Re: adding objects classes and permissions to policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2008-10-17 at 11:45 +0200, Andy Warner wrote:
> 
> 
> Stephen Smalley wrote: 
> > On Thu, 2008-10-16 at 15:53 -0400, Stephen Smalley wrote:
> >   
> > > On Thu, 2008-10-16 at 21:40 +0200, Andy Warner wrote:
> > >     
> > > > When adding new object classes and permissions to SELinux policy is it
> > > > necessary to re-create flask.h and av_permissions.h header files so
> > > > that a user-space object manager can access the associated defines? If
> > > > so, would someone give me some pointers as to how these are
> > > > generated? 
> > > >       
> > > You should use the dynamic class/permission lookup facilities for any
> > > new code.  man selinux_set_mapping
> > > 
> > > XSELinux and SE-PostgreSQL are already using it I believe.
> > >     
> > 
> >   
> I can't find any evidence that my version of libselinux contains the
> selinux_set_mapping function. I am using CentOS 5.1 with libselinux
> version 1.33.4. I have been learning RHEL 5 tends to be a bit behind
> the times with regards to SELinux functionality. Does libselinux
> 1.33.4 not have the dynamic class/permission lookup facilities? If it
> does not, any advice on how to add object classes / permissions to
> policy ? Moving to Fedora is a possibility, maybe it's worth
> considering as this would not be the first issue we have had with an
> outdated SELinux mechanism on RHEL 5 (?). We are integrating SELinux
> TE / MLS with our commercial DBMS, and I have learned that RHEL 5 does
> not have the database related object classes /permissions in the base
> policy where the most recent Fedora does, hence my need to add the
> object classes /permissions in RHEL 5.

To use the object class/perm discovery support, you'd need to use a
modern libselinux (>= 2.0.21) and a modern kernel (>= 2.6.23).

Note that regardless of whether you use object class/permission
discovery support, you have to add the classes and permissions to the
policy flask definitions and rebuild your policy.  The object class/perm
discovery support just changes how the object manager obtains the values
- whether they are hardcoded into it or dynamically looked up at object
manager startup.  But the policy itself still needs to be taught about
them.

As Ted said, the old way to teach libselinux about new classes/perms is
described in:
http://selinuxproject.org/page/Adding_New_Permissions

After updating the policy/flask files, you run make in the flask
subdirectory (different Makefile than the policy build one) and it will
regenerate the header files that are used by libselinux and by the
kernel.  Then you can install the libselinux ones into a libselinux
source tree via make LIBSELINUX_D=/path/to/libselinux tolib, and then
rebuild your libselinux.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux