Re: Android emulator

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/01/2013 03:57 PM, Stephen Smalley wrote:
> On 11/01/2013 03:42 PM, Gabriele Scotti wrote:
>> Dear Sirs,
>>
>> I am writing to enquire about the android emulator behavior: I'm using the AOSP
>> master branch with the SE for Android modifications and I'm trying to place
>> restrictions on what application can use the bind channel.
>> I have two custom application in the untrusted domain that can communicate
>> each other and I want to block this communication, so I modified the file
>> app.te by removing the binder call from appdomain to appdomain but they can
>> still communicate.
>> I should like to know if I can do this with the emulator or there are
>> restrictions, otherwise I assume that I'm writing a wrong policy.
> 
> Questions specific to SE for Android should go to the seandroid-list,
> which was split off about a year ago from the regular selinux list.
> Subscribe by sending 'subscribe seandroid-list' in the body of an email
> to majordomo@xxxxxxxxxxxxx and then post to seandroid-list@xxxxxxxxxxxxx.
> 
> With regard to your question though, many forms of communication in
> Android are indirect via the system_server, which all apps are expected
> to be allowed to call via binder.  Thus, even if you cut off direct
> binder calls between two app domains, they can likely still send Intents
> and such via the system_server.
> 
> Strongly isolating apps is more likely to be achieved either by
> leveraging the multi-user support and installing the apps under
> different user accounts, or by implementing your own container solution
> as has been done by others (e.g. KNOX, Cells).

I likely should have also mentioned our Intent MAC work, which was
exploring mandatory controls over Intents (in our intent_mac branch).
But we are now looking into replacing that with something based on the
IntentFirewall mechanism that appeared in Android 4.3.


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux