Re: Policy loading problem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 20 May 2009 12:44:48 -0400
Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:

> On Wed, 2009-05-20 at 23:44 +0800, Dennis Wronka wrote:
> > Just an idea:
> > Wouldn't it be possible to split CONFIG_SECURITY_SELINUX_DEVELOP
> > into two options, pretty much like
> > CONFIG_SECURITY_SELINUX_BOOTPARAM and
> > CONFIG_SECURITY_SELINUX_DISABLE?
> > 
> > I like the idea because it would prevent somebody that has physical
> > access to set SELinux to permissive (and thus practically disabling
> > its protection) on boot, but still keep the option for root (either
> > as sysadm_r or, preferably, as secadm_r) to switch to permissive
> > mode after boot.
> 
> Possible, yes.  Useful, I don't think so.  If you want to prevent
> users with physical access from specifying selinux=0 or enforcing=0,
> then use a grub password (and more, if you are really concerned about
> physical access).
> 
> A more likely scenario is that people want to be able to boot
> permissive without being able to switch to permissive at runtime.
> But that can be enforced by not allowing setenforce permission to any
> domain in your policy.

One might also get into a state where the system wouldn't boot in
enforcing mode due to some labelling gone wrong, so you'd want to boot
in permissive mode to fix that.

Paul.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux