On Thu, 2009-07-02 at 16:54 +0200, Dominick Grift wrote: > On Thu, 2009-07-02 at 10:29 -0400, Stephen Smalley wrote: > > On Thu, 2009-07-02 at 15:40 +0200, Dominick Grift wrote: > > > Recently > > > http://www.nsa.gov/research/_files/selinux/papers/policy2/x86.shtml came > > > to my attention and i noticed that this article does not reflect the > > > current available SELinux models. Also the descriptions seem a bit > > > technical to me. > > > > > > Today i decided to make a new introduction to SELinux models with MCS, > > > MLS and UBAC included for the selinuxproject Wiki. The attempt was to > > > keep it as easy to read for humans as possible. > > > > > > I am sure that my entry has mistakes and could use improvements, > > > therefore i ask you to review the entry and submit any improvements. > > > > > > You can also send suggestions directly to me. > > > > > > http://selinuxproject.org/page/SELinux_models > > > > > > Once we feel comfortable with the content we can add a link on the User > > > Resource front page. > > > > - Security contexts are assigned to more than just processes and files. > > You and i know that but for a common user i think just separation of > files and processes should suffice. > > When all is said and done a Linux system is just a bunch of files +sockets +packets +sysvipc +userspace_objects (XSELinux, D-BUS, SEPostgreSQL) > I will edit it to read processes and objects although personally i think > objects sound a bit technical. > > > - MLS/MCS has a single attribute, the MLS/MCS range, which has the > > syntax: > > lowsensitivity[:lowcategory,...][-highsensitivity[:highcategory,...]] > > > > This is a pair of levels (which in the degenerate case where low==high > > is displayed as a single level for conciseness) where each level > > consists of a sensitivity value and a category set. > > I will edit it to reflect this. I must say that reading a security > context and its fields suggests otherwise: user:role:type:level:category > > if each field is a seperate attribute then the context suggests > categories are a separate attribute. Yep, my fault. Poor choice of syntax, somewhat historical (there was originally only one level). > > - The motivation of UBAC (which started as rbacsep) was to eliminate the > > need for per-role derived domains for programs and derived types for > > files. It isn't really its own distinct model per se, just a particular > > configuration of constraints based on SELinux user identity. > > Maybe a it is a concept, like SELinux user identities? maybe i should > explain the difference between models and concepts although i feel that > would make things more complicated than needed. > > I noted that it is not a distinct model i think by suggesting that it is > an extension to SELinux User identities. > > > - MCS and MLS are just particular configurations of constraints for the > > MLS engine and thus share the same field and engine logic. MCS was an > > attempt to make the MLS field and engine useful for general users, and > > is being leveraged by sandbox and by svirt for separating multiple > > instances of sandboxes or guest VMs. > > I think i touched on that by saying: Multi Category Security is a > implementation of Multi Level Security where the use of assigned > Security Categories is to the discretion of the user. > > I will think about ways to clear this up. > > Thanks for your suggestions. I will apply the corrections soon. > > Also feel free to edit the page. -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.