<?xml version="1.0" encoding="utf-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: I love SELinux</title>
	<atom:link href="http://www.jonmasters.org/blog/2008/06/24/i-love-selinux/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.jonmasters.org/blog/2008/06/24/i-love-selinux/</link>
	<description>World Organi[sz]ation Of Broken Dreams</description>
	<lastBuildDate>Thu, 01 Dec 2011 20:35:15 +0000</lastBuildDate>
	<generator>http://wordpress.org/?v=2.9</generator>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
		<item>
		<title>By: Stephen Smoogen</title>
		<link>http://www.jonmasters.org/blog/2008/06/24/i-love-selinux/comment-page-1/#comment-131254</link>
		<dc:creator>Stephen Smoogen</dc:creator>
		<pubDate>Tue, 24 Jun 2008 17:38:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=684#comment-131254</guid>
		<description>I would argue the commands &#039;chmod/chown&#039; aren&#039;t that well known for people outside of Linux. Instructing new and old users on how to do that have always been a high number of support questions on IRC and various lists. It was quite common 10 years ago (and sadly I ran into this last year) to find some academic server where the owner had done a 

chmod -r 7777 ./*

or find that every account in /etc/passwd had UID 0, because people didn&#039;t want to fuss with permissions... in fact your original story covers a meme from Usenet back in the late 1980&#039;s early 1990&#039;s about why DOS was better than Unix or VMS.  

The big issue is that commands and usage have changed, and it makes us grayhairs feel like we have to relearn everything which can make us grumpy... but in the end we just have to get over it.</description>
		<content:encoded><![CDATA[<p>I would argue the commands &#8216;chmod/chown&#8217; aren&#8217;t that well known for people outside of Linux. Instructing new and old users on how to do that have always been a high number of support questions on IRC and various lists. It was quite common 10 years ago (and sadly I ran into this last year) to find some academic server where the owner had done a </p>
<p>chmod -r 7777 ./*</p>
<p>or find that every account in /etc/passwd had UID 0, because people didn&#8217;t want to fuss with permissions&#8230; in fact your original story covers a meme from Usenet back in the late 1980&#8217;s early 1990&#8217;s about why DOS was better than Unix or VMS.  </p>
<p>The big issue is that commands and usage have changed, and it makes us grayhairs feel like we have to relearn everything which can make us grumpy&#8230; but in the end we just have to get over it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: jcm</title>
		<link>http://www.jonmasters.org/blog/2008/06/24/i-love-selinux/comment-page-1/#comment-131253</link>
		<dc:creator>jcm</dc:creator>
		<pubDate>Tue, 24 Jun 2008 17:00:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=684#comment-131253</guid>
		<description>When you need to modify applications like virt-manager to handle simple cases like having files in a different location, you lose. This is an example of overly complex policy getting in the way.

As to Jeremy&#039;s comments, this is not like chmod or chown, because those are well understood, well documented commands using a couple of standard users and modes. It&#039;s pretty easy to deal with users like &quot;root&quot; and &quot;jcm&quot; on my laptop, but I had to manually trawl through many hundreds of possible SE Linux contexts before I discovered which one I should be using. Even after that, I picked the wrong one, had to create a dummy VM and poke at the image to find what context labeling I should have used, before I could just go and do what I had been trying to do an hour earlier. In other words, I lost an hour figuring out just how to create one VM image...this is not ease of use.

Note, I&#039;m not saying &quot;SELinux is pointless&quot;, I&#039;m saying we&#039;re going nuts with policy here. We should be protecting the 80% win case, rather than going for the 20% pain. Let&#039;s protect our servers from compromises in apache, etc. rather than protecting users from themselves. Having said that, I&#039;m not insensitive to the desire to protect ourselves from VM compromise...but the line has to be drawn somewhere.</description>
		<content:encoded><![CDATA[<p>When you need to modify applications like virt-manager to handle simple cases like having files in a different location, you lose. This is an example of overly complex policy getting in the way.</p>
<p>As to Jeremy&#8217;s comments, this is not like chmod or chown, because those are well understood, well documented commands using a couple of standard users and modes. It&#8217;s pretty easy to deal with users like &#8220;root&#8221; and &#8220;jcm&#8221; on my laptop, but I had to manually trawl through many hundreds of possible SE Linux contexts before I discovered which one I should be using. Even after that, I picked the wrong one, had to create a dummy VM and poke at the image to find what context labeling I should have used, before I could just go and do what I had been trying to do an hour earlier. In other words, I lost an hour figuring out just how to create one VM image&#8230;this is not ease of use.</p>
<p>Note, I&#8217;m not saying &#8220;SELinux is pointless&#8221;, I&#8217;m saying we&#8217;re going nuts with policy here. We should be protecting the 80% win case, rather than going for the 20% pain. Let&#8217;s protect our servers from compromises in apache, etc. rather than protecting users from themselves. Having said that, I&#8217;m not insensitive to the desire to protect ourselves from VM compromise&#8230;but the line has to be drawn somewhere.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: James Morris</title>
		<link>http://www.jonmasters.org/blog/2008/06/24/i-love-selinux/comment-page-1/#comment-131252</link>
		<dc:creator>James Morris</dc:creator>
		<pubDate>Tue, 24 Jun 2008 13:06:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=684#comment-131252</guid>
		<description>I&#039;ve created two bugzillas related to this issue.

https://bugzilla.redhat.com/show_bug.cgi?id=452671
https://bugzilla.redhat.com/show_bug.cgi?id=452669

If you wish to participate in discussion relating to SELinux and Fedora, I suggest posting to the fedora-selinux mailing list:

http://www.redhat.com/mailman/listinfo/fedora-selinux-list

Thanks.</description>
		<content:encoded><![CDATA[<p>I&#8217;ve created two bugzillas related to this issue.</p>
<p><a href="https://bugzilla.redhat.com/show_bug.cgi?id=452671" rel="nofollow">https://bugzilla.redhat.com/show_bug.cgi?id=452671</a><br />
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=452669" rel="nofollow">https://bugzilla.redhat.com/show_bug.cgi?id=452669</a></p>
<p>If you wish to participate in discussion relating to SELinux and Fedora, I suggest posting to the fedora-selinux mailing list:</p>
<p><a href="http://www.redhat.com/mailman/listinfo/fedora-selinux-list" rel="nofollow">http://www.redhat.com/mailman/listinfo/fedora-selinux-list</a></p>
<p>Thanks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jeremy Katz</title>
		<link>http://www.jonmasters.org/blog/2008/06/24/i-love-selinux/comment-page-1/#comment-131251</link>
		<dc:creator>Jeremy Katz</dc:creator>
		<pubDate>Tue, 24 Jun 2008 13:05:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=684#comment-131251</guid>
		<description>Yes, let&#039;s not require people to set permissions or ownerships on files either.  They just get in the way of unsuspecting users who want to share things with other users on their system.

Think of &#039;chcon virtcon_t&#039; as exactly the same sort of operation as &#039;chmod foo&#039; and allowing an _application_ as opposed to a user the access to the file.  And it is very important to be confining some of these user sorts of applications -- or would you like for a compromise in kvm to allow your guest to access any file (or device) on your system?</description>
		<content:encoded><![CDATA[<p>Yes, let&#8217;s not require people to set permissions or ownerships on files either.  They just get in the way of unsuspecting users who want to share things with other users on their system.</p>
<p>Think of &#8216;chcon virtcon_t&#8217; as exactly the same sort of operation as &#8216;chmod foo&#8217; and allowing an _application_ as opposed to a user the access to the file.  And it is very important to be confining some of these user sorts of applications &#8212; or would you like for a compromise in kvm to allow your guest to access any file (or device) on your system?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dan Walsh</title>
		<link>http://www.jonmasters.org/blog/2008/06/24/i-love-selinux/comment-page-1/#comment-131250</link>
		<dc:creator>Dan Walsh</dc:creator>
		<pubDate>Tue, 24 Jun 2008 10:46:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=684#comment-131250</guid>
		<description>Jon, 

To some point I agree with you, but on others I don&#039;t.  Perhaps SELinux is too complex to understand, but the example you use is exactly the same example I could use about Descretionary Access Control being too complex.  I set up my apache server and installed to html files, apache blue up with permission denied I had to 

sudo chown apache /var/www/myfile
sudo chmod  r /var/www/myfile

It would be nice if virtmanager had labeled the files correctly when they were created but it did not, probably a bug.  SELinux can be a pain in the but, but we are now seeing it block vulnerabilities like the latest Flash Plugin and executable Memory/buffer overflow attacks.  These are both user space vulnerabilities.  

Whether we can ever cover the breath of complexity of Linux with a comprehensive policy is still up for question.  But if we could just get the people to realize it is just about the labels.</description>
		<content:encoded><![CDATA[<p>Jon, </p>
<p>To some point I agree with you, but on others I don&#8217;t.  Perhaps SELinux is too complex to understand, but the example you use is exactly the same example I could use about Descretionary Access Control being too complex.  I set up my apache server and installed to html files, apache blue up with permission denied I had to </p>
<p>sudo chown apache /var/www/myfile<br />
sudo chmod  r /var/www/myfile</p>
<p>It would be nice if virtmanager had labeled the files correctly when they were created but it did not, probably a bug.  SELinux can be a pain in the but, but we are now seeing it block vulnerabilities like the latest Flash Plugin and executable Memory/buffer overflow attacks.  These are both user space vulnerabilities.  </p>
<p>Whether we can ever cover the breath of complexity of Linux with a comprehensive policy is still up for question.  But if we could just get the people to realize it is just about the labels.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
