Re: Labeled NFS [v5]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/30/2012 11:55, J. Bruce Fields wrote:
On Fri, Nov 30, 2012 at 08:50:55AM -0500, Stephen Smalley wrote:
On the SELinux side, we don't require CAP_MAC_ADMIN to set the
SELinux attribute on a file in the normal case, only when the
SELinux attribute is not known to the security policy yet.  So
granting CAP_MAC_ADMIN there means that a client will be able to set
security contexts on files that are unknown to the server.  I guess
that might even be desirable in some instances where client and
server policy are different.

Note (as you probably know) this first pass at labeled NFS only lets us
label files, not rpc calls--if we want the server to know who's doing
something (beyond the information the rpc headers already carry), we'll need to implement rpcsec_gss v3, and that's a project for another day.

I've been assuming that makes server-side enforcement less useful for
now.

--b.

Ideally what will happen is that when we get RPCSECGSSv3 in we'll set the security context in the same place that we set uid and gid for the process in the auth code. Until then you're right server side enforcement really isn't possible because we have whatever context the kernel gives to the thread being our security context. In the SELinux case this is the all powerful kernel_t in the smack case its the floor context.

Dave

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux