Re: [PATCH 2/3] Thread/Child-Domain Assignment

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jul 29, 2008 at 04:15:44PM +0900, KaiGai Kohei wrote:
> KaiGai Kohei wrote:
> > [2/3] thread-context-checkpolicy.1.patch
> >   This patch add a new statement of TYPEDOMINATE for policy language.
> > 
> >     TYPEDOMINATE <parent type>  <chile type> [, <child type> ...] ;
> > 
> >   It defines expilct hierarchical relationship between two types.
> >   Existing name based hierarchy is dealt as TYPEDOMINATE is described
> >   implicitly.
> 
> I reconsidered that the statement should be replaced as follows,
> because "DOMINATE" is an associated term with MLS and roles/users
> also have name based hierarchy ideas now.
> 
>   HIERARCHY <parent type> TYPES <child type> [, <child type> ...];
>   HIERARCHY <parent role> ROLES <child role> [, <child role> ...];
>   HIERARCHY <parent user> USERS <child user> [, <child user> ...];
> 

I agree that TYPEDOMINATE is not a good choice. In dominance, you're
saying "whatever privileges x, y, & z have, give me those too."

I like to think of it as the parent type "circumscribing" or limiting
its children -- the parent draws a line in the sand and says "<child>,
you can grant yourself whatever permissions you want (hopefully no more
than you need), but whatever you do, don't cross this line!" The terms
used to should make that obvious. "Circumscribe" is fun to say, but
awkward to type, so how about:

    TYPELIMIT <parent type> { <child type> [, <child type> ...] } ;
    ROLELIMIT <parent role> { <child role> [, <child role> ...] } ;

It would read better to say:

    TYPE <parent type> LIMITS { <child type> [, <child type> ...] } ;
    ROLE <parent role> LIMITS { <child role> [, <child role> ...] } ;

but that conflicts with existing syntax. Hence the patterning after
attributes and aliasing.

I'm not sure what hierarchy for users implies, or why it's needed. If we
have adequate support for hierarchy/dominance in roles, doesn't that
suffice for users? After all, users can't do anything their roles don't
permit them to. I guess I see users as a slightly different case because
they are going to be more per-system than roles or types, so if you
don't trust system administrators to set a user's roles correctly, you
shouldn't make them a sysadmin. Or am I missing something?

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux