Re: ANN: SELinux userspace release

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/14/2016 05:55 PM, Stephen Smalley wrote:
> The 2016-10-14 / 2.6 release for the SELinux userspace is now available at:
> https://github.com/SELinuxProject/selinux/wiki/Releases
> 
> This has been tagged as 20161014 in the git repository.
> 
> Below are some notes on this release for packagers of the SELinux
> userspace.  Please see the individual ChangeLog files for a detailed
> list of changes.
> 
> 1) sepolicy converted to setools4:
> - sepolicy and its users now depend on setools4 instead of setools3.
> 
> - Please convert any remaining users of setools3 to setools4 since
> setools3 is no longer being developed.
> 
> 2) genhomedircon enhancements and behavior changes:
> - genhomedircon supports the %{USERID} template for substituting the
> user's uid. %{USERNAME} has also been added as a new template for
> substituting the user's username.  The USER template is still supported
> for backward compatibility but is deprecated.
> 
> - genhomedircon supports generating home directory contexts for login
> mappings using the %group syntax.  This may produce an error if the user
> belongs to multiple groups specified in the login mapping, which can be
> resolved by adding an explicit mapping for the user to override the
> group-based mapping.
> 
> - genhomedircon will fully replace the SELinux user and range fields in
> each templated security context rather than only substituting for the
> hardcoded strings "system_u" and "s0".  As a side effect, genhomedircon
> no longer has special handling of "system_u" and will therefore trigger
> a warning if there is a "system_u" entry in seusers:
>     libsemanage.add_user: user system_u not in password file
> This warning is not fatal, but it would be preferable to remove system_u
> from the seusers file.
> See https://bugzilla.redhat.com/show_bug.cgi?id=1378204
> 
> - genhomedircon will replace the role field in each templated security
> context with the user prefix for the user if the user prefix is the
> identifier of a role valid for the given user, or if it is "object_r".
> This enables configuring RBACSEP (i.e. role-based separation of user
> home directories) in policy.  If the user prefix is not a valid role,
> then genhomedircon will leave the role field unmodified as before.
> 

An issue was reported about genhomedircon with standard policy model
(non-mls), where no contexts were generated.

I was able to reproduce this issue, and Gary produced a patch to fix
this. However the patch does not fully address the issue, as it requires
that one runs an additional semodule -B to rerun genhomedircon.
genhomedircon does not generate the contexts the first time around.

> - genhomedircon will generate entries for logins mapped to the default
> user.  Previously no entries were generated for such logins, which could
> lead to no matching file_contexts.homedirs entries for users with home
> directories outside of LU_HOMEDIRECTORY in the absence of usepasswd=True.
> 
> 3) libselinux pcre2 support:
> - libselinux supports either pcre1 or pcre2 but not both at the same
> time. The default remains pcre1.
> 
> - To use pcre2, build libselinux and sefcontext_compile with 'make
> USE_PCRE2=y". You must also rebuild your file_contexts.bin files with
> the rebuilt sefcontext_compile.
> 
> - With pcre2, file_contexts.bin is no longer architecture-neutral. The
> relevant architecture properties are endianness, pointer width, and
> PCRE2_SIZE type.  libselinux will automatically detect an architecture
> mismatch and ignore the stored precompiled regexes in that case,
> recompiling them instead at runtime.  sefcontext_compile -i will report
> the pcre version and architecture strings that it will include in the
> file_contexts.bin file.
> 
> - With pcre2, file_contexts.bin is substantially larger than for pcre1.
> With the Fedora policy, we see the following sizes:
> 383165	file_contexts (text)
> 1507941 file_contexts.bin (binary with pcre1 regexes)
> 8304105 file_contexts.bin (binary with pcre2 regexes)
> 
> - If you know that you will be generating file_contexts.bin for a target
> with a different architecture string or if you do not wish to pay the
> additional storage cost, you can use the -r option to sefcontext_compile
> to omit the compiled regexes.
> With the Fedora policy, this yields a much smaller file:
> 540540 file_contexts.bin (binary omitting pcre2 regexes)
> You can make this the default when libsemanage invokes
> sefcontext_compile by adding the following stanza to semanage.conf:
> [sefcontext_compile]
> path = /usr/sbin/sefcontext_compile
> args = -r $@
> [end]
> _______________________________________________
> Selinux mailing list
> Selinux@xxxxxxxxxxxxx
> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.
> 


-- 
Key fingerprint = 5F4D 3CDB D3F8 3652 FBD8  02D5 3B6C 5F1D 2C7B 6B02
https://sks-keyservers.net/pks/lookup?op=get&search=0x3B6C5F1D2C7B6B02
Dominick Grift

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux