sVirt

Gene Czarcinski gene at czarc.net
Mon Jul 6 14:13:12 UTC 2009


On Sunday 05 July 2009 06:36:05 Daniel P. Berrange wrote:
> > 2. For files on read-only file systems, don't do anything ... they are
> > protected about as much as they can be.
>
> As has been mentioned in the bug you raised several days ago, this issue
> should already be addressed
>
>   https://bugzilla.redhat.com/show_bug.cgi?id=507555

I am still looking for the update libvirt to be post to updates-testing.

>
> > 4. For ISO files, maybe there should be a new/special file context which
> > allows sharing between processes ... it would be explicit but it would
> > allow sharing ... maybe something like "public_content_t".
>
> There is already a label for read only guest images
>
>   system_u:object_r:svirt_image_t:s0
>
> it shouldn't be much work for you to add a custom SELinux plugin that
> gives httpd_t access to content labelled svirt_image_t. Ask the
> fedora-selinux mailing list for assistance if needed

I believe this is backwards from the way things should work.  Please see my 
new bugzilla report:
https://bugzilla.redhat.com/show_bug.cgi?id=509834

sVirt is the new kid on the block and should work with others not the reverse.  
Why should I need to create an SELinux plugin so that stuff that did work still 
does work?

>
> > 5. Maybe implement a switch which disables SELinux enforcing (and does
> > not change the file context of ISO files) for Fedora-virtualization.
>
> Already present /etc/libvirt/qemu.conf , change  security_driver="none"

OK, I can certainly edit the config file myself (now that I am aware of it).  
However, shouldn't I be able to set this with either an SELinux boolean or via 
virt-manager's preferences?

BTW, there are currently a number of SELinux booleans for "virt" but I am not 
sure what each does/means.
>
> > 6.  Maybe the switch should be by guest.
>
> Easy enough to add - file a bug if you want this capability.

Yes, something like this is desirable (IMHO).  

However, what I really want is to be able to define and build a guest without 
screwing up "other" shared files and/or devices but then be able to lock that 
guest down once it is built.  The system settings for a guest in 
creation/build mode should not effect the settings of other guest virtuals 
already built 

This is analogous to development versus production environments. 

Gene




More information about the fedora-selinux-list mailing list