Re: daemons and MCS categories

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>>> FWIW, we run apache 1.3 out of xinetd at multiple contexts using labeled
>>> networking. HTTP performance is surprisingly good. HTTPS performance is
>>> unacceptable, so we are using an HTTPS reverse proxy in a DMZ for single
>>> level network services to the 'enterprise'.
>>
>> Are you saying that xinetd can launch multiple apache/httpd daemon 
>> processes
>> with individual security context?
> 
> Yes
> 
>> If so, unfortunatelly, it is different from
>> what I would like to achieve. :(
>>
>> I guess the security context of the daemon process is determined prior to
>> receiving http-requests come from users, but the security context to be
>> assigned on web application depends on the authentication-header within
>> the http-request-headers, so we cannot know who connected to on xinetd 
>> time.
> 
> We are basing the context on the context of the connecting user, 
> delivered by either netlabel or labeled IPSec. We are not changing 
> context based on apache user authentication.

Understood.

>> Or, are we talking about topics in different layer?
> 
> Sounds like it. Just wanted to point out that you might not need to 
> trust apache to achieve some of your goals.

We need to trust the apache/httpd applies its authentication and
dropping privileges correctly. However, all the new domain is
bounded by httpd_t, so there are no fundamental differences outside
of the httpd_t.

The purpose of this effort is to associate a concept of web-user
and a security context while apache/httpd performs as an agent of
the human-user. So, I would like to restrict a part of privileges
within a set of them allowed to httpd_t.

Thanks,
-- 
OSS Platform Development Division, NEC
KaiGai Kohei <kaigai@xxxxxxxxxxxxx>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux