Re: [gentoo-hardened] RFC doc on hardened.

2010-09-27 Thread Sven Vermeulen
ut it might be interesting to tell the users how you came to the numbers, or use online resources to back up the figures Generally, I get the feeling the document is more an article (one-time useful read) rather than a to-be-maintained document. It's a good read to refer people to when they as

Re: [gentoo-hardened] SELinux (strict policy) and ssh

2010-11-14 Thread Sven Vermeulen
y log on (through SSH) in the sysadm_r role. Once they are logged on, they can always use newrole. wkr, Sven Vermeulen pgpWmWMtaMl4Y.pgp Description: PGP signature

Re: [gentoo-hardened] SELinux (targeted policy) and invalid context

2010-11-17 Thread Sven Vermeulen
x27;s also hardly possible to create any documentation on it. However, I am planning on starting with documentation (even if based upon overlay ebuilds) soon - right after I get X working properly :p ) Wkr, Sven Vermeulen pgpCgSrYzg6D6.pgp Description: PGP signature

Re: [gentoo-hardened] SELinux (targeted policy) and invalid context

2010-11-17 Thread Sven Vermeulen
ight one (unless I'm also running the wrong one ;-) Wkr, Sven Vermeulen pgpPJPYPHIB5f.pgp Description: PGP signature

[gentoo-hardened] SELinux documentation draft

2011-01-06 Thread Sven Vermeulen
he time being the document only supports the type enforcement features of SELinux. MLS/MCS has not been touched yet. Feedback is always welcome, including language mistakes, typos or just plain lies. Wkr, Sven Vermeulen pgpkLHTDcvYaK.pgp Description: PGP signature

[gentoo-hardened] SELinux ebuilds and patches

2011-01-08 Thread Sven Vermeulen
ersonal preference goes to the patches themselves so that we do not drift away from the reference policy and are forced to keep track of it. Also, when a new release is made, we can look at the individual patches to see which still need to be included and which not. Wkr, Sven Vermeulen pgpv3gXhISi0q.pgp Description: PGP signature

Re: [gentoo-hardened] SELinux documentation draft

2011-01-10 Thread Sven Vermeulen
On Mon, Jan 10, 2011 at 08:44:06AM -0500, Chris PeBenito wrote: > On 1/6/2011 5:32 PM, Sven Vermeulen wrote: > > I've been working on bringing the SELinux handbook as currently available on > > http://www.gentoo.org/proj/en/hardened/selinux/selinux-handbook.xml more > > u

[gentoo-hardened] SELinux policy rules principles?

2011-01-16 Thread Sven Vermeulen
logging clean, or do we then expect the administrator to manage his own dontaudits? Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy rules principles?

2011-01-19 Thread Sven Vermeulen
e SELinux policy developer a clearer scope of his tasks. The problem with the first approach is that other users have a higher likelihood of having a malfunctioning system than with the last (what the developer sees as cosmetic might be important on other systems). Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy rules principles?

2011-01-19 Thread Sven Vermeulen
- how do I then know that a rule is cosmetic ;-) Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy rules principles?

2011-01-19 Thread Sven Vermeulen
omething similar. The boolean could provide additional benefit as it sais to the end user "hey, if you enable this, you'll get less AVC denials but we are not fully confident yet that they are true ignorable denials", unlike the "semodule -D" approach which also disables all real ignorable dontaudit denials. Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy rules principles?

2011-01-21 Thread Sven Vermeulen
On Sun, Jan 16, 2011 at 11:06:47AM -0600, Chris Richards wrote: > On 01/16/2011 09:09 AM, Sven Vermeulen wrote: > > When writing security policies, it is important to first have a vision on > > how the security policies should be made. Of course, final vision should be > > wit

[gentoo-hardened] SELinux policy module packages

2011-02-12 Thread Sven Vermeulen
in the same module (think the bootloader case) or use a different naming convention for those particular packages. So, what are your thoughts on this? Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy module packages

2011-02-12 Thread Sven Vermeulen
if "sec-policy/selinux-gpg" works equally well (or better), but I haven't read the discussion on this online (just heard from others about it). I also don't mind if general consensus is not my preference as I think it is more important that we set a rule/guideline for the developers to follow strictly. Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy module packages

2011-02-12 Thread Sven Vermeulen
with being the policy name used by the reference policy, that we can use that as well in the Gentoo Hardened SELinux Policy document [1]. By doing so, future developers immediately know how Gentoo Hardened works (it is documented, so they don't need to start pondering how to call the policy package for module "foo"). Wkr, Sven Vermeulen [1] goo.gl/2U0Zr

Re: [gentoo-hardened] SELinux policy module packages

2011-02-21 Thread Sven Vermeulen
On Sat, Feb 12, 2011 at 02:25:29PM -0600, Chris Richards wrote: > On 02/12/2011 02:03 PM, Sven Vermeulen wrote: > > Actually, I'm rather hoping that if everyone agrees on the guideline that > > SELinux policy packages are called "selinux-" with being > > t

Re: [gentoo-hardened] SELinux policy module packages

2011-02-22 Thread Sven Vermeulen
-policy/selinux-gpg-1 sec-policy/selinux-gnupg-Y blocks !~sec-policy/selinux-gnupg-X Phase 3 (fade-out) == sec-policy/selinux-gnupg is removed from Portage tree. BTW, the selinux-desktop one is a weird one and my suggestion would be to purge it (it's not manageable). Wkr, Sven Vermeulen

[gentoo-hardened] Cleanup of sec-policy (old ebuilds)

2011-02-27 Thread Sven Vermeulen
package) that's fine too, but in that case don't forget to clean the files/ folder too. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Cleanup of sec-policy (old ebuilds)

2011-02-27 Thread Sven Vermeulen
(until the 2.20101213's stabilize) we at least are more confident that that won't happen. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Cleanup of sec-policy (old ebuilds)

2011-02-27 Thread Sven Vermeulen
an agree to: first stabilize the 2.20101213 set, then start with the clean-up operation. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy 2.20101213-r9 in overlay

2011-03-02 Thread Sven Vermeulen
nfirmed, and (2.) regressions can be detected. For the time being you'll see that the tests aren't advanced, but at least it's a start and it can grow more easily ;-) Wkr, Sven Vermeulen

[gentoo-hardened] SELinux FAQ & Handbook

2011-03-02 Thread Sven Vermeulen
iggered through specific dynamic variables (&doc=3&chap=1) Any objections to this? Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux FAQ & Handbook

2011-03-09 Thread Sven Vermeulen
On Thu, Mar 03, 2011 at 04:24:13AM +0100, klondike wrote: > 2011/3/2 Sven Vermeulen : [... Suggestion to make a SELinux FAQ document instead of having it as a chapter in the SELinux Handbook ...] > > Any objections to this? > Nope, maybe you'd like to blend it with the harde

Re: [gentoo-hardened] Towards stabilizing the latest SELinux policies/utilities.

2011-03-17 Thread Sven Vermeulen
Anyhow, #346563 is about that weird multilib/nomultilib situation. SELinux profiles currently enable multilib and "-multilib" (aka "no-multilib") is for the time being not supported. But we might need to focus on this in the near future as I would assume in server environments no-multilib is preferred. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux and no-multilib

2011-03-18 Thread Sven Vermeulen
x264 tcc Runs in enforcing mode (strict policy), gcc -v shows "--disable-multilib". Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux and no-multilib

2011-03-18 Thread Sven Vermeulen
be completely wrong in this small analysis. I'm no profile/portage wizard though. Anyone up to the challenge? Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux and no-multilib

2011-03-27 Thread Sven Vermeulen
d "parent" showing something like: ../ ../../../../features/selinux I just tried this on my no-multilib system as well as on a multilib one, and apart from USE="gdbm bzip2 urandom nptl justify -fortran" I have had no other changes (checked the different outputs of "emerge --info" as well as a "emerge -puDN world"). Wkr, Sven Vermeulen

[gentoo-hardened] SELinux Policy development guide

2011-04-23 Thread Sven Vermeulen
esterday as well, adding two more FAQs. One is about rlpkg complaining about conflicting types, the other one is about portage complaining about libsandbox.so not being loaded. FAQ preview at http://goo.gl/uaaf4 Wkr, Sven Vermeulen

[gentoo-hardened] SELinux Gentoo profiles (the /usr/portage/profiles kind)

2011-04-27 Thread Sven Vermeulen
f people have objections, any other ideas on how to tackle the problem that current SELinux profiles do not support no-multilib (but do not enable "multilib" USE flag) [4]? Wkr, Sven Vermeulen [1] http://thread.gmane.org/gmane.linux.gentoo.hardened/4820/focus=482

