Re: SELinux on Wheezy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2012-02-08 at 08:24 -0500, Stephen Smalley wrote:
> On Tue, 2012-02-07 at 13:05 -0800, C.J. Adams-Collier wrote:
> > cjac@foxtrot:~$ sudo which seinfo
> > cjac@foxtrot:~$ apt-file search seinfo | grep bin | wc -l
> > 0
> 
> seinfo is part of the setools package.

$ apt-cache search -n setools
erlang-parsetools - Erlang/OTP parsing tools

Hmm.

Would it be safe to build seinfo from source and use it along with the
distro-installed tools?  If so, what's the git repo I should clone from?

> > Sounds reasonable.  Do I get policy from my distribution, or should I
> > generate one myself?
> 
> Normally from your distribution, assuming the selinux packages for
> Debian are still being maintained.

I believe they are.  I exchanged email with Russell about it not long
ago.  But then, gtkglarea is still officially maintained and I made the
first update in nearly a year 36 hours ago.  Perhaps the package needs 1
or more co-maintainers to improve coverage.

> IIRC, the Debian selinux policy package tries to minimize the set of
> installed policy modules based on the set of installed packages, but
> that isn't an exact mapping and might be leaving you without a complete
> policy.  Whereas Fedora installs all policy modules unconditionally.

If the overhead is not too great, perhaps this can be duplicated in
Debian.  I do hate paying for things I don't use, though.  Especially
when the cost is substantial.  The same is probably true of many other
Debian users.

> If the .pp files are on your filesystem and just not installed into the
> policy store, you can manually add them by running semodule -i on them.
> Try listing the files installed from your policy packages and see if
> xserver.pp is among them.  

$ locate xserver.pp
/usr/share/selinux/default/xserver.pp

I'll run semodule -i after this morning's reboot.  I installed mutt
yesterday, so I'll work from the console until you folks sign off for
the evening.

> > cjac@foxtrot:~$ dpkg -l | grep selinux-policy
> > ii  selinux-policy-default               2:2.20110726-3                 Strict and Targeted variants of the SELinux policy
> > ii  selinux-policy-dev                   2:2.20110726-3                 Headers from the SELinux reference policy for building modules
> > ii  selinux-policy-doc                   2:2.20110726-3                 Documentation for the SELinux reference policy
> > 
> > cjac@foxtrot:~$ apt-cache search selinux-policy
> > selinux-policy-default - Strict and Targeted variants of the SELinux policy
> > selinux-policy-dev - Headers from the SELinux reference policy for building modules
> > selinux-policy-doc - Documentation for the SELinux reference policy
> > selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
> > selinux-policy-src - Source of the SELinux reference policy for customization
> > 
> > If I'm going to generate one myself, I need to understand them a bit
> > better.  I would like anything I generate to be useable by the rest of
> > the Debian world.  There seem to be some examples I ran review in the
> > selinux-policy-doc and selinux-policy-mls packages.
> > 
> > Regarding re-labeling, every time I boot without the selinux arguments
> > to my kernel and then boot with them, the filesystem seems to get
> > re-labeled.  Is there a better way to do this?
> 
> On Fedora, you could touch /.autorelabel or pass "autorelabel" on the
> kernel command line to force a relabel at boot.  You can also run
> fixfiles relabel as a command after booting.  No need to disable SELinux
> and then re-enable it.

Great.  I do have a copy of fixfiles.

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux