Re: access(2) vs. SELinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2009-04-20 at 15:08 -0400, Eric Paris wrote:
> On Mon, 2009-04-20 at 14:55 -0400, James Carter wrote:
> > On Mon, 2009-04-20 at 11:11 -0400, Eric Paris wrote:
>  
> > > I strongly and vehemently oppose any solution that is a blanket
> > > dontaudit on access calls, even if there is a flag to dontdonaudit.
> > > This might be fine in "secure" shops where everyone understands and is
> > > willing to suffer some extra SELinux pain but not here.  If SELinux gets
> > > in the way it better scream to high heavens for my customers.
> > > 
> > 
> > I think that what we need is a check to see if the domain is allowed to
> > call access() on the object.  If it is not allowed, then a denial is
> > generated; if it is, then the results of the desired permission check is
> > returned, but denials are not audited.
> > 
> > This would better reflect what is actually happening.  When a domain
> > calls access(), it is really reading the security properties of the
> > object.
> 
> Your still just talking about a big global dontaudit hammer on the
> EACCESS people get back from access().  Not only that, you propose a new
> permission every domain needs of which I don't see any security benefit
> (outside of maybe helping make sure people can't probe policy willy
> nilly).
> 
If you don't care whether or not someone is probing the policy, then why
not just always use the _noaudit interfaces?

What is the security benefit of the access_* permissions?  It looks like
they are only going to be used to determine if a denial should be
generated.
  
> If access() had better return semantics than yes/no this might be a good
> approach, but I don't see how a single extra perm helps anything and I'm
> still railing against the global dontaudit hammer.
> 
> -Eric
-- 
James Carter <jwcart2@xxxxxxxxxxxxxx>
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux