Mivz wrote:

Chris PeBenito wrote:

plain text document attachment (heimdal-LDAP.te)
#/tmp/krb5cc
allow user_t local_login_tmp_t:file { read lock append };

I added this rule because pam_krb5 init's the krbcc and thus causes the /tmp/krbcc to be in the wrong security context. Also kinit and kdestroy loose access to /tmp/krbcc because of this. Is this a pam_krb5 bug, because it creates the /tmp/krbcc file in the wrong context, or a selinux-kerberos bug, because it does not handel the /tmp/krbcc file correct?

I had another thought about this. The krb5cc files are one of the most important files for a kerberos client. It holds your identity. Loosing this file is like loosing a part of your shadow file. So I think this file should be highly protected. The current selinux-kerberos policy does not do this. I think every user should have a separated selinux context for his krb5cc file and each program needing access to this should be specified in the selinux policy. This would prevent miscellaneous software for reaching this file and abusing your identity. It would be something like user:object_r:krb5_cc_t. Al programs accessing should have a file_type_auto_trans. I would like to work on this, but I don't know if it has any use, because of the new upcoming policy. Is this policy just different being modular and having to add dependency's like in the current policy-server-policy, or are the basic macros and policy also going to change that much that each policy has to be rewritten form scratch?
I also would like some comment on my idee for the krb5cc file.

--
[email protected] mailing list

Reply via email to