Re: Dbus rules in LPM for a Dbus based service like Network Manager

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




It doesn't look like refpolicy presently defines any associate elements
in the default dbus_contexts configuration files.  So that would mean
that acquire_svc checks are always against the bus daemon context, as
per man dbus-daemon.  The intent was to allow control over what
processes can bind to specific names in dbus, just as we control what
processes can bind to specific TCP/UDP ports in the kernel.  I'm not
sure why people haven't configured it for well-known dbus services and
used that to prevent arbitrary processes from binding those service
names.

The send_msg checks on the other hand are between the sender and
recipient contexts and don't rely on dbus_contexts configuration.

Thank you Stephen for a nice starting pointer. Before asking any further questions regarding this I will wait for some more replies from others to make the thread useful.


--
Shaz


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux