On Tue, 9 Sep 2008, Murray McAllister wrote: > Each Linux user account is mapped to an SELinux user identity when a user > login session is created, and the mapped SELinux user identity is used in the > security context for processes in that session. This is a long sentence which I suspect general users would not easily understand. Perhaps break it into two sentences, with the second as: "The SELinux user identity is indicated in the user's process security context for that session." Do you have a diagram breaking down the security context? You could refer to it here. > By default, on Fedora 10, > Linux users are mapped to the SELinux unconfined_u user. This is seen by > running the id -Z and /usr/sbin/semanage login -l commands: > > # id -Z > unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 This command will have different outputs depending on how the user is logged in, and there are seemingly (to the reader) two different ways to see the SELinux user mapping (a new concept to them at this point). I suggest breaking it up so you first show the mapping via semanage, then show the output of 'id -Z' for one of the Unix logins, also perhaps explaining the flow: - Linux users are mapped to SELinux users via policy - user commences login - pam_selinux maps the user and sets up the resulting security context - user shell is launched in that context > # /usr/sbin/semanage login -l > > Login Name SELinux User MLS/MCS Range > > __default__ unconfined_u s0-s0:c0.c1023 > root unconfined_u s0-s0:c0.c1023 > system_u system_u s0-s0:c0.c1023 > > The first row, __default__, defines that any new Linux users created that are > not specifically mapped to an SELinux user, are mapped to the SELinux > unconfined_u user. For a description of each column, refer to Chapter 3, > SELinux Contexts. I think you need to refer to a concrete example with the current text. > Unconfined Linux users are subject to executable and > writeable memory checks, and are also restricted by MCS (and MLS, if the MLS > policy is used). If they execute an object that the SELinux policy defines can Why introduce unfamiliar terminology like "execute an object" ? People execute applications. > transition from the unconfined_t domain to its own confined domain, the > unconfined Linux users are still subject to the restrictions of that confined > domain. Perhaps important to (re)state the security benefit of this, in that an unconfined user cannot override the security policy for a confined application just because they themselves are unconfined. -- James Morris <jmorris@xxxxxxxxx> -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.