Re: SELinux blocking Gizmo on FC5

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 2006-04-02 at 09:31 +0200, A.J. Bonnema wrote:
> Michael Wiktowy wrote:
> > I just fixed my problem with
> > chcon -t texrel_shlib_t /usr/lib/libsipphoneapi.so.0.78.20060211
> > I am not exactly sure what that does though.
> Craig,
> 
> I wonder how many people do these statements without understanding the 
> implications? How secure would that be?
> On this line, what we actually need is some kind of easifier / 
> dumbifier, if you get my meaning. So it is obvious what the implications 
> are.
----
I see your point and agree with it except that you can consider...

the target is /usr/lib/libsippphoneapi.so...

so the adjustment is made to one specific file for one specific purpose
and the whole of selinux remains intact beyond that. That is
significant.

It does take a moment of consideration if you are adding rules from say
audit2allow as some of those 'blocks' may have been caused by selinux
protections emanating from intrusion attempts and adding them either by
policy or by file context adjustment would simply open the door for
them, a slight bit of consideration should be all that is necessary to
evaluate the reason.

Per this situation, he knew that he installed the 'Gizmo' ip phone
software so it makes sense that this 'block' occurred from the software
he wants to run so taking the necessary steps to enable it make sense.

In your specific case, it would appear that you are setting up squid in
both examples that you gave, so adding the file contexts for squid would
be perfectly logical.
----
> 
> Think of implementing an application: no user fully understands the 
> implications of that application, even less are they able to check these 
> implications: they trust the builders. Obviously, this is inherently 
> insecure. (example? One of the anti-virus vendors had parts of a rootkit 
> implemented, creating a possible security hole. The software was 
> generally trusted by users to be secure).
> 
> Now, back to SELInux, I suspect that in general non-admin user can not 
> fully understand what he/she is doing when doing a chcon or changing a 
> policy.
> So, what we need is some sort of high translation of the implications, 
> so that even non-programmer, non-admin users can understand what they 
> are doing on a bit of a higher level than what is currently possible.
> 
> Would it be possible to have a non-technical layer around SELInux so 
> that users can have a more high level view of their security than admins 
> have?
> [Regretfully, many users are admin by default, but not by choice, i.e. 
> home users. They need the high level view...]. Meaning, a user can 
> change the system (high-level) and still know what he/she is doing 
> (high-level).
----
I generally trust the greater minds on this. Consider that if you enable
some rules/policies/contexts, in the worst case scenario, selinux would
still be functional, just not in those particular areas.

Make sure you see the 'selinux for dummies' stuff as that is Daniel
Walsh's attempt to bring the issue of selinux down to a non-technical
level.

Craig


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux