Re: Policy infrastructure problems and improvement

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Apr 10, 2009 at 08:45:06AM -0400, Stephen Smalley wrote:
> On Fri, 2009-04-10 at 17:43 +0500, Alexey S wrote:
> > ...
> > And if libqpol-based tools would be able to use that mapping when displaying
> > their results.
> > Otherwise it is too confusing to see @ttr0121 instead of domain_type during policy
> > analysis, especially when numbers change after module (re|un|)load.
> 
> policy.24 already makes this change (preservation of attribute names in
> the types symtab in the final kernel policy).
Great! I really missed that thing. I have ever tried to hack policy compiler to
write the attributes mapping to the stderr...

> 
> You can however already see the attribute names with policy < 24 by
> running apol and friends on the modular policy rather than the final
> kernel policy.
There are some use-cases where there is no modules on the local machine.
And thus the policy is not "managed". And still it is not complete and needs
some analysing/understanding.
By the way, is it impossible to add some cryptographics signature to the binary policy
(and perhaps to the modules)? I would like to block REloading of policies without proper
signature (btw, it is very useful in the mentioned use-cases). I think it is some
infrastructure piece that is missing too.



-- 
Alexey S

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux