user guide draft: "Confined and Unconfined User Domains" review

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

The following is a draft of the "Confined and Unconfined User Domains" section for the SELinux User Guide. Any comments and corrections are appreciated.

This is the last part of intro text.

Thanks.


Confined and Unconfined User Domains

Each Linux user account is mapped to an SELinux user identity when a user login session is created, and the mapped SELinux user identity is used in the security context for processes in that session. By default, on Fedora 10, Linux users are mapped to the SELinux unconfined_u user. This is seen by running the id -Z and /usr/sbin/semanage login -l commands:

# id -Z
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
# /usr/sbin/semanage login -l

Login Name                SELinux User              MLS/MCS Range

__default__               unconfined_u              s0-s0:c0.c1023
root                      unconfined_u              s0-s0:c0.c1023
system_u                  system_u                  s0-s0:c0.c1023

The first row, __default__, defines that any new Linux users created that are not specifically mapped to an SELinux user, are mapped to the SELinux unconfined_u user. For a description of each column, refer to Chapter 3, SELinux Contexts. Unconfined Linux users are subject to executable and writeable memory checks, and are also restricted by MCS (and MLS, if the MLS policy is used). If they execute an object that the SELinux policy defines can transition from the unconfined_t domain to its own confined domain, the unconfined Linux users are still subject to the restrictions of that confined domain.

The following confined user domains are available in Fedora 10:

guest_t: The guest_t domain is used for minimal-privileged Linux users. Linux users in this domain are not allowed to use the X Window System, run set user ID (setuid) applications, and do not have network access. For example, Permission denied errors are returned when using the ping and ssh commands. These users are allowed a log in via a terminal (including ssh).

xguest_t: The xguest_t domain is also for minimal-privileged Linux users, but lets them use the X Window System. Linux users in this domain are not allowed to run setuid applications, and the only network access allowed is Firefox connecting to web pages. These users are allowed to log in via the X Window System and a terminal.

user_t: The user_t domain is for standard Linux users. Linux users in this domain are not allowed to run setuid applications. These users are allowed to log in via the X Window System and a terminal, and have full network access.

[I think I got this wrong. I got permission denied when trying to use ping as a user_u user (useradd -Z user_u test)]

staff_t: The staff_t domain is similar to user_t, except that Linux users in this domain are allowed to run the setuid sudo application.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux