All of lore.kernel.org
 help / color / mirror / Atom feed
* [refpolicy] [PATCH 18/33] mozilla: curb on userdom permissions
@ 2017-04-20  1:02 Guido Trentalancia
  0 siblings, 0 replies; only message in thread
From: Guido Trentalancia @ 2017-04-20  1:02 UTC (permalink / raw)
  To: refpolicy

This patch curbs on userdomain file read and/or write permissions
for the mozilla application module.

It aims to ensure user data confidentiality.

A boolean has been introduced to revert the previous read/write
behavior.

Signed-off-by: Guido Trentalancia <guido@trentalancia.net>
---
 policy/modules/contrib/mozilla.te |   46 ++++++++++++++++++++++++++++++++------
 1 file changed, 39 insertions(+), 7 deletions(-)

--- refpolicy-2.20170204-orig/policy/modules/contrib/mozilla.te	2017-04-20 01:03:00.654437447 +0200
+++ refpolicy-2.20170204/policy/modules/contrib/mozilla.te	2017-04-20 00:16:29.709448857 +0200
@@ -6,6 +6,15 @@ policy_module(mozilla, 2.11.0)
 #
 
 ## <desc>
+###	<p>
+###	Determine whether mozilla can
+###	manage the user home directories
+###	and files.
+###	</p>
+### </desc>
+gen_tunable(mozilla_enable_home_dirs, false)
+
+## <desc>
 ##	<p>
 ##	Determine whether mozilla can
 ##	make its stack executable.
@@ -112,6 +121,10 @@ allow mozilla_t mozilla_plugin_rw_t:dir
 allow mozilla_t mozilla_plugin_rw_t:file read_file_perms;
 allow mozilla_t mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
 
+userdom_user_home_dir_filetrans_user_cache(mozilla_t, dir, ".cache")
+userdom_user_home_dir_filetrans_user_config(mozilla_t, dir, ".config")
+userdom_user_home_dir_filetrans_user_data(mozilla_t, dir, ".local")
+
 stream_connect_pattern(mozilla_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t)
 
 can_exec(mozilla_t, { mozilla_exec_t mozilla_plugin_rw_t mozilla_plugin_home_t })
@@ -196,12 +209,17 @@ userdom_use_user_ptys(mozilla_t)
 userdom_manage_user_tmp_dirs(mozilla_t)
 userdom_manage_user_tmp_files(mozilla_t)
 
-userdom_manage_user_home_content_dirs(mozilla_t)
-userdom_manage_user_home_content_files(mozilla_t)
-userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
+userdom_manage_user_cache(mozilla_t)
+userdom_manage_user_config(mozilla_t)
+userdom_manage_user_data(mozilla_t)
+userdom_manage_user_downloads(mozilla_t)
+
+userdom_search_user_home_dirs(mozilla_t)
 
 userdom_write_user_tmp_sockets(mozilla_t)
 
+userdom_user_cache_filetrans(mozilla_t, mozilla_home_t, { dir file })
+
 mozilla_run_plugin(mozilla_t, mozilla_roles)
 mozilla_run_plugin_config(mozilla_t, mozilla_roles)
 
@@ -224,6 +242,15 @@ tunable_policy(`allow_execmem',`
 	allow mozilla_t self:process execmem;
 ')
 
+tunable_policy(`mozilla_enable_home_dirs',`
+	userdom_manage_user_home_content_dirs(mozilla_t)
+	userdom_manage_user_home_content_files(mozilla_t)
+	userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
+',`
+	userdom_dontaudit_manage_user_home_content_dirs(mozilla_t)
+	userdom_dontaudit_manage_user_home_content_files(mozilla_t)
+')
+
 tunable_policy(`mozilla_execstack',`
 	allow mozilla_t self:process { execmem execstack };
 ')
@@ -500,10 +527,6 @@ miscfiles_dontaudit_setattr_fonts_cache_
 userdom_manage_user_tmp_dirs(mozilla_plugin_t)
 userdom_manage_user_tmp_files(mozilla_plugin_t)
 
-userdom_manage_user_home_content_dirs(mozilla_plugin_t)
-userdom_manage_user_home_content_files(mozilla_plugin_t)
-userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })
-
 userdom_write_user_tmp_sockets(mozilla_plugin_t)
 
 userdom_dontaudit_use_user_terminals(mozilla_plugin_t)
@@ -523,6 +546,15 @@ tunable_policy(`allow_execmem',`
 	allow mozilla_plugin_t self:process execmem;
 ')
 
+tunable_policy(`mozilla_enable_home_dirs',`
+	userdom_manage_user_home_content_dirs(mozilla_plugin_t)
+	userdom_manage_user_home_content_files(mozilla_plugin_t)
+	userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })
+',`
+	userdom_dontaudit_manage_user_home_content_dirs(mozilla_plugin_t)
+	userdom_dontaudit_manage_user_home_content_files(mozilla_plugin_t)
+')
+
 tunable_policy(`mozilla_execstack',`
 	allow mozilla_plugin_t self:process { execmem execstack };
 ')

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2017-04-20  1:02 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-04-20  1:02 [refpolicy] [PATCH 18/33] mozilla: curb on userdom permissions Guido Trentalancia

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.