[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4505508A.1060105@gentoo.org>
Date: Mon, 11 Sep 2006 08:03:22 -0400
From: Joshua Brindle <method@...too.org>
To: James Morris <jmorris@...ei.org>
CC: David Madore <david.madore@....fr>,
Alan Cox <alan@...rguk.ukuu.org.uk>,
Linux Kernel mailing-list <linux-kernel@...r.kernel.org>,
LSM mailing-list <linux-security-module@...r.kernel.org>
Subject: Re: [PATCH 3/4] security: capabilities patch (version 0.4.4), part
3/4: introduce new capabilities
James Morris wrote:
> On Sun, 10 Sep 2006, David Madore wrote:
>
>
>> Can a non-root user create limited-rights processes without assistance
>> from the sysadmin, under SElinux?
>>
>
> SELinux uses a restrictive model, where privileges can only be removed,
> not added.
>
>
I think he was asking if a non-admin user can create processes of less
privilege without becoming root. The answer is yes, however, it is
policy driven. Users will have numerous 'derived' types that are less
privilege than, for example, their interactive shell. For example,
user_irc_t or user_evolution_t. The transitions will happen when the
user runs irc or evolution and those apps will be limited to the rights
they require. These are fine grained though, and mandatory. These
capabilities are so course grained I just can't see anyone ever using them.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists