> a requirement? 
>
> For example, it would be helpful to allow users to run their programs
> unconfined (to allow user-installed, policyless, etc. programs) yet still
> enforce the policy as it pertains to "foo". Of course, it further seems
> that SELinux would also have to ensure certain other restrictions apply
> to unconfined users, such as running semodule or insmod.
>
> Alternatively, would it be possible to construct a not-quite-unconfined
> user by granting all syscalls on all objects *except* those labeled
> "foo_t" (and semodule, etc.)?
>
> I have worked with custom policies before both for software I have written
> and for standard software, but this seems a bit different. It may be that
> I have my model wrong, so I would appreciate any guidance whether along
> the implementation lines I suggested or not (but holding to the original
> requirements). It is also possible that I have overlooked some existing
> literature.
>
> Thank you!
>
Probably not.  I would suggest you look into Containers with SELinux
wrappers though.
That might get you close to what you want.
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux





[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux