Subject: Re: SE Linux vs SE NetBSD !!
To: Travis H. <solinym@gmail.com>
From: Elad Efrat <elad@NetBSD.org>
List: tech-security
Date: 08/29/2006 23:26:32
Travis H. wrote:
> On 8/29/06, Andrew Reilly <andrew-netbsd@areilly.bpc-users.org> wrote:
>> How can someone else write my security policy for me?
>
> Well, I think "security policy" is an overloaded term, so let's talk about
> "SELinux policy".
>
> For example, we know in advance that sendmail will write to mail spool
> files
> in /var/spool/mail. And that it binds to TCP port 25. And to fork off
> certain
> programs. And so on. So we give sendmail permission to just do those
> things, and nothing else. Sendmail does not usually need to spawn xterm.
>
> Now, you may run sendmail on port 8025, in which case you might have to
> modify the policy. I found that it was necessary to load a new policy
> module
> to enable procmail and some utilities that it spawns. But so far
> that's all I've
> had to do.
And why is SELinux required for the above?
> For the most part, the code defines the allowable actions, and one can do a
> static analysis, or run it in permissive mode for a while to document the
> system calls it uses at run-time.
Like in systrace? (see 'systrace -A' too)
-e.
--
Elad Efrat