Re: user guide draft: "Introduction" review

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



James Morris wrote:
On Thu, 28 Aug 2008, Murray McAllister wrote:

* Help limit the damage done by configuration mistakes. An administrator
may forget to limit zone transfers when running ISC BIND; however, the
default SELinux context for zone files does not allow them to be updated
by zone transfers, or written to by named, the ISC BIND daemon, and other
subjects.
Someone mentioned "What is ISC BIND". I need to change this to a more simple
example.

You could use "DNS server", perhaps with a reference/link to an explanation of what it is.

How about:

Help limit the damage done by configuration mistakes. Domain Name System (DNS)[1] servers can replicate information between each other. This is known as a zone transfer. Attackers can use zone transfers to update DNS servers with false information. When running the Berkeley Internet Name Domain (BIND)[2] DNS server on Fedora 10, even if an administrator forgets to limit which servers can perform a zone transfer, the default SELinux policy prevents zone files[3] from being updated by zone transfers, the BIND named daemon, and any other subjects.

SELinux is a Linux security module that is built into the Linux kernel. Part
of this module is the SELinux security server. The security server is driven

IMHO, "security server" is unnecessary jargon in a general explanation context. (The server part will likely confuse all who are not also familiar microkernel design and related Flask/Flux history).

I tend to explain it along the lines of: security policy is loaded into the kernel, and consulted when a security-relevant access is taking place. SELinux will veto the access if it is not allowed by policy.


by loadable policy rules that define what access is allowed. When a subject
attempts to interact with an object, for example, a process opening a file, a
hook in the Linux kernel intercepts the system call the process makes to open
the file. The hook calls the security server to check if access...

Make it more concrete, e.g. when a process attempts to open a file, this operation is intercepted in the kernel by SELinux. If the operation is allowed by policy, it is allowed to proceed, otherwise, it is blocked and the application receives an error.

Generally, removing jargon and uncessary abstractions is the way to go. There is already plenty of detailed technical documentation for those that need to understand the internals.

How about:

SELinux is a Linux security module that is built into the Linux kernel. SELinux is driven by loadable policy rules. When security-relevant access is taking place, such as when a subject attempts to open an object, the operation is intercepted in the kernel by SELinux. If an SELinux policy rule allows the operation, it continues, otherwise, the operation is blocked and the subject receives an error.

SELinux decisions, such as allowing or disallowing access, are cached. This cache is known as the Access Vector Cache (AVC). This decreases how often SELinux policy rules need to be checked, which increases performance. SELinux policy rules have no affect if DAC rules deny access first.

Thanks for your help.

[1] http://en.wikipedia.org/wiki/Domain_Name_System
[2] http://www.isc.org/index.pl?/sw/bind/index.php
[3] Text files that include information, such as hostname to IP address mappings, that are used by DNS servers.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux