Re: secadm question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Since I'm working with the source, Would it be effective for me to go
through and remove the sysadm rules that allow it to futz w/ the
policies? 

On Fri, 2008-02-15 at 11:23 -0500, Christopher J. PeBenito wrote:
> On Fri, 2008-02-15 at 10:14 -0600, Jeremiah Jahn wrote:
> > true, but I thought there was a tunable/boolean the disabled all that
> > for sysadm
> 
> No, there isn't.  It suffers the problems I discussed below.
> 
> > On Fri, 2008-02-15 at 11:09 -0500, Christopher J. PeBenito wrote:
> > > On Fri, 2008-02-15 at 10:09 -0600, Jeremiah Jahn wrote:
> > > > So for my purposes, to would probably be best to just make a secadm
> > > > user/role and add follow most of the interface for the original secadm
> > > > role?
> > > 
> > > You could do that, but it wouldn't stop sysadm from being able to do all
> > > the secadm things too, defeating the purpose of having a secadm in the
> > > first place :)
> > > 
> > > > On Fri, 2008-02-15 at 10:39 -0500, Christopher J. PeBenito wrote:
> > > > > On Fri, 2008-02-15 at 10:16 -0500, Stephen Smalley wrote:
> > > > > > On Fri, 2008-02-15 at 09:09 -0600, Jeremiah Jahn wrote:
> > > > > > > So if I change my build.conf to be mls I should be up and running. I'm
> > > > > > > on RHEL5 btw
> > > > > > 
> > > > > > Chris - how hard would it be to make this a separate tunable so that
> > > > > > people who want a separate security admin can turn that on without
> > > > > > enabling MLS?
> > > > > 
> > > > > Problematic.  The security admin pieces are nicely abstracted into an
> > > > > interface.  However, the problem is that it has some typeattribute
> > > > > statements, so we can't put that in a conditional.
> > > > > 
> > > > > There are two things that will eventually make this possible.  The plan
> > > > > is to move roles into their own modules, and at that point you should be
> > > > > able to just insert the secadm module.
> > > > > 
> > > > > > > On Fri, 2008-02-15 at 08:55 -0500, Paul Moore wrote:
> > > > > > > > On Thursday 14 February 2008 6:09:43 pm Jeremiah Jahn wrote:
> > > > > > > > > I see a number of places where the secadm_r role shows up, but It
> > > > > > > > > doesn't show up in the list of users and what not, Is there something
> > > > > > > > > simple I need to enable it, or 	do I need to build it from scratch?
> > > > > > > > > My goal it to have sysadm not able to modify policy enforcement, and
> > > > > > > > > my secadm not be able to do anything but. If there is a standard way
> > > > > > > > > to do this, I'd love to know.
> > > > > > > > 
> > > > > > > > I believe the secadm_r role is only defined for the "mls" policy builds; 
> > > > > > > > if you are running a "mcs" (the Fedora default) policy I don't think 
> > > > > > > > the secadm_r role is present.
> > > > > > > > 
> > > > > > > Boy, n.: A noise with dirt on it.
> > > > "Consequences, Schmonsequences, as long as I'm rich." -- "Ali Baba
> > > > Bunny" [1957, Chuck Jones]
> > First Law of Bicycling: No matter which way you ride, it's uphill and
> > against the wind.
San Francisco, n.: Marcel Proust editing an issue of Penthouse.

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux