Re: Where do I get a good Policy Base ?...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/11/2009 02:37 PM, Hasan Rezaul-CHR010 wrote:
> Hi All,
> 
> I didn't get an answer to my question below  :-(
>  
> 
F12 policy.


> -------------------------------
> 
> Thanks for your answers   :-)
> 
> A quick follow up question...
> 
> What would be the most appropriate Fedora selinux-policy that I can
> start off with as a base to build on top of, Given:
> 
> that I have Linux 2.6.27,  and I have the following latest SELinux
> package versions :
> 
>  checkpolicy-2.0.19
>  libselinux-2.0.85
>  libsemanage-2.0.33
>  libsepol-2.0.37
>  policycoreutils-2.0.69
>  sepolgen-1.0.17
> 
> Should I use Fedora 11 -   
> download.fedora.redhat.com/pub/fedora/linux/development/i386/os/Packages
> /selinux-policy-3.6.6-5.fc11.noarch.rpm
> 
> Or should I use Fedora 10 -
> download.fedora.redhat.com/pub/fedora/linux/updates/10/i386/selinux-poli
> cy-3.5.13-45.fc10.noarch.rpm
> 
> Or should I use new RefPolicy from OpenSuSE -
> ftp5.gwdg.de/pub/opensuse/repositories/security:/SELinux/openSUSE_Factor
> y/noarch/selinux-policy-refpolicy-standard-2.20081210-1.8.noarch.rpm
> 
> 
> Thanks in advance as usual for all your help.
> 
> 
> 
> 
> -----Original Message-----
> From: Dominick Grift [mailto:domg472@xxxxxxxxx]
> Sent: Tuesday, October 27, 2009 3:50 AM
> To: Hasan Rezaul-CHR010
> Cc: selinux@xxxxxxxxxxxxx
> Subject: Re: Where do I get a good Policy Base ?...
> 
> On Mon, 2009-10-26 at 21:16 -0400, Hasan Rezaul-CHR010 wrote:
>> Hi All,
>>
>> I used to have the following SELinux related package versions on my 
>> Linux (2.6.18) system:
>>
>> Checkpolicy      - 1.33.1
>> Libselinux       - 2.0.13
>> Libsemanage      - 2.0.1
>> Libsepol         - 2.0.3
>> Libsetrans       - 0.1.18
>> Policycoreutils  - 2.0.16
>>
>> And I used a 'strict' Base policy from Fedora Core 6. Made the 
>> modifications I needed on top of that, and I was very happy...
>>
>>
>> We get our OS packaged/delivered from a third party company, and we're
> 
>> upgrading to Linux 2.6.27, and as part of this upgrade, we are also 
>> migrating to much newer versions of the SELinux packages. They are:
>>
>> checkpolicy-2.0.19
>> libselinux-2.0.85
>> libsemanage-2.0.33
>> libsepol-2.0.37
>> policycoreutils-2.0.69
>> sepolgen-1.0.17
>>
>>
>> My questions are:
>>
>> 1. I believe the "strict" policy is no longer supported in the above 
>> versions of SELinux packages? Is this true ?
> 
> the "strict" policy model is no longer supported. The strict and target
> policy have merged to a policy model that is called "targeted". You can
> configure the "targeted" policy to behave like old strict policy by
> removing removing the unconfined modules and by mapping your Linux
> logins to strict SELinux users.
> 
>>
>> 2. The entire set of policies that I have fine-tuned over the years 
>> under my  /etc/selinux/strict/modules/active/modules/*.pp  directory 
>> in my previous older system, can I make any use of that ?? In other 
>> words, can that stuff be re-used at all ? Or do I need to develop 
>> policy from scratch again ?
> 
> I am not sure about this but my opinion is that it should  in most cases
> be possible to use older binary modules in newer policy. Reference
> policy should be compatible in my view.
> 
> Please note though that is encouraged to keep the source policy for your
> binary modules so that you can edit policy modules easily later.
>>
>> 3. What will be a good base policy for me to start policy development 
>> on ? Will it be refpolicy, or should I grab the base 'targeted' policy
> 
>> from fedora core 11 for example ?
> 
> This depends on your distro, but generally you should be better of with
> a distro specific policy. Also keep in mind that Fedora has a active
> community, frequent updates and many testers.
> 
>>
>> 4. Assuming 'strict' is no longer supported in the NEW package 
>> versions above, and I use a base 'targeted' policy as my starting 
>> point... Should I be able to simply remove the "unconfined.pp" policy 
>> module from the base targeted policy, and that essentially turns my 
>> system into "strict-like" mode ? Is that advisable ?
> 
> That is the idea, yes,
> 
>>
>> 5. If I do continue to use the 'targeted' base policy as is, how can I
> 
>> develop policy on top of that, to make sure I still block specific 
>> things that I don't want to take place. For example, I DON'T want a 
>> user_t to be able to write to files of type  etc_t  for example. How 
>> do I go about accomplishing this  given the 'targeted' framework ? I 
>> know how to do this in the old 'strict' framework, not sure how to go 
>> about it with the targeted framework. Please shed some light or point 
>> me to documents...
> 
> You can write your own custom policy modules on that of the policy that
> is distributed. Current policy is usually modular. Basically write a
> source policy module, build it and install it using the semanage or the
> semodule command.
> 
> e.g. (Fedora/RedHat):
> 
> echo "policy_module(mytest, 0.0.1)" > mytest.te; make -f
> /usr/share/selinux/devel/Makefile mytest.pp; sudo semodule -i mytest.pp
> sudo semodule -l | grep mytest
> 
>>
>> Again, Any references or documentation links would be greatly 
>> appreciated.
> 
> www.selinuxproject.org/page/User_Resources
>>
>> Thanks in advance.
>>
>>
>> --
>> This message was distributed to subscribers of the selinux mailing
> list.
>> If you no longer wish to subscribe, send mail to 
>> majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without
> quotes as the message.
> 
> 


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux