Shared data area

Daniel J Walsh dwalsh at redhat.com
Fri Jul 22 12:41:10 UTC 2005


Nicklas Norling wrote:

> Paul Howarth wrote:
>
>> On Wed, 2005-07-20 at 13:34 -0400, Daniel J Walsh wrote:
>>  
>>
>>> Paul Howarth wrote:
>>>
>>>   
>>>
>>>> Daniel J Walsh wrote:
>>>>
>>>>     
>>>>
>>>>> Paul Howarth wrote:
>>>>>
>>>>>       
>>>>>
>>>>>> On Tue, 2005-07-19 at 13:12 +0200, Nicklas Norling wrote:
>>>>>>
>>>>>>
>>>>>>         
>>>>>>
>>>>>>> I would encourage a boolean for shared data location. I think 
>>>>>>> labeling a folder and it's subcontent with a specific label and 
>>>>>>> then have different services be able to use it might be a start. 
>>>>>>> That way I could disallow smb the rights but allow ftpd and 
>>>>>>> httpd (as an example). I think that would be a great improvment 
>>>>>>> from my point of view.
>>>>>>>  
>>>>>>>           
>>>>>>
>>>>>>
>>>>>> I think this is a great idea. I have a file server at home where 
>>>>>> I stick
>>>>>> all the software I've downloaded, some for Linux and some for 
>>>>>> Windows.
>>>>>> The Windows box accesses the area using samba and Linux uses 
>>>>>> httpd as
>>>>>> I've set up a local yum repo for the Linux software. So in 
>>>>>> Niklas' idea
>>>>>> I'd be enabling httpd and smb for this and not ftp.
>>>>>>
>>>>>> This type might be a good one to use for everything under /srv...
>>>>>>
>>>>>> Paul.
>>>>>>
>>>>>>
>>>>>>         
>>>>>
>>>>> Ok.  I am allowing ftpd, samba, apache and/or apache scripts, 
>>>>> rsync to read ftpd_anon_t.
>>>>>
>>>>> So if you want files shared by these services, you can change the 
>>>>> context to ftpd_anon_t.
>>>>>       
>>>>
>>>> Would it not be better to create a new type for a shared data area 
>>>> (e.g. srv_data_t), with booleans allowing read/write access to this 
>>>> data for each daemon, rather than overloading an existing type? 
>>>> After all, some process has to set up this data area, and for some 
>>>> people that will be done using ftp, some sftp, some rsync, some 
>>>> samba etc...
>>>>
>>>>     
>>>
>>> I could do that, but I was already sharing the type between rsync 
>>> and ftp.  Basically I think of this type, as data available on the 
>>> network requiring no authorization to read or for ftpd_anon_rw_t, to 
>>> write.  Creating a bunch of booleans for each daemon that might use 
>>> the type, seems like a complexity for limited additional security.  
>>> If I have a server running apache and ftpd, I can't see what the 
>>> difference if allowing them to read the data via the ftp protocol, 
>>> but not via the http protocol.  But I am willing to be persuaded.
>>>   
>>
>>
>> I'd agree on the read side of the discussion. But if you want to
>> maintain this data area using, say, rsync, then you'd need to use
>> ftpd_anon_rw_t to enable writing in the first place, and that would then
>> open up the area to be written by *all* of the daemons unless there were
>> separate write-enable booleans for each daemon. I can certainly see
>> benefits in doing that.
>>
>> Paul.
>>  
>>
> I suppose one could argue that the daemon in question should be set up 
> correctly. read-only or read-write as appropriate. Selinux should not 
> do the applications job or there would be dual systems to keep in sync 
> when policies changes. But I do see your point. I'm afraid I don't 
> know enough about selinux to comment further. Just wanteded to play 
> the devils advocate for awhile.
> /Nicke
>
Ok, I will add booleans for all "shared" domains to write to ftpd_anon_rw_t

> -- 
> fedora-selinux-list mailing list
> fedora-selinux-list at redhat.com
> http://www.redhat.com/mailman/listinfo/fedora-selinux-list



-- 





More information about the fedora-selinux-list mailing list