Re: SELinux mixed/virtualisation policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 04/13/2011 09:19 AM, Stephen Smalley wrote:
> If you do a sesearch -A -s qemu_t, you'll see that qemu_t interacts with
> quite a few types on the host, including both files and processes. And
> even more so for libvirtd.  The more you move into your new
> sensitivities, the more you'll have to define MLS overrides for more
> domains.
> 
> At present, virtd_t (i.e. libvirtd) is given many (all?) MLS overrides,
> which is unsurprising since it is expected to create and manage VMs at
> any level.  But qemu_t (i.e. the qemu process representing the
> individual VM) is not given such MLS overrides, nor should it, as that
> would allow to escape the confines of its level/range.
Actually, processes representing virtual machine environments--when
initiated by libvirt--execute with svirt_t and not qemu_t, which also
belongs to virt_domain type attribute. So why the virt_domain rules
could not be moved to the virtualisation sensitivities?

> 
> I can't quite see how your approach is cleaner than just using separate
> categories.  Same effect - by allocating a dedicated category to the VMs
> and another to the host, you end up with incomparable levels and thus
> will achieve automatic isolation except where explicitly overridden
> using the type attributes for MLS overrides.  Adding another
> incomparable set of sensitivities puts us outside the scope of any
> evaluated or even published security model.
How dynamic labeling is supposed to work with this approach? We will
need a standard set of categories defined to libvirt use.

> 
> Now something that has been suggested in the past would be adding
> another level/range component to the security context for use by a
> Biba-like integrity model.  That might be interesting, but would
> obviously require quite a few changes on both the kernel and userland
> side.  It would also require resolving the unfortunate ambiguity in the
> current security context format.
Please, correct if I am wrong, but from what I understand adding another
level and range component will just add another level of hierarchy for
multiple set of sensitivities and categories (i.e.
s0-s15:s0-s15:c0.c1023 or even s0-s15:c0.c1023:s0-s15:c0.c1023). So the
virtualised sensitivities should be below or above the standard
sensitivities in this new level and range component?


- -- 
Ramon de Carvalho Valle
Security Engineer
IBM Linux Technology Center
rcvalle@xxxxxxxxxxxxxxxxxx
http://rcvalle.com/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk2lnzgACgkQkcIYeh81wLmQIQCbBvbodiOvSYza2/8vchTy27Hx
9OoAniLBlWTRKSlUDf16BZovzm8GVWJG
=JBO/
-----END PGP SIGNATURE-----


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux