haha I just read this.. yeah came up with the same thing, just slightly different expression for it. I think I like your expression better. Do you have patch for this, I can modify mine
On Thu, May 9, 2013 at 11:37 AM, Tai Nguyen (tainguye) <taing...@cisco.com>wrote: > A compromised option can be merging Steve's computation with seclabel > >> service wpa_supplicant /system/bin/logwrapper /system/bin/wpa_supplicant \ >> # after setting up the capabilities required for WEXT >> # user wifi >> # group wifi inet keystone > > seclabel pcontext=/system/bin/wpa_supplicant >> >> class main >> socket wpa_wlan0 dgram 660 wifi wifi >> disabled >> > > Init will compute the security context for seclabel based on the input > process, thus, ensure that the security context is consistent and the > option can be used for different scenario as well > > > From: William Roberts <bill.c.robe...@gmail.com> > Date: Thursday, May 9, 2013 2:20 PM > To: Stephen Smalley <s...@tycho.nsa.gov> > Cc: Tai Nguyen <taing...@cisco.com>, "seandroid-list@tycho.nsa.gov" < > seandroid-list@tycho.nsa.gov> > Subject: Re: Improper labeling of init created sockets when using > logwrapper > > Yeah I thought about doing exactly what your patch does, but didn't > like hard-coding "logwrapper", as anyone forking/execing across another > thing similar to logwrapper will have the > same issue. I liked it to be consistent. > > > On Thu, May 9, 2013 at 8:00 AM, Stephen Smalley <s...@tycho.nsa.gov> wrote: > >> On 05/09/2013 10:56 AM, Tai Nguyen (tainguye) wrote: >> >>> >>> Steve, >>> >>> Thank for clarification. In that case, can we do something like >>> service wpa_supplicant /system/bin/logwrapper /system/bin/wpa_supplicant >>> \ >>> # after setting up the capabilities required for WEXT >>> # user wifi >>> # group wifi inet keystore >>> class main >>> socket wpa_wlan0 dgram 660 wifi wifi context=u:r:wpa:s0 >>> disabled >>> >> >> With my patch, you don't need to specify the socket security context at >> all; init will compute it correctly. >> >> Prior to my patch, you could work around it by adding a seclabel entry >> for the service, i.e. >> service wpa_supplicant /system/bin/logwrapper /system/bin/wpa_supplicant >> >> seclabel u:r:wpa:s0 >> ... >> >> but that would require a policy change to allow entrypoint permission >> between wpa and the type on the logwrapper program. >> >> There is no context= option for socket entries at present, and we don't >> really need it since we can handle it using either the patch I posted (now >> also uploaded to AOSP at [1]) or by using the seclabel approach above. >> >> [1] >> https://android-review.**googlesource.com/#/c/58300/<https://android-review.googlesource.com/#/c/58300/> >> > > > > -- > Respectfully, > > William C Roberts > > -- Respectfully, William C Roberts