Thanks for the info, all is now clear! One more question (from an SELinux newbie!) that has been nagging away at me in regards to the MLS portion of the security context. In the MLS label we have the sensitivity (s0, s1, etc) and the category (c0, c2, etc). Now, as for the categories, its seems clear that in order for label1 to (potentially) dominate label2, then label1 must contain all the categories contained in label2 (i.e., *:c1,c3 can potentially dominate *:c3 where as *:c1 can never dominate *:c3). c0, c1, etc are just names of categories and the only relationship between them is equality or non-equality. But with the sensitivity we have an ordering relationship, e.g., s3 is greater than (or higher, or strictly dominates) s1. The numbering applied to the sensitivity seems to imply (or define?) what that ordering is (s3 is greater than s1 because 3 is greater than 1). Is this numerical ordering a fixed part of the SELinux MLS policy or are the sensitivities simply "names" and how the policy is written defines the ordering. That is, is it possible for a configuration of SELinux MLS to have s0 strictly dominate s3? My reason for asking is, if the "numerical ordering" of the sensitivities is always true then I can easily write my own functions to perform dominance checks of the MLS labels and those functions do not need to consult the SELinux API. If the sensitivities are just "names" and the policy instance can define any ordering relationship, then any functions written to perform dominance checks must call the SELinux API and seem non-trivial because no dominance check (only) API is provided and the TE behavior will somehow need to be "filtered" from the security check result. Blessings, Andy Stephen Smalley wrote: On Mon, 2008-07-21 at 20:35 -0400, Eric Paris wrote:On Mon, Jul 21, 2008 at 7:10 PM, Andrew Warner <warner@xxxxxxxxx> wrote:Hello, I am currently developing an "SELinux aware" DBMS (primarily TE and MLS) that is characterized by: 1. The need to store a security context (in some recoverable form) in our persistent database (storage size of the context is an important factor) 2. The need to frequently perform a high number of security access checks in a performance sensitive way My question relates to the first characteristic from above. I am having trouble deciding on the best way to store the security context in the database. From my research I see (I think!) three different representations for a security context: 1) string; 2) raw; 3) SID. The string representation, generally, seems clear as this is what is shown in all documentation as the context representation that exists in user space. My only question regarding the string representation is: is there is any hard limit to the length of the security context string? Do I need to allow for no theoretical size limit on a context string if I choose to store it?No hard limit that I can think of. There might be one somewhere but I wouldn't count on it.Correct - the core logic imposes no fixed limits on the context strings, although the kernel interfaces do impose certain practical limits (e.g. page size). The NFSv4 support will likewise impose certain limits in accordance with existing limits on the size of containing structures.I am inferring the the raw representation exists from seeing *_raw functions (e.g., security_compute_create_raw) referenced in selinux header files. Other than seeing these functions declared I am having trouble finding out much about a raw representation. Is there any advantage to storing/manipulating a context in its raw representation? That is, are they more suited for a fast security access check, are they smaller in size, or do they have a fixed or maximum length?The _raw is actually what you want. _raw basically just means strings without any translations from things like mcstransd. Given a context like user_u:role_r:type_t the "raw" on an MLS system maybe "user_u:object_r:type_t::s0." Throwing a context with the MLS portion attched at the !raw functions will work just fine.The SID I have also seen mentioned in various documentations but can determine little about them. My guess is that they are an integer value that is used for fast internal access, particularly for the AVC. Are SIDs indeed integer values? Are they persistent or are they meaningful only for a particular OS session?That's exactly what they are. They are kernel internal integer representations that are (for the most part) only meaningful for that session. There are some 'initial sids' that are always the same, but no userspace app should care about 'sids' in the general sense.I have also considered maintaining my own internal, persistent mapping between string based contexts and an integer representation, the mapping being stored/indexed inside the DBMS. This gives me a small storage overhead with a fixed size.I don't have a problem with internal mapping like that.The original SELinux filesystem labeling implementation used something like that - they were called "persistent security identifiers" (PSIDs), and were maintained as private indices per-filesystem that mapped to security context strings.But, don't we already have sepostgresql? Maybe you should be looking to see if that fits your needs or you might get ideas from the work that they performed?Yes, I'd recommend looking at SE-PostgreSQL as a worked example of applying the Flask architecture to a DBMS, including not only its approach to storing security contexts but also its approach to the userspace AVC. You can find a link to that work from the Related Work page off of the SELinux web site. -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message. |