-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Carl Trieloff wrote:
> 
> Josh,
> 
> I have copied Dan, I can comment on the ACL side for Qpid... ... I'll
> leave the SELinux side to Dan.
> 
> Carl.
> 
> 
> Joshua Kramer wrote:
>>
>> Hey, that'd be great! I may also post to the SELinux mailing list.
>> After looking over the SELinux documentation and some other resources,
>> here's what I've found.
>>
>> There are a couple of ways we can go about this. The first way, is to
>> use pseudo-contexts to load ACL's stored in SELinux into QPid ACL's.
>> (Here, 'context' means a SELinux context.) To accomplish access
>> control in this manner, we need to do the following:
>>
>> 1. Create some pseudo-contexts representing QPid objects (things like
>> queues, exchanges, etc.)
>> 2. Go to a file on the filesystem and read in text-based user names.
>> 3. For each name, compute the target contexts that it is allowed to
>> access... and convert those into QPid ACL's.
>>
>> I do not think there is a way to call SELinux and ask it, "give me a
>> list of all the users in the QPid Type, and the things they can
>> access..." But I may be mistaken. There are some third-party SELinux
>> tools for which the source is accessible, so I may peruse those tools.
>>
>> The second way in which we can integrate SELinux into QPid is a bit
>> more complicated. Instead of using the built-in ACL's, we can go into
>> the data structures holding the various QPid objects (queues,
>> exchanges, etc.) and add elements for SELinux security contexts to
>> each object. We would then place calls to security_compute_av before
>> each call that manupulates an object, to determine if that particular
>> operation was permitted.
>>
>> The second way requires more work because it would be tightly woven
>> into many different parts of the broker. The first way is less work
>> because it merely implements an ACL plugin on top of SELinux.
>>
>> So, this is becomes a philosophical discussion. Should we implement
>> QPid ACL's on top of SELinux, or implement SELinux in the broker itself?
>>
>> Cheers,
>> -Josh
>>
>> On Wed, 18 Feb 2009, Carl Trieloff wrote:
>>
>>> Date: Wed, 18 Feb 2009 12:51:01 -0500
>>> From: Carl Trieloff <[email protected]>
>>> To: Joshua Kramer <[email protected]>
>>> Cc: [email protected], [email protected]
>>> Subject: Re: Access management with QPid
>>>
>>> Joshua Kramer wrote:
>>>>
>>>>> remote interfaces for ACL. Cross
>>>>> posting to the dev list, as I don't remember who was prototyping/
>>>>> implementing this.
>>>>
>>>> I am playing with pulling the ACL information from SELinux.
>>>> Currently, I'm determining the best SELinux method to use to get the
>>>> ACL's we need.
>>>>
>>>> Cheers,
>>>> -Josh
>>>>
>>> If you think you know what to do I can forward your ideas to someone
>>> on the SELinux team if you want comment. Some of the guys on SELinux
>>> sit one floor below me ;-)
>>>
>>
> 
I think some of your ideas are good, but lets bring in the selinux
developers to see what there take on this is.  dbus is a good example of
this use.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkmcXjwACgkQrlYvE4MpobP5JgCfedY5pNniQWTtFCP2b17k7+qL
4eAAoKxLewf341D3K5y1Uxc8/Tyr9tli
=HulE
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
Apache Qpid - AMQP Messaging Implementation
Project:      http://qpid.apache.org
Use/Interact: mailto:[email protected]

Reply via email to