Re: postgresql policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ted,

That certainly sounds like it makes a lot of sense.

Is that function available under RHEL 6.5, or just later versions?  I
know there has been a fair bit of work in this area.

Thanks!

* Ted Toth (txtoth@xxxxxxxxx) wrote:
> In fact I'm using a variant of selinux_check_access in my
> sepostgres_check_row_perm function that I called
> selinux_check_access_noaudit since the select policy may naturally
> fail perm checks on rows that are above the callers level and I don't
> want generate audit storms.
> 
> On Thu, May 28, 2015 at 2:27 PM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
> > On 05/28/2015 03:09 PM, Stephen Frost wrote:
> >> Stephen,
> >>
> >> * Stephen Smalley (sds@xxxxxxxxxxxxx) wrote:
> >>> On 05/28/2015 12:52 PM, Ted Toth wrote:
> >>>> The ref policy contains a number of sepgsql_ types that are specific
> >>>> to the sepgsql postgresql module. The sepgsql module was written to
> >>>> support a postgresql security patch that was never accepted by the
> >>>> upstream. Now postgresql has gone in a different direction security
> >>>> wise adding row level security (RLS). I've been working on developing
> >>>> RLS policy to label rows on insert and update and to check access
> >>>> perms on select. I've tried using the sepgsql module in the RLS policy
> >>>> but have come to the conclusion that because it was not designed for
> >>>> this purpose it is not usable. So I'd like to suggest that these types
> >>>> be moved out of the postgresql policy possibly into their own module
> >>>> although I personally think they have little if any use.
> >>>
> >>> Should probably post a rfc patch to refpolicy list.
> >>>
> >>> On a different note, does this RLS implementation have any SELinux
> >>> integration or is it just the typical "let's implement our own custom
> >>> policy engine in the database manager and not link it in any way to the
> >>> OS security model" approach?  Pity if it is the latter.
> >>
> >> As the one who committed RLS to PostgreSQL, I'm hopeful that what we
> >> have is actually able to provide both.  There is a system inside of
> >> PostgreSQL for creating policies, which was a requirement of the PG
> >> community as we fully expect it to be used in non-SELinux environments,
> >> but there are also hooks available where a module (such as the sepgsql
> >> contrib module that's included with PG) could add its own restrictive
> >> and/or permissive policies.
> >
> > Thanks, glad to hear that there are at least hooks available.
> >
> >> I'm certainly interested in the type changes being discussed here and
> >> would love to work with someone from the SELinux community on improving
> >> the sepgsql contrib module (or, perhaps, adding a different and simpler
> >> module which is closer to a shim around SELinux than the existing
> >> sepgsql module).
> >
> > Yes, the latter might be the best path.  It could use the newer
> > selinux_check_access() interface in libselinux for checking whether a
> > given permission is granted and avoid having to replicate or directly
> > use the lower level interfaces.
> >
> >
> > _______________________________________________
> > Selinux mailing list
> > Selinux@xxxxxxxxxxxxx
> > To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> > To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux