Re: Postfix with domain keys

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2009-01-06 at 09:13 -0500, Stephen Smalley wrote:
[snip]
> > 
> > Audit2allow "recommended" to allow transition from postfix_master_t to
> > port_t and then allow create socket port_t, but I didn't feel it much
> > secure...what do you think?
> 
> I'm not sure I quite follow the above, as a transition usually means
> that we are changing from one context to another, and there is no
> transition in the above situation, just an attempt to bind to a given
> port.
> 
> The actual verbatim output of audit2allow would likely be more useful.
> Without any semanage entries, I would have expected it to be something
> like:
> 	module mypostfix 1.0;
> 	require {
> 		type postfix_master_t;
> 		type port_t;
> 		class tcp_socket name_bind;
> 	}
> 	allow postfix_master_t port_t:tcp_socket name_bind;
> 
> See for example:
> http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385
> http://docs.fedoraproject.org/selinux-user-guide/f10/en-US/sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow.html
> 

Correct me if I'm wrong, but allowing this will accept the domain use
any tcp socket, and call me paranoid, but it could allow postfix
something like a reverse telnet or something. Is it right? (I've already
warned you that I'm a complete rookie, so it could be a ridiculous
response).


Thanks Stephen.


Martín


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux