SELinux Support for Ubuntu Hardy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



SELinux Support for Ubuntu Hardy

*** WARNING: EXPERIMENTAL! TESTING/DEVELOPMENT ONLY! ***

Hey everybody!

We've been really busy getting SELinux support ready for Hardy and it is now
possible to boot into an SELinux enabled Hardy using the packages that are
available in the Ubuntu-Hardened PPA on launchpad.

Hardy is currently in alpha with releases available here:

https://wiki.ubuntu.com/HardyHeron

At the time of this email the server distro boots in enforcing (which isn't to
say that everything works perfectly), but the desktop distro does not.
We're hoping to have this working in the near future.

Any feedback you have would be greatly appreciated :o}

More information is available on the Hardy SELinux wiki:

https://wiki.ubuntu.com/HardySELinux

Installing SELinux in Hardy:

 1. Update /etc/apt/sources.list by appending the following:

    deb http://ppa.launchpad.net/ubuntu-hardened/ubuntu hardy main
    deb-src http://ppa.launchpad.net/ubuntu-hardened/ubuntu hardy main

 2. Update repo:
    > apt-get update

 3. Install updated packages:
    > apt-get upgrade

    * These packages have SELinux support patches:
      * libpam0g [1]
      * openssh-server [2]
      * grub [3]
      * login [4]

 4. Install selinux:
    > apt-get install selinux

    * These packages will be removed:
      * apparmor
      * apparmor-utils

 5. Reboot

SELinux Support for Hardy Package Sources:

https://code.launchpad.net/~calebcase/+junk/selinux-support

[1] PAM was using a deprecated method of handling login contexts
<https://bugs.launchpad.net/ubuntu/+source/pam/+bug/187822>. The updated package
fixes this problem by backporting changes in upstream.

[2] OpenSSH Server autoconf scripts were failing to detect the libselinux
functions getseuserbyname and get_default_context_with_level
<https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/188136>. The updated
package fixes the configure bug by correctly setting LIBS before calling
AC_CHECK_FUNCS.

[3] Grub's update-grub lacks a trigger (and update-grub cannot be called
directly due to nested debconf issues)
<https://bugs.launchpad.net/ubuntu/+source/grub/+bug/189173>. In order to
seamlessly switch between AppArmor and SELinux we need to reconfigure the
menu.lst's defoptions.

[4] Login's PAM configuration had pam_selinux off by default. The updated
package turns on.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux