All of lore.kernel.org
 help / color / mirror / Atom feed
From: Chris PeBenito <pebenito@gentoo.org>
To: David Caplan <dac@tresys.com>
Cc: Stephen Smalley <sds@epoch.ncsc.mil>,
	Russell Coker <russell@coker.com.au>,
	SE Linux <selinux@tycho.nsa.gov>
Subject: Re: specifying groups of types
Date: Thu, 16 Oct 2003 00:07:25 -0500	[thread overview]
Message-ID: <1066280844.31190.34.camel@chris.pebenito.net> (raw)
In-Reply-To: <3F8C46E4.1030403@tresys.com>

Well I tried this out, and it worked, though I used simple examples:

portage.te:
create_dir_notdevfile(portage_t,{file_type -shadow_t})

admin_macros.te:
# Relabel most files.
allow $1_t {file_type -shadow_t}:dir { getattr read search relabelfrom relabelto };
allow $1_t {file_type -shadow_t}:file_class_set { getattr relabelfrom relabelto };

(where portage is Gentoo's packaging system)  I don't know anything
about yacc, so I can't comment on the implementation.  But the new
shadow assertions are what the first IRC discussion stemmed from.  They
were (correctly) not tripped by these statements, and sysadm_t can stat
but not read /etc/shadow.

On Tue, 2003-10-14 at 13:56, David Caplan wrote:
> I'd recommend trying this out and if you find it useful change the parse 
> rules.  I tested it on some real basic policy, so it may cause other 
> unintended problems.  I'm throwing it out more as a starting point 
> rather than something intended to be integrated into checkpolicy.

> Stephen Smalley wrote:
> > On Sat, 2003-10-11 at 00:35, Russell Coker wrote:
> > 
> >>Following a discussion on IRC, it occurs to me that it would be handy to have 
> >>the following in the policy language:
> >>allow some_domain { file_type !shadow_t }:...
> >>
> >>So we can specify everything in file_type except for shadow_t.
-- 
Chris PeBenito
<pebenito@gentoo.org>
Developer, SELinux
Hardened Gentoo Linux
 
Public Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xE6AF9243
Key fingerprint = B0E6 877A 883F A57A 8E6A  CB00 BC8E E42D E6AF 9243

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2003-10-16  5:07 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2003-10-11  4:35 specifying groups of types Russell Coker
2003-10-14 12:22 ` Stephen Smalley
2003-10-14 18:56   ` David Caplan
2003-10-16  5:07     ` Chris PeBenito [this message]
2003-11-02 17:43     ` Chris PeBenito
2003-11-03 13:53       ` Stephen Smalley
2003-11-03 13:55       ` David Caplan
2004-01-15 14:31     ` Stephen Smalley
2004-01-16 16:50       ` Karl MacMillan
2004-01-16 18:17         ` Stephen Smalley
2004-01-16 18:36           ` Karl MacMillan
2004-01-16 18:48             ` Stephen Smalley
2004-01-16 21:03           ` Trival relabel Problem Thomas DuBuisson
2004-01-16 21:14             ` Stephen Smalley

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1066280844.31190.34.camel@chris.pebenito.net \
    --to=pebenito@gentoo.org \
    --cc=dac@tresys.com \
    --cc=russell@coker.com.au \
    --cc=sds@epoch.ncsc.mil \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.