Re: Collecting ideas for audit2allow improvement

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 06/14/2017 09:01 AM, Jan Zarsky wrote:
Hi,

I would like to improve SELinux audit2allow tool as my bachelor thesis.
I collected ideas from my colleagues from RedHat SELinux team and I would also
like to hear your ideas - what would you improve to make audit2allow smarter or
easier to use.

Ideas collected so far:

   * offer dac_read_search when sufficient instead of dac_override
     (see <https://github.com/SELinuxProject/selinux/issues/31>)
   * offer multiple solutions to a problem (example: 1) add allow rule for
     execute + execute_no_trans or 2) add allow rule for execute
     + type_transition rule)
   * interactive mode: ask questions and choose best solution
   * warn when solution touches trusted computing base (rules you should not be
     adding)
   * suggest alternate labels for content, example: httpd_t not allowed to write
     to user_home_t, might suggest that changing the label to
     httpd_user_content_t
   * output to CIL (add option for this)

This would definitely be helpful and should be relatively straightforward.

Jim

   * if the AVC talks about execute permission then offer also type_transition
     rule
   * idea for a tool for automatic policy generation: On a test system you
     install application, turn the SELinux to permissive and run a full test
     suit. You collect all the AVCs in say Elasticsearch (can use common logging
     ViaQ project for that) and then there is a tool that searches the AVC,
     groups them and creates a policy out of them.
   * add option to open bugzilla
   * output to Ansible playbook/role task (add option for this)

I would also like to know which feature would you appreciate the most.

Thanks

Jan Zarsky



--
James Carter <jwcart2@xxxxxxxxxxxxx>
National Security Agency



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux