On 11/01/2013 03:57 PM, Stephen Smalley wrote: > On 11/01/2013 03:42 PM, Gabriele Scotti wrote: >> Dear Sirs, >> >> I am writing to enquire about the android emulator behavior: I'm using the AOSP >> master branch with the SE for Android modifications and I'm trying to place >> restrictions on what application can use the bind channel. >> I have two custom application in the untrusted domain that can communicate >> each other and I want to block this communication, so I modified the file >> app.te by removing the binder call from appdomain to appdomain but they can >> still communicate. >> I should like to know if I can do this with the emulator or there are >> restrictions, otherwise I assume that I'm writing a wrong policy. > > Questions specific to SE for Android should go to the seandroid-list, > which was split off about a year ago from the regular selinux list. > Subscribe by sending 'subscribe seandroid-list' in the body of an email > to majordomo@xxxxxxxxxxxxx and then post to seandroid-list@xxxxxxxxxxxxx. > > With regard to your question though, many forms of communication in > Android are indirect via the system_server, which all apps are expected > to be allowed to call via binder. Thus, even if you cut off direct > binder calls between two app domains, they can likely still send Intents > and such via the system_server. > > Strongly isolating apps is more likely to be achieved either by > leveraging the multi-user support and installing the apps under > different user accounts, or by implementing your own container solution > as has been done by others (e.g. KNOX, Cells). I likely should have also mentioned our Intent MAC work, which was exploring mandatory controls over Intents (in our intent_mac branch). But we are now looking into replacing that with something based on the IntentFirewall mechanism that appeared in Android 4.3. -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.