-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 04/22/2010 05:35 PM, Stephen Smalley wrote: > On Thu, 2010-04-22 at 16:46 -0400, Eric Paris wrote: >> This patch adds a new permission, setsuid, to the file class. This >> permission is checked any time a file has its attributes modified >> (setattr) and the setuid or setgid bits are involved. The purpose for >> this change is to further allow selinux to confine administrative >> duties. >> >> This permission is needed to both set the setuid bit and to add more >> permissions to a file which already has setuid bit. This is also checked >> when an acl is modified on a file containing the suid or sgid bit. We >> do not know if the acl is more or less restrictive, so we always check >> the permission on acl changes. > > Can you help us all remember why you want this permission? Specific use > case example, what threat you are mitigating, why it is sufficiently > important to justify an entirely new permission dedicated to it. > > If we add this permission for this purpose, why wouldn't we also add > distinct permissions for other DAC purposes, e.g. suid-root vs. > suid-nonroot, suid vs sgid, sticky bit, setting vs clearing, making a > file executable, ...? Where does it stop? > > I'm also not keen on overloading it to also cover other changes to the > mode/ACL. Presumably that is to constrain extending execute access to > an existing suid file more widely than originally set? Write access > should kill suid/sgid bits. Read access is perhaps a concern, but > relying on unreadable executables isn't a good idea. > > Can you write a description of this permission and how it differs from > setattr permission in a way that will make sense to a typical Linux > admin? > >> Signed-off-by: Eric Paris <eparis@xxxxxxxxxx> My original thinking on this was a way to separate out Confined Root Admin from user. One possible use case would be. I want to allow a user to login as unconfined_t and only be able to become root as webadm_t through sudo. If webadm_t has setattr on /var/www, he can cp /bin/sh /var/www/sh, chcon 4755 /var/www/sh, exit webadm_t and as unconfined_t become root using /var/www/sh. I think your other examples are valid, but I believe setuid/setgid applications have always been considered much more of a problem then the others. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iEYEARECAAYFAkvRjK4ACgkQrlYvE4MpobOw6wCeLY0Yn5eLQu9hibHrTYLAqVex IMIAn2P7S1lobPS21eAjOL/dBwua5R0K =K0Xx -----END PGP SIGNATURE----- -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.