[prev in list] [next in list] [prev in thread] [next in thread]
List: selinux
Subject: New init system hitting a distro near you.
From: Daniel J Walsh <dwalsh () redhat ! com>
Date: 2010-06-18 19:34:44
Message-ID: 4C1BCA54.20005 () redhat ! com
[Download RAW message or body]
http://0pointer.de/blog/projects/systemd.html
This has interesting ramifications for SELinux. I have a working
version of this in Fedora 14, but we need to add rules like
allow sshd_t init_t:tcp_socket { getopt ioctl getattr setopt };
Since systemd will be doing the listening and passing the socket to sshd.
Could we have risks of sshd_t grabbing the tcp_socket connected to
httpd_t?
In this scenario we are no longer protecting against the name_bind, and
are forced to put more trust into init_t.
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic