We have a pretty big bug between SELinux and the User Namespace

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



But our people have limited time to work on it, it has been back burner-ed since last summer.

https://bugzilla.redhat.com/show_bug.cgi?id=1236256

Basically User Namespace introduces a new concept of Namespaced capabilities. SELinux currently blocks the use of all capabilities and does not differentiate. If someone is looking to cut their teeth on Kernel and Security work, I think it would be a good project to try to differentiate in policy and the kernel between the two Capabilities.

The current problem I am seeing is with a confined user. staff_t does not have any capabilities, but when he runs Chrome, it uses usernamespace to isolate the chrome_sandbox and protect the host. Non privilege users on Fedora are allowed to setup User Namespaces but some of the activity of setting up the User Namespace requires Namespaced SYS_ADMIN. Since SELinux blocks SYS_ADMIN for staff_t I can not run Chrome with out temporarily setenforce 0, or adding SYS_ADMIN to staff_t. Neither is an attractive solution.

Wearing my best Tom Sawyer hat, white washing this fence would be fun.

Anyone want to take a shot?

Dan
_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux