On Wed, Jun 17, 2015 at 12:00 PM, Stephen Smalley <s...@tycho.nsa.gov> wrote:

> On 06/17/2015 02:21 PM, William Roberts wrote:
> >
> >
> > On Wed, Jun 17, 2015 at 10:24 AM, Nick Kralevich <n...@google.com
> > <mailto:n...@google.com>> wrote:
> >
> >
> >     On Wed, Jun 17, 2015 at 10:14 AM, William Roberts
> >     <bill.c.robe...@gmail.com <mailto:bill.c.robe...@gmail.com>> wrote:
> >
> >         I'm more OK with that approach. What about removing all in tree
> >         uses?
> >
> >
> >     If we can, sure.
> >
> >     Not sure how you're going to solve the ueventd/watchdogd symlink
> >     problem - I agree that relying on symlink labeling is error prone
> >     and something we should avoid...
> >
> >
> > Can someone please give me an argument that shows that its error prone?
> > How is launching ueventd and watchdog from symlink not-error prone but
> > having an fc entry for it is?
>
> You're using the context of the symlink to make a label computation when
> that context has nothing to do with the context of the actual executable
> and the target of the symlink can be changed at any time.
>
> I guess either way our entrypoint permission check will at least ensure
> that you can't replace the target of the symlink with something that is
> not an authorized entrypoint type.  However, for some of these cases, we
> have to allow entrypoint to all rootfs executables (if not labeling
> them) or to the shell, and that then obviously means that one could
> enter the domain via any rootfs executable or run an arbitrary shell
> script in that domain.
>
> Probably won't matter for files in rootfs or /system given our
> neverallows on writing to either of those locations.  I would just be
> concerned with how it might get abused by OEMs.
>
> > As an alternative thought I can get rid of the symlinks to the start
> > ueventd and watchdogd and replace them with minimal C shims that call
> > init with an argument for
> > the mode of operation. Then we can label that executable.
>
> I think that was the approach taken in busybox for SELinux.  But again I
> have to ask whether it is worth it versus just continuing to use
> seclabel.  Not convinced it is justified.
>

That I could agree with more than the other arguments presented. Is the
work vs tradeoff worth it. However, IMHO presenting a single way of
doing something is the right choice.

-- 
Respectfully,

William C Roberts
_______________________________________________
Seandroid-list mailing list
Seandroid-list@tycho.nsa.gov
To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
To get help, send an email containing "help" to 
seandroid-list-requ...@tycho.nsa.gov.

Reply via email to