Mike John wrote:
> I'd appreciate some clarification of the use of the admin_low label in TX.
>
>
> In order for the configuration files to be labelled admin_low, must 
> there exist a zone with label admin_low to contain them, or can they 
> exist with label admin_low within the global zone?
>   
By default, all the files in the global zone are labeled ADMIN_HIGH. 
However, when at least one non-global zone is booted with a lofs or 
inherited-pkg-dir reference to a global zone directory, the specified 
directory and everything under it is labeled ADMIN_LOW. Similarly, if 
you export a directory via NFS from the global zone, it is labeled 
ADMIN_LOW.

For more background, see the white paper Multilevel Filesystems in 
Solaris Trusted Extensions on OpenSolaris:

http://opensolaris.org/os/community/security/projects/tx/sacmat04s-faden-1.pdf


>
> Also, what does it mean to "assume a role at label admin_low" in a TX 
> world? Does there need to be zone with label admin_low to support this?
>   

You can not assume a role at ADMIN_LOW in TX. When assuming a role that 
has a label range of ADMIN_LOW to ADMIN_HIGH, your process label will be 
ADMIN_HIGH. But files within the global zone are protected by DAC, not 
MAC, so you will be able to write ADMIN_LOW files if you have DAC 
permission and the file is mounted in writable file system. For this 
reason, and others, we don't allow untrusted users into the global zone. 
However, if you really want to enforce a MAC policy on ADMIN_LOW files, 
you can remount them using a lofs read-only mount in vfstab. For 
example, you can specify that /usr is read-only even in the global zone 
by creating an entry in /etc/vfstab that mounts /usr on /usr as a 
read-only lofs mount point. You will need to reboot for this to take 
effect, or to undo it.

--Glenn

Reply via email to