[gentoo-hardened] SELinux base policy -r13 in overlay, adds "ubac" USE flag

2011-05-02 Thread Sven Vermeulen
odule -b base.pp" to (re)try and get the proper failure messages. I'm thinking about not ignoring the failure but making sure that the build logs of the (failed) install contains all information needed to fix. Oh darn, almost a full page of rambling, I'll shut up now. Sven Vermeulen

Re: [gentoo-hardened] SELinux base policy -r13 in overlay, adds "ubac" USE flag

2011-05-09 Thread Sven Vermeulen
ding the means to switch it off (refpolicy has it as a configurable setting, so why not) might be a bit harsh. But I wouldn't mind having USE="ubac" forced on by the SELinux profiles (so a user would need to use.force it in their local profile override location). Is that a situation you can live with? Wkr, Sven Vermeulen

[gentoo-hardened] SELinux policy and openrc

2011-05-13 Thread Sven Vermeulen
fstab has been put in the SELinux handbook in hardened-doc.git overlay. Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy and openrc

2011-05-14 Thread Sven Vermeulen
y various other domains, which would then also need to be patched, and all that just for Gentoo. The moment I notice that I'm deviating too much from things because of a single reason (having wrappers over /sbin/rc) I tend to look for other answers. I have a few ones up my sleeve, but nee

Re: [gentoo-hardened] SELinux policy and openrc

2011-05-14 Thread Sven Vermeulen
airly well on my systems, but that's again another change just for SELinux-enabled Gentoo systems :-( Chris R.: in https://bugs.gentoo.org/351712 the use of the wrappers was suggested instead of symlinks (which would've caused the same problems here I think) just for the reason that I'm writing out now. How did you resolve the problem on your system? Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy and openrc

2011-05-15 Thread Sven Vermeulen
On Sun, May 15, 2011 at 12:25:32AM +0200, Sven Vermeulen wrote: > I just pushed selinux-base-policy-2.20101213-r15 to hardened-dev.git > overlay. It does not resolve all problems, but at least Gentoo Hardened with > SELinux now boots up properly with OpenRC (and the Gentoo SELinux handb

Re: [gentoo-hardened] How openrc check the state of services?

2011-05-15 Thread Sven Vermeulen
It is the /sbin/rc binary which uses the information in /lib64/rc/init.d (a tmpfs mount). The tmpfs location has directories like "started" in which symlinks exist to the files in /etc/init.d. Wkr, Sven Vermeulen On Mon, May 16, 2011 at 2:49 AM, "Tóth Attila" wrote: >

[gentoo-hardened] Project page changes, roadmap and support matrix

2011-05-24 Thread Sven Vermeulen
ys thought "Gentoo Hardened" is the correct one. "Hardened Gentoo" is the result of applying the projects in "Gentoo Hardened" imo. Wkr, Sven Vermeulen [1] http://xrl.us/bkpo6j [2] http://xrl.us/bkpo62 [3] http://xrl.us/bkpo73

[gentoo-hardened] RFC - SELinux module documentation

2011-06-02 Thread Sven Vermeulen
feedback, ... always appreciated. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Hardened stage3 tarballs

2011-06-06 Thread Sven Vermeulen
not propagated so you'll have to "wait" a week (if you desperately need a build that's more recent than a few weeks old). Considering that Gentoo is a rolling upgrade distribution, working from a month-old stage is not an issue. Even several months old isn't an issue. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux policy for nginx, or include in apache?

2011-06-15 Thread Sven Vermeulen
upstream here and start our own path (in my opinion, we can't as long as we do not have a critical developer mass - in numbers, not in kilogram). Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy for nginx, or include in apache?

2011-06-19 Thread Sven Vermeulen
ing it here) and contains the necessary file context definitions specific for lighttpd. Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux policy for nginx, or include in apache?

2011-06-19 Thread Sven Vermeulen
's what we'll go to. I'll make the necessary preparations for it. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Re: SELinux and KDE4.6.3

2011-06-24 Thread Sven Vermeulen
ou mean "SELinux in permissive mode", right? Could you - setenforce 0 - /etc/init.d/dbus stop - setenforce 1 - clear avc.log - /etc/init.d/dbus start And then send in your avc.log file? The excerpt you pasted earlier is too big and spans multiple days, so is probably an amalgamation of different issues (cosmetic or not). Wkr, Sven Vermeulen

[gentoo-hardened] Updates on SELinux (base) policy and packages

2011-07-07 Thread Sven Vermeulen
, do not seem to be happy with the string -> bytes or string -> unicode or ... changes that occur). I might take another stab at this in the future, but for now I've had about it :-( Wkr, Sven Vermeulen

Re: [gentoo-hardened] selinux puppet update for 2.6.8

2011-07-11 Thread Sven Vermeulen
pens then? My overlay contains sec-policy/selinux-puppet-2.20101213-r1 [1] so if you want to test things out, you can subscribe to the overlay or put the necessary files in your own. [1] https://github.com/sjvermeu/gentoo.overlay/tree/7e3e3e56a7eb822ed57cc3f3d6285189a1d9fa27/sec-policy/selinux-puppet Wkr, Sven Vermeulen

[gentoo-hardened] SELinux bughunt

2011-07-21 Thread Sven Vermeulen
ERIFIED #371425 - Mark as VERIFIED #374991 - Mark as FIXED #375475 - Mark as CONFIRMED #375617 - Mark as IN_PROGRESS #373381 - Mark as CONFIRMED Thanks in advance. Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux bughunt

2011-07-21 Thread Sven Vermeulen
on it. Problem is that the definitions are ambiguous. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy r20 in hardened-dev.git, now with MCS/MLS

2011-07-21 Thread Sven Vermeulen
POLICY_TYPES="strict targeted" must be changed to POLICY_TYPES="strict targeted mcs mls" otherwise the base policy could support MCS/MLS but the modules themselves not. Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux bughunt

2011-07-22 Thread Sven Vermeulen
-3.3.6 not being able to be built, which was confirmed fixed by the reporter. It doesn't talk about encryption or luks. I guess you mean bug #361911, which is about cryptsetup. This one is still open. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy r21 in hardened-dev.git

2011-07-24 Thread Sven Vermeulen
"semanage" that fubar'ed /etc/selinux labels). Wkr, Sven Vermeulen

Re: [gentoo-hardened] Troubleshooting FIFO pipes with bad security contexts...

2011-08-06 Thread Sven Vermeulen
g" so it doesn't have to provide a logging method for itself, then the AVC denial is to be expected. If you still want this to succeed, see if you can put a "cat" in between, so instead of procmail ... | postlog use procmail ... | cat | postlog But again, please find out what procmail is doing so we can see that it gets a proper fix ;-) Wkr, Sven Vermeulen

[gentoo-hardened] Updates on SELinux documentation

2011-08-10 Thread Sven Vermeulen
Linux booleans). Wkr, Sven Vermeulen

Re: [gentoo-hardened] SeLinux system_u:system_r:initrc_t inside KDE

2011-08-11 Thread Sven Vermeulen
ugh the xserver module. Is sec-policy/selinux-xserver installed on your system? Wkr, Sven Vermeulen

Re: [gentoo-hardened] SeLinux system_u:system_r:initrc_t inside KDE

2011-08-12 Thread Sven Vermeulen
system_r:xdm_t > Hmm... assuming xdm works through some PAM configuration, can you tell me how /etc/conf.d/xdm (or kdm, gdm, whatever) looks like? If it doesn't source system-auth (which is where we put the pam_selinux.so call in) that might be the reason... Wkr, Sven Vermeulen

[gentoo-hardened] Remove obsolete pmask entries from profiles

2011-08-14 Thread Sven Vermeulen
/hardened/linux/package.mask Okay if those get removed? Report courtesy of http://qa-reports.gentoo.org/output/invalid-mask.txt Wkr, Sven Vermeulen

Re: [gentoo-hardened] SeLinux system_u:system_r:initrc_t inside KDE

2011-08-14 Thread Sven Vermeulen
like logon through terminals)? If not, does it fix the KDM logons? Wkr, Sven Vermeulen

Re: [gentoo-hardened] SeLinux system_u:system_r:initrc_t inside KDE

2011-08-14 Thread Sven Vermeulen
: ~# getseuser swift system_u:system_r:xdm_t seuser: staff_u, level (null) Context 0 staff_u:staff_r:staff_t When I try it with kdm_t, I get an incorrect result as well (in my case, it would use sysadm_t which is definitely not something I would like to happen ;-) Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy r2 in hardened-dev overlay

