On Mon, 2015-09-28 at 15:03 +0200, Tomasz Swierczek wrote: > For Tizen 3.X however - there is no association of methods/interfaces > to Smack labels. Instead, there are patches prepared & merged that > allow to associate them with privileges, that are in turn, checked by > Cynara, and from what I know, this policy check is done - in contrary > to the above - at runtime, during actual method call (see > https://review.tizen.org/gerrit/#/c/31022/ and subsequent patches in > DBus, also this wiki page: > https://wiki.tizen.org/wiki/Security:Cynara:DBus_integration ). > > As for general rule, processes running with application labels should > not register any interface in DBus nor should they talk with each > other.
But they are allowed to connect to the dbus-daemon and thus system and session bus, right? At least in IVI, that is important because many system services are based on D-Bus. So once an app is allowed to connect (= has rw access to the D-Bus Unix domain socket), it can send messages to anyone on that bus, including other apps, unless the dbus-daemon as the intermediary does message filtering. The current set of patches does that based on "default deny" policy with Cynara checks. The older approach from Tizen 2.x was dropped. -- Best Regards, Patrick Ohly The content of this message is my personal opinion only and although I am an employee of Intel, the statements I make here in no way represent Intel's position on the issue, nor am I authorized to speak on behalf of Intel on this matter. _______________________________________________ Dev mailing list [email protected] https://lists.tizen.org/listinfo/dev
