From mboxrd@z Thu Jan 1 00:00:00 1970 Subject: RE: [RFC] Ability to allow undefined permissions and classes -v2 From: Stephen Smalley To: Eric Paris Cc: Joshua Brindle , Chad Sellers , selinux@tycho.nsa.gov In-Reply-To: <1171567664.32574.70.camel@moss-spartans.epoch.ncsc.mil> References: <6FE441CD9F0C0C479F2D88F959B015888BA220@exchange.columbia.tresys.com> <1171564421.32574.36.camel@moss-spartans.epoch.ncsc.mil> <1171565182.32574.50.camel@moss-spartans.epoch.ncsc.mil> <1171566336.18488.22.camel@localhost.localdomain> <1171567664.32574.70.camel@moss-spartans.epoch.ncsc.mil> Content-Type: text/plain Date: Thu, 15 Feb 2007 14:42:18 -0500 Message-Id: <1171568538.32574.80.camel@moss-spartans.epoch.ncsc.mil> Mime-Version: 1.0 Sender: owner-selinux@tycho.nsa.gov List-Id: selinux@tycho.nsa.gov On Thu, 2007-02-15 at 14:27 -0500, Stephen Smalley wrote: > On Thu, 2007-02-15 at 14:05 -0500, Eric Paris wrote: > > On Thu, 2007-02-15 at 13:46 -0500, Stephen Smalley wrote: > > > On Thu, 2007-02-15 at 13:33 -0500, Stephen Smalley wrote: > > > > On Wed, 2007-02-14 at 14:22 -0500, Joshua Brindle wrote: > > > > > > From: Eric Paris [mailto:eparis@redhat.com] > > > > > > > > That is my point of question and lack of understanding. Will > > > > > > the policy which is passed to the kernel have all of the > > > > > > policy for all of the system or only that for the kernel? > > > > > > The way I see both cases: > > > > > > > > > > > > > > > > Only for the kernel. > > > > > > > > Actually, I thought you had found that the userspace security server > > > > isn't much of a win (and a definite cost) for current usage by e.g. the > > > > X server. Which would suggest that we aren't likely to evict userspace > > > > policy from the kernel any time soon. > > > > > > Just to clarify, I only mean the policy itself - the symbol definitions > > > for userspace classes and permissions should be removed from the kernel > > > headers ASAP, as it never needs to refer to them and we don't want to > > > impose validity checks on them within the kernel. > > > > Ok so then I'm a little confused about the best way to proceed. My > > current method determines 'unknown' by walking the kernel header > > definitions and then finding the differences in the policy definitions. > > If I continue to use that method all kernel security decisions will be > > affected by the new allow unknown stuff and that makes me happy. But > > all userspace decisions won't be affected at all. A security decision > > based on a class not defined in policy and not defined in the kernel > > headers will be 'denied.' Same goes for a permission check not defined > > in policy or in the kernel headers. Is this the desired behavior? Or > > should unknown be 'everything the policy doesn't know irregardless of > > the kernel headers?' > > I think we'd need to provide some similar logic in the userspace object > managers for handling unknown userspace classes and permissions that > they use. Only problem there of course is that presently they don't > ever see the full policy, so they can't build the table in the same way. But that isn't too different than the dynamic discovery of object classes problem, previously discussed, so if we solve that one (either via exporting class/perm info via selinuxfs or via an auxiliary file generated from policy that is readable by all object managers), then that should be sufficient. -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.