2011-08-19 Thread Sven Vermeulen
e need to "open" the privileges on initrc_t towards all potential services. Not only does that require lots of work, it also brings in patches in our policy that upstream will never accept (and they're right not to accept it). Hence I'll be working on that the upcoming days. Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux base policy r2 in hardened-dev overlay

2011-08-19 Thread Sven Vermeulen
On Fri, Aug 19, 2011 at 08:51:48PM +, Sven Vermeulen wrote: > Okay, but what is this "in-depth" change that I was talking about. Well, > SELinux policies support labeled init scripts. For instance, > "slapd_initrc_exec_t" which allows the init script to run in an

Re: [gentoo-hardened] SELinux base policy r2 in hardened-dev overlay

2011-08-21 Thread Sven Vermeulen
eed to "open" up initrc_t stays in place (we just don't have a choice here). That initrc_t is a highly privileged domain is obvious from a first look at its .te file. So it looks as if we just need to add the proper optional_policy statements here. BTW, glad to hear you're seeing some free time in the near future ;-) Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux base policy r2 in hardened-dev overlay

2011-08-21 Thread Sven Vermeulen
this then support the reason for this (i.e. role-based support for calling only selected init scripts)? Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux base policy r2 in hardened-dev overlay

2011-08-22 Thread Sven Vermeulen
pdate - I think - the init_script_file interface to support the Gentoo integrated run_init as well. But that's something to test and find out. Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux base policy r2 in hardened-dev overlay

2011-08-22 Thread Sven Vermeulen
On Mon, Aug 22, 2011 at 03:18:16PM +, Sven Vermeulen wrote: > What you are suggesting (label init script) is exactly what I was talking > about: instead of having the init scripts labeled initrc_exec_t, they should > be labeled like slapd_initrc_exec_t, postfix_initrc_exec_t, ... and

Re: [gentoo-hardened] SELinux base policy r2 in hardened-dev overlay

2011-08-22 Thread Sven Vermeulen
status: started Unless you mean to support it without asking for re-authentication. In that case, check out bug #365761. It contains a "fix" for this if you prepend your runscript activities with run_init. However, it seems not to support the use of rc-service though. Wkr, Sven Vermeulen

Re: [gentoo-hardened] SELinux base policy r2 in hardened-dev overlay

2011-08-22 Thread Sven Vermeulen
ou have _role or _run templates to execute applications, or _admin templates to manage daemons). Perhaps it would be better if someone drafts up a nice document on how to create your own roles (and maintain them)? Wkr, Sven Vermeulen

[gentoo-hardened] Update on SELinux development guideline(s)

2011-08-23 Thread Sven Vermeulen
like some of our booleans). Any objections here? Wkr, Sven Vermeulen

Re: [gentoo-hardened] Updated SELinux handbook

2011-10-16 Thread Sven Vermeulen
ructure fixed it. Handbooks are possible indeed, so you can watch the current SELinux handbook at http://dev.gentoo.org/~swift/docs/previews/selinux/selinux-handbook.xml Wkr, Sven Vermeulen

Re: [gentoo-hardened] "/usr/bin/install: cannot stat `id.mo': No such file or directory" when installing policycoreutils

2011-10-19 Thread Sven Vermeulen
but it is still in ~arch. I'll see to it that it gets stabilized. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Updated SELinux handbook

2011-10-19 Thread Sven Vermeulen
ot;. Ah yes, the package was stabilized. I'll update the documents accordingly. > Are there any other packages that need to be unmasked? There shouldn't be, although we're quite near a stabilization of the more recent userspace utilities now (which is needed for the latest policies). Wkr, Sven Vermeulen

Re: [gentoo-hardened] Updated SELinux handbook

2011-10-19 Thread Sven Vermeulen
install done according to > the guide :) If I'm not mistaken, that would be: sys-libs/libselinux sys-apps/policycoreutils sys-libs/libsemanage sys-libs/libsepol app-admin/setools dev-python/sepolgen sys-apps/checkpolicy sec-policy/* Wkr, Sven Vermeulen

Re: [gentoo-hardened] Updated SELinux handbook

2011-10-19 Thread Sven Vermeulen
to unmask files. That's the old one (and still working), but for consistency sake, portage now uses /etc/portage/package.FOOBAR where FOOBAR is the same as the variable in make.conf (so accept_keywords, accept_licenses, ...) Wkr, Sven Vermeulen

Re: [gentoo-hardened] Updated SELinux handbook

2011-10-19 Thread Sven Vermeulen
On Wed, Oct 19, 2011 at 2:54 PM, J. Roeleveld wrote: > To the latest ~amd64? Or to which version? :) Latest is fine (for now ;-) Wkr, Sven Vermeulen

Re: [gentoo-hardened] Newbee alarm....

2011-11-03 Thread Sven Vermeulen
g else. Only when your context is sysadm_t, then you can run "setenforce 1" to switch to enforcing mode. Keep that terminal logged on, work around a bit. If you get stuck, switch back to the terminal, type in "setenforce 0" and you are back in permissive. Wkr, Sven Vermeulen

Re: [gentoo-hardened] On the right track?

2011-11-04 Thread Sven Vermeulen
thub.com/sjvermeu/small.coding/tree/HEAD/selinux-modules/patches Wkr, Sven Vermeulen

Re: [gentoo-hardened] refpolicy and Gentoo ebuilds

2011-11-08 Thread Sven Vermeulen
you think we need an ebuild for a specific policy module, ask and I'll gladly add it to the tree. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Secpolicy collision

2011-11-11 Thread Sven Vermeulen
re) but I'd like to confirm that with the above information. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Secpolicy collision

2011-11-12 Thread Sven Vermeulen
On Sat, Nov 12, 2011 at 11:55:47AM +0100, Rados??aw Smogura wrote: > I unmerged selinux-gnupg-2.20101213-r1 and installed selinux-gpg-2.20110726- > r2. Good, that's confirmed then ;-) I've updated the dependency line in selinux-gpg accordingly. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy rev 6 in hardened-dev

2011-11-12 Thread Sven Vermeulen
yle) I have also cleaned out our previous policies in the main portage tree (those before 2.20110627) which was quite some work (removal itself doesn't take that much time, but verifying that one isn't going to break systems is) but I'm glad that is now done. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux bug reporting guide

2011-11-22 Thread Sven Vermeulen
=proj/hardened-docs.git;a=blob_plain;f=html/selinux-bugreporting.html;hb=HEAD I'll add in a live example the moment I find one that fulfills these ;-) Not saying there aren't any, just that I'm too lazy to find one right now. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Re: Help with su (RESOLVED)

2011-11-27 Thread Sven Vermeulen
enials, I gather that you were still running in staff_r role. You need to transition to sysadm_r role first and then try to perform your administrative tasks. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy rev 7 in hardened-dev

2011-11-27 Thread Sven Vermeulen
vde_conf_t type for the VDE module, etc_t is sufficient - Update links_t domain with upstream feedback - Udev tempnode, when used for fisk devices, should be of type fixed_disk_device_t - Mark wpa_cli as an interactive application Wkr, Sven Vermeulen

Re: [gentoo-hardened] Re: Help with su (RESOLVED)

2011-11-28 Thread Sven Vermeulen
There is no need to put pam_selinux for su in the first place. At least, I don't have it on my systems. The only place where pam_selinux is called is in the system-login definition for PAM (which is sourced by login, slim and sshd PAM definitions). Meh. Sven Vermeulen

Re: [gentoo-hardened] New Server, considering hardened, need pointers to tfm...

2011-12-11 Thread Sven Vermeulen
://dev.gentoo.org/~swift/docs/previews/oval/gentoo-xccdf-guide.html. With the instructions given, you can even have your system validated (as far as possible) automatically. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy rev 8 in hardened-dev

2011-12-11 Thread Sven Vermeulen
-the-box). Wkr, Sven Vermeulen

Re: [gentoo-hardened] New Server, considering hardened, need pointers to tfm...

2011-12-11 Thread Sven Vermeulen
On Sun, Dec 11, 2011 at 02:20:43PM +0200, Alex Efros wrote: > On Sun, Dec 11, 2011 at 10:18:51AM +0000, Sven Vermeulen wrote: > > Also consider hardening your system settings-wise. I would appreciate if you > > take a look at > > http://dev.gentoo.org/~swift/docs/previ

[gentoo-hardened] SELinux base policy rev 9 in hardened-dev

2011-12-27 Thread Sven Vermeulen
he system was running in enforcing. On a side-note, I've moved the SELinux module documentation to the Gentoo Wiki @ http://wiki.gentoo.org/wiki/SELinux and I've also copied quite a few entries from our FAQ into the Knowledge Base (http://wiki.gentoo.org/wiki/Knowledge_Base:Main_P

Re: [gentoo-hardened] hardened-sources & tp_smapi, firefox-9.0 install stucks

2011-12-30 Thread Sven Vermeulen
ng firefox binary (on the system). Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy rev 10 in hardened-dev

2011-12-30 Thread Sven Vermeulen
this was previously nicely shielded off through the PAM helpers). I don't know how to handle this case yet. I can definitely start updating the policies so they work without PAM, but I'd first like to know if there are people using SELinux without PAM... Wkr, Sven Vermeulen

Re: [gentoo-hardened] mount: unknown filesystem type 'selinuxfs'

2012-01-04 Thread Sven Vermeulen
s found in syslog - try > >dmesg | tail or so > > > > mount: unknown filesystem type 'selinuxfs' What is the output of "zgrep SELINUX /proc/config.gz" (or "grep SELINUX /usr/src/linux/.config")? Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy rev 11 in hardened-dev

2012-01-10 Thread Sven Vermeulen
not by forcing unconfined domains or switching to permissive first) working (through dracut for the moment). Hopefully that'll work in the near future :-( Wkr, Sven Vermeulen

Re: [gentoo-hardened] New amd64 install

2012-01-14 Thread Sven Vermeulen
ldn't hurt to start out with a no-multilib and see if it indeed works. Otherwise you'll never know ;-) Wkr, Sven Vermeulen

Re: [gentoo-hardened] Missmatch in digests

2012-01-29 Thread Sven Vermeulen
led on RMD160 verification > * Got: ccc74ad3d44a453a7a325d562d6f72425a883014 > * Expected: 7426b7c6b055da1222ba81bbb7138cec66bc8498 > Is this problem with digest updates or does someone tries do make bed thing? I goofed up, but I hope it is fixed now. Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy rev 12 in hardened-dev

2012-01-29 Thread Sven Vermeulen
Give it your best shot. TIA, Sven Vermeulen

Re: [gentoo-hardened] Switching hardened amd64 to SELinux

2012-02-19 Thread Sven Vermeulen
y well. There's an open bug on it, and I hope I can get us with a working initramfs soon. But for the mean time, either drop the initramfs/initrd system, or boot in permissive mode and switch to enforcing during the boot-up (for instance through an init script in the boot runlevel). Wkr, Sven Vermeulen

Re: [gentoo-hardened] Switching hardened amd64 to SELinux

2012-02-19 Thread Sven Vermeulen
setfiles in the SELinux installation instructions just for that) and enable dontaudits again (semodule -B). Wkr, Sven Vermeulen

Re: [gentoo-hardened] permission problem in /etc

2012-02-19 Thread Sven Vermeulen
boot in permissive mode, relabel the system, and then reboot in enforcing again. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Switching hardened amd64 to SELinux

2012-02-20 Thread Sven Vermeulen
w initrc_t self:capability ~{ sys_admin sys_module }; dontaudit initrc_t self:capability sys_module; # sysctl is triggering this I'll need to check the commit history to see if there was a particular reason why it is explicitly not set. Wkr, Sven Vermeulen

Re: [gentoo-hardened] permission problem in /etc

2012-02-20 Thread Sven Vermeulen
is also possible that the policy is not up to date with recent dovecot development (and then needs policy updates). At first sight, I don't see the dovecot_t domain to be capable of doing much with dovecot_etc_t if it is a directory: allow dovecot_t dovecot_etc_t:file read_file_perms; Wkr, Sven Vermeulen

[gentoo-hardened] SELinux base policy rev 13 in hardened-dev

2012-02-20 Thread Sven Vermeulen
ional) I will now focus on getting 2.20120215 in shape (together with the tools release), stabilize the 2.20110726 ones (around r11 which has now been around for a bit more than 30 days), work further on initramfs and our docs. Wkr, Sven Vermeulen

Re: [gentoo-hardened] Switching hardened amd64 to SELinux

2012-02-22 Thread Sven Vermeulen
rc_t, or we transition when we call sysctl (to sysctl_t or so). Individual initrc_t domains (like sysctl_initrc_t) we don't support (yet). Wkr, Sven Vermeulen

  1   2   3   >