Re: Dbus rules in LPM for a Dbus based service like Network Manager

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2010-05-12 at 11:29 +0500, Shaz wrote:
> Dear list,
> 
> I was reading [1] and found it very interesting but I can't figure out
> how the dbus rules will be added to the network manager LPM. Are there
> any examples available in the reference policy that can be followed to
> understand this clearly? If not in reference policy then where can I
> find a good and clear example?
> 
> [1]
> http://www.redhat.com/magazine/003jan05/features/dbus/#more-security

It doesn't look like refpolicy presently defines any associate elements
in the default dbus_contexts configuration files.  So that would mean
that acquire_svc checks are always against the bus daemon context, as
per man dbus-daemon.  The intent was to allow control over what
processes can bind to specific names in dbus, just as we control what
processes can bind to specific TCP/UDP ports in the kernel.  I'm not
sure why people haven't configured it for well-known dbus services and
used that to prevent arbitrary processes from binding those service
names.

The send_msg checks on the other hand are between the sender and
recipient contexts and don't rely on dbus_contexts configuration.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux