On Thu, Jul 25, 2013 at 8:39 PM, Reindl Harald <h.rei...@thelounge.net> wrote:
>
>
> Am 25.07.2013 20:31, schrieb drago01:
>> On Thu, Jul 25, 2013 at 6:36 PM, Reindl Harald <h.rei...@thelounge.net> 
>> wrote:
>>> Am 25.07.2013 17:57, schrieb drago01:
>>>>> in theory yes
>>>>>
>>>>> practically a exploit is not that easy like fire
>>>>> a bundle of commands as root like a script
>>>>>
>>>>>> So we're talking about limited circumstances where
>>>>>> the attacker can modify files and not execute code, or where the
>>>>>> attacker is root but not CAP_SYS_ADMIN (or whatever it is)
>>>>>
>>>>> a httpd running with SElinux disabled or in permissive mode with
>>>>
>>>> Here is your problem ... How about running it in enforcing mode? I mean 
>>>> you care ab out security and disable
>>>> security features at the same time. If there are selinux bugs file and/or 
>>>> fix them
>>>
>>> if you are able to marry pure-ftpd, samba and 250 cms-installations 
>>> predictable
>>> on a machine running also *self developed* managment-software for a complete
>>> infrastructure on 20 Fedora servers with SElinux go ahead :-)
>>
>> You missed the "and/or fix and file bugs" part
>
> you missed the  *self developed* managment-software

No I did not. The selinux policy is supposed to work fine for them as
well. You can
even amend the policy for your specific needs.

>> It does not work so lets disable it and add hacks to get the same
>> functionality back is bad practice.
>
> no, using as much as possible security options without
> damage the operational work is the one and only practice
> if it comes to *business* and a lot of people living
> from 365/24/7 up services with no "permissions denied"
> where it is not intented
>
>> If it does not work we should fix it
>
> *you* can *not* fix anything in packages

Sure I can done that countless times in the past or IOW no idea what
that is supposed to mean.

> in my case these are over more than 10 years grown environments

Irrelevant.

> responsible for over 600 domains which was migrated from MacOSX
> to Fedora years ago,

Irrelevant.

> there are a *lot* of packages involved which
> are not existing for Fedora in the public

There might still be bugs in them (and/or in the selinux-policy package).
Being more specific would be way more productive. Like "my app tries
to do X but fails with the following message".

You don't have to run enforcing straight out. You can start with
permissive, fix the bugs / your configuration and once you
have done that switch to enforcing.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reply via email to