Re: [RFC PATCH] selinux-notebook: mls_mcs.md convert and update text

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 8/7/20 10:40 AM, Richard Haines wrote:

This is an RFC patch to get some feedback as:
1) Table 1 is now a pipe table, however it still has <br> codes to
    break up the text. Also updated styles.html.css to match the pdf version
    to allow correct HTML rendering.
2) Table 2 is now a pipe table with updated text.

Add a TOC to aid navigation
Add text to clarify MCS/MLS

Signed-off-by: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
---

@@ -48,6 +56,18 @@ The sections that follow discuss the format of a security level and
  range, and how these are managed by the constraints mechanism within
  SELinux using dominance rules.
+### MLS or MCS Policy
+
+From an SELinux perspective:
+
+-   An MLS policy has more than one security level with zero or more categories.
+    It is generally used in systems that require the 'Read Down' and 'Write Up'
+    services, whether it be for files, network services etc..
+-   An MCS policy has a single security level with zero or more categories.
+    Example uses are virtualization (see the
+    [**Virtual Machine Support**](vm_support.md#selinux-virtual-machine-support)
+    section) and container security.
+

To be clear, SELinux (i.e. the code/mechanism) only knows of MLS, i.e. it has a MLS engine in the security server and a MLS portion of the policy configuration that drives that engine.  That MLS engine has been leveraged by two different types of policies, the original MLS configuration modeled after Bell-LaPadula and the later-introduced MCS configuration (which underwent a fundamental transformation from being user-facing and somewhat discretionary to being a transparent isolation mechanism for sandbox, container, and virtualization runtimes). The number of sensitivities, number of categories, and the set of MLS constraints used to determine whether a permission is allowed are entirely up to the policy author. A level in SELinux is a combination of a hierarchical sensitivity and a non-hierarchical (potentially empty) category set. In practice MCS is used for simple isolation and therefore doesn't employ sensitivities since there is no hierarchical relationship to be enforced.





[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux