Re: Dropping SELinux privileges

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, May 15, 2009 at 02:33:29PM -0400, Joshua Brindle wrote:
> Sebastien Raveau wrote:
>> Hi everybody!
>>
>>
>> As a personal challenge I am trying to reach "state of the art"
>> security on my home router... and for that I'm using SELinux of course
>> ;-)
>>
>> I have everything setup and working, but what intrigues me is: isn't
>> there a way to drop SELinux privileges?
>>
>> I mean, many programs require privileges only during their startup
>> phase, and restricting their rights from the outside proves
>> impossible; that's why volontary chroot(), setgid() and setuid() are
>> so useful: the program decides when to relinquish its privileges.
>>
>> For example, a program like OpenVPN should only be allowed network
>> I/O, but because its initialization invokes shell commands, we have to
>> give it many more rights than it actually needs. Granted, in the case
>> of OpenVPN the combination with setuid and chroot solves the shell
>> commands problem, but this still makes policy files too complex...
>>
>> Maximum (theoretical) security could be reached if a program could be
>> allowed to switch from some policy to an even more restrictive policy,
>> and very simple policy files could be written if a program could be
>> allowed to start unconfined and when ready apply a policy to itself,
>> which is basically the same.
>>
>>
>> I couldn't find such a thing in the SELinux API: have I misread? Or it
>> does not exist and perhaps I could contribute it? :-)
>>
>> Best regards,
>>
>
> SELinux has a concept of type transitions to change the type (or domain) 
> of a process over an exec(). So the openvpn example would type transition 
> when it runs the shell commands and the shell commands would run in a 
> less privileged domain.
>
> There is also a way to change the domain of a process at runtime called 
> setcon() though we prefer transitions over exec() because they can be 
> enforced and less state is passed over exec than available in a running 
> process.
By the way, why there is no type transition on fork? It would help a lot
on confining traditional unix services with minimum effort, don't you think?
Everybody knows that there is some common model - parent is listener, children
are workers, but all code resides in one binary. Splitting it into separate
programs requires some effort, you know. One extra file in /proc will easily
help to "convert" such applications to SELinux.
You will have to just change the starup script: after parent is started you just write
to /proc file the required children's context (assuming it is the same across all forks),
and that's it, no extra patches to application is needed, no recompilation.
Isn't it easy and robust solution? Am I wrong or what?
Or maybe such thing already present somewhere?

>
> --
> This message was distributed to subscribers of the selinux mailing list.
> If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
> the words "unsubscribe selinux" without quotes as the message.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux