Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757557AbXFOVmX (ORCPT ); Fri, 15 Jun 2007 17:42:23 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755067AbXFOVmN (ORCPT ); Fri, 15 Jun 2007 17:42:13 -0400 Received: from mail8.sea5.speakeasy.net ([69.17.117.10]:36380 "EHLO mail8.sea5.speakeasy.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753048AbXFOVmL (ORCPT ); Fri, 15 Jun 2007 17:42:11 -0400 Date: Fri, 15 Jun 2007 17:42:08 -0400 (EDT) From: James Morris X-X-Sender: jmorris@localhost.localdomain To: Greg KH cc: Pavel Machek , Crispin Cowan , Andreas Gruenbacher , Stephen Smalley , jjohansen@suse.de, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [AppArmor 39/45] AppArmor: Profile loading and manipulation, pathname matching In-Reply-To: <20070615211157.GB7337@kroah.com> Message-ID: References: <20070514110607.549397248@suse.de> <200706090003.57722.agruen@suse.de> <20070609001703.GA17644@kroah.com> <466C303E.5010304@novell.com> <20070615165054.GA11345@kroah.com> <20070615200623.GA2616@elf.ucw.cz> <20070615211157.GB7337@kroah.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1251 Lines: 31 On Fri, 15 Jun 2007, Greg KH wrote: > > Or just create the files with restrictive labels by default. That way > > you "fail closed". > > From my limited knowledge of SELinux, this is the default today so this > would happen by default. Anyone with more SELinux experience want to > verify or fix my understanding of this? This is entirely controllable via policy. That is, you specify that newly create files are labeled to something safe (enforced atomically at the kernel level), and then your userland relabeler would be invoked via inotify to relabel based on your userland pathname specification. This labeling policy can be as granular as you wish, from the entire filesystem to a single file. It can also be applied depending on the process which created the file and the directory its created in, ranging from all processes and all directories, to say, just those running as user_t in directories labeled as public_html_t (or whatever). - James -- James Morris - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/