Re: daemons and MCS categories

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On May 18, 2009, at 3:31 AM, KaiGai Kohei wrote:

Joe Nall wrote:

On May 11, 2009, at 12:11 AM, KaiGai Kohei wrote:

Are anyone interested in the daemon process with mcs categories?

My proposition tries to cover general daemon processes, but my
major concern is apache/httpd performing without any categories.
If we focus on the apache/httpd, we can add the following policy
within the mod_selinux.pp, and it enables to run httpd_t with
mcs categories.

optional_policy(`
init_ranged_daemon_domain(httpd_t,httpd_exec_t,s0 - mcs_systemhigh)
')

The mod_selinux.so is an apache/httpd module which enables to
change its own security context prior to launching contents
handler. We can set up the module to drop all the categories
for unauthorized http clients, and rest of requests to perform
with appropriate categories.

The above rule will be available only when mod_selinux is installed.
I don't think it gives any impact for existing stuffs.

Any comments?

FWIW, we run apache 1.3 out of xinetd at multiple contexts using labeled networking. HTTP performance is surprisingly good. HTTPS performance is unacceptable, so we are using an HTTPS reverse proxy in a DMZ for single
level network services to the 'enterprise'.

Are you saying that xinetd can launch multiple apache/httpd daemon processes
with individual security context?

Yes

If so, unfortunatelly, it is different from
what I would like to achieve. :(

I guess the security context of the daemon process is determined prior to receiving http-requests come from users, but the security context to be assigned on web application depends on the authentication-header within the http-request-headers, so we cannot know who connected to on xinetd time.

We are basing the context on the context of the connecting user, delivered by either netlabel or labeled IPSec. We are not changing context based on apache user authentication.

Or, are we talking about topics in different layer?

Sounds like it. Just wanted to point out that you might not need to trust apache to achieve some of your goals.

joe



Thanks,
--
OSS Platform Development Division, NEC
KaiGai Kohei <kaigai@xxxxxxxxxxxxx>

--
This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux