On Mon, 2015-09-28 at 15:03 +0200, Tomasz Swierczek wrote:
> For Tizen 3.X however - there is no association of methods/interfaces
> to Smack labels. Instead, there are patches prepared & merged that
> allow to associate them with privileges, that are in turn, checked by
> Cynara, and from what I know, this policy check is done - in contrary
> to the above - at runtime, during actual method call (see
> https://review.tizen.org/gerrit/#/c/31022/  and subsequent patches in
> DBus, also this wiki page:
> https://wiki.tizen.org/wiki/Security:Cynara:DBus_integration ).
> 
> As for general rule, processes running with application labels should
> not register any interface in DBus nor should they talk with each
> other.

But they are allowed to connect to the dbus-daemon and thus system and
session bus, right? At least in IVI, that is important because many
system services are based on D-Bus.

So once an app is allowed to connect (= has rw access to the D-Bus Unix
domain socket), it can send messages to anyone on that bus, including
other apps, unless the dbus-daemon as the intermediary does message
filtering.

The current set of patches does that based on "default deny" policy with
Cynara checks. The older approach from Tizen 2.x was dropped.

-- 
Best Regards, Patrick Ohly

The content of this message is my personal opinion only and although
I am an employee of Intel, the statements I make here in no way
represent Intel's position on the issue, nor am I authorized to speak
on behalf of Intel on this matter.



_______________________________________________
Dev mailing list
[email protected]
https://lists.tizen.org/listinfo/dev

Reply via email to