SE-DBUS policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Is there any documentation on the SELinux behavior on dbus?  From some
discussion in the IRC channel, the policy templates (which is still
basically the NSA example policy stuff) don't match the code.

The templates creates a type:

type [connector domain prefix]_dbusd_[bus owner prefix]_t;

so if you have staff_r's connection to the system bus, you get
staff_dbusd_system_t.  Then there is a type_change so dbus knows what
label to give the connection:

type_change [domain] [bus owner prefix]_dbusd_t:dbus [connector type];

which results in something like this:

type user_mozilla_dbusd_system_t;
type_change user_mozilla_t system_dbusd_t:dbus user_mozilla_dbusd_system_t;

Then based on the template, I believe the premise was that the dbus
permissions would be between these derived types.  However, in the
policy there are no dbus:send_msg rules for these types (except for the
ones given in the templates), and instead rules are against the real
domains, (e.g. allow NetworkManager_t dhcpd_t:dbus send_msg;).  So I
looked in the dbus code, and I didn't see any calls to
security_compute_relabel().  It looks like this bit of policy is dead,
and the templates need to be revised.

-- 
Chris PeBenito
Tresys Technology, LLC
(410) 290-1411 x150


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux