Re: [RFC][PATCH v2] selinux: support deferred mapping of contexts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2008-05-01 at 22:11 +1000, James Morris wrote:
> On Thu, 1 May 2008, Stephen Smalley wrote:
> 
> > It isn't a perfectly general solution, of course.
> > 
> > An alternative approach would be for rpm to load policy at least
> > defining the types first before setting down the files, which was our
> > original preference, but that wasn't viewed as workable by the distro
> > folks.  It might be easier if we had a specific SELinux kernel interface
> > (i.e. another selinuxfs node) that permitted adding types w/o performing
> > a complete policy reload.
> 
> I gather the problem is build hosts where you don't want to give that much 
> privilege to users.

No, it isn't about privilege.  It is about:
1) Being able to handle new labels not known to the build host policy
w/o otherwise changing the build host policy (i.e. we do not want to
wholesale replace the build host policy with the policy for the
distribution image we are building, and they may be quite different in
nature - in terms of applications covered, strict vs. targeted, mcs vs.
mls, etc), and
2) Avoiding the performance overhead of a complete policy reload on each
package install.

So our options are either to provide a way to set unknown labels on disk
(the current patch) or to provide a lightweight mechanism for adding new
labels to an existing policy (difficult for the reasons already
described, plus it is even more of an issue for e.g. building a mcs or
mls enabled distro on a non-mcs/mls build host, e.g. building RHEL5 on
RHEL4, as then you have another label component completely foreign to
the build host with no way to define it).  Or a mechanism for a
hierarchy of policies (complex, and not clear how to handle objects as
they may be visible to processes operating under more than one policy,
e.g. both inside and outside of the chroot).

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux