-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 04/13/2011 09:19 AM, Stephen Smalley wrote: > If you do a sesearch -A -s qemu_t, you'll see that qemu_t interacts with > quite a few types on the host, including both files and processes. And > even more so for libvirtd. The more you move into your new > sensitivities, the more you'll have to define MLS overrides for more > domains. > > At present, virtd_t (i.e. libvirtd) is given many (all?) MLS overrides, > which is unsurprising since it is expected to create and manage VMs at > any level. But qemu_t (i.e. the qemu process representing the > individual VM) is not given such MLS overrides, nor should it, as that > would allow to escape the confines of its level/range. Actually, processes representing virtual machine environments--when initiated by libvirt--execute with svirt_t and not qemu_t, which also belongs to virt_domain type attribute. So why the virt_domain rules could not be moved to the virtualisation sensitivities? > > I can't quite see how your approach is cleaner than just using separate > categories. Same effect - by allocating a dedicated category to the VMs > and another to the host, you end up with incomparable levels and thus > will achieve automatic isolation except where explicitly overridden > using the type attributes for MLS overrides. Adding another > incomparable set of sensitivities puts us outside the scope of any > evaluated or even published security model. How dynamic labeling is supposed to work with this approach? We will need a standard set of categories defined to libvirt use. > > Now something that has been suggested in the past would be adding > another level/range component to the security context for use by a > Biba-like integrity model. That might be interesting, but would > obviously require quite a few changes on both the kernel and userland > side. It would also require resolving the unfortunate ambiguity in the > current security context format. Please, correct if I am wrong, but from what I understand adding another level and range component will just add another level of hierarchy for multiple set of sensitivities and categories (i.e. s0-s15:s0-s15:c0.c1023 or even s0-s15:c0.c1023:s0-s15:c0.c1023). So the virtualised sensitivities should be below or above the standard sensitivities in this new level and range component? - -- Ramon de Carvalho Valle Security Engineer IBM Linux Technology Center rcvalle@xxxxxxxxxxxxxxxxxx http://rcvalle.com/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk2lnzgACgkQkcIYeh81wLmQIQCbBvbodiOvSYza2/8vchTy27Hx 9OoAniLBlWTRKSlUDf16BZovzm8GVWJG =JBO/ -----END PGP SIGNATURE----- -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.