<?xml version="1.0" encoding="utf-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: I love SELinux (part III)</title>
	<atom:link href="http://www.jonmasters.org/blog/2008/06/27/i-love-selinux-part-iii/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.jonmasters.org/blog/2008/06/27/i-love-selinux-part-iii/</link>
	<description>World Organi[sz]ation Of Broken Dreams</description>
	<lastBuildDate>Thu, 01 Dec 2011 20:35:15 +0000</lastBuildDate>
	<generator>http://wordpress.org/?v=2.9</generator>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
		<item>
		<title>By: Valent</title>
		<link>http://www.jonmasters.org/blog/2008/06/27/i-love-selinux-part-iii/comment-page-1/#comment-131288</link>
		<dc:creator>Valent</dc:creator>
		<pubDate>Sun, 29 Jun 2008 21:11:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=687#comment-131288</guid>
		<description>That is why we have people like you and others that see these errors and write great BZ reports so that bugs get fixed ASAP. I also have and still have some issues with SEL and just keep posting the bugs and they get fixed so more average users have &quot;calm sea&quot; while cruising through Fedora waters :)</description>
		<content:encoded><![CDATA[<p>That is why we have people like you and others that see these errors and write great BZ reports so that bugs get fixed ASAP. I also have and still have some issues with SEL and just keep posting the bugs and they get fixed so more average users have &#8220;calm sea&#8221; while cruising through Fedora waters <img src='http://www.jonmasters.org/blog/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Bucky</title>
		<link>http://www.jonmasters.org/blog/2008/06/27/i-love-selinux-part-iii/comment-page-1/#comment-131282</link>
		<dc:creator>Bucky</dc:creator>
		<pubDate>Fri, 27 Jun 2008 20:01:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=687#comment-131282</guid>
		<description>SELinux for me is in the same category as Evolution. When it works, it&#039;s heartbreakingly beautiful.

Because the promise each makes is so wonderful, the failure to live up to that promise in any way becomes a terrible disappointment. It&#039;s easy to lose sight of what actually does work well today.

Steven may be exactly right in his analysis. I *don&#039;t* want to futz with certain things, like my email client, even if I&#039;m happy to play with certain other things, like video.

And like Jon, I *don&#039;t* want to futz with SELinux--at least not for services that are &quot;supposed&quot; to work out-of-the-box.

However, &quot;never&quot; is such a very long time. I hope Steven&#039;s prediction that SELinux will never perform adequately out-of-the-box for certain users just because it doesn&#039;t satisfy them now is inaccurate.

Finally, pursuant to domg472, the distinction between a service that doesn&#039;t work, and an out-of-the-box configuration that doesn&#039;t work (system-config-httpd anybody?) is very appropriate for developers, but not at all appropriate to foist on end-users.</description>
		<content:encoded><![CDATA[<p>SELinux for me is in the same category as Evolution. When it works, it&#8217;s heartbreakingly beautiful.</p>
<p>Because the promise each makes is so wonderful, the failure to live up to that promise in any way becomes a terrible disappointment. It&#8217;s easy to lose sight of what actually does work well today.</p>
<p>Steven may be exactly right in his analysis. I *don&#8217;t* want to futz with certain things, like my email client, even if I&#8217;m happy to play with certain other things, like video.</p>
<p>And like Jon, I *don&#8217;t* want to futz with SELinux&#8211;at least not for services that are &#8220;supposed&#8221; to work out-of-the-box.</p>
<p>However, &#8220;never&#8221; is such a very long time. I hope Steven&#8217;s prediction that SELinux will never perform adequately out-of-the-box for certain users just because it doesn&#8217;t satisfy them now is inaccurate.</p>
<p>Finally, pursuant to domg472, the distinction between a service that doesn&#8217;t work, and an out-of-the-box configuration that doesn&#8217;t work (system-config-httpd anybody?) is very appropriate for developers, but not at all appropriate to foist on end-users.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: sympathy</title>
		<link>http://www.jonmasters.org/blog/2008/06/27/i-love-selinux-part-iii/comment-page-1/#comment-131281</link>
		<dc:creator>sympathy</dc:creator>
		<pubDate>Fri, 27 Jun 2008 19:26:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=687#comment-131281</guid>
		<description>selinux will &quot;helpfully&quot; filter things from you so you can&#039;t see the error when one is generated.  most likely that is what&#039;s happening.  you may have to look into the policy files for vpnc strip out those filters.  sorry, i don&#039;t know how to even begin to do that.

I run selinux disabled.</description>
		<content:encoded><![CDATA[<p>selinux will &#8220;helpfully&#8221; filter things from you so you can&#8217;t see the error when one is generated.  most likely that is what&#8217;s happening.  you may have to look into the policy files for vpnc strip out those filters.  sorry, i don&#8217;t know how to even begin to do that.</p>
<p>I run selinux disabled.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Joe Defence</title>
		<link>http://www.jonmasters.org/blog/2008/06/27/i-love-selinux-part-iii/comment-page-1/#comment-131280</link>
		<dc:creator>Joe Defence</dc:creator>
		<pubDate>Fri, 27 Jun 2008 18:14:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=687#comment-131280</guid>
		<description>&gt; Basically, selinux is not for you, and you are not for Selinux.

No. *This* is a negative viewpoint. You are blaming the user for a bug in SELinux. It&#039;s not the user&#039;s fault. And SELinux will never get better until the developers acknowledge that.

Why can&#039;t SELinux deliver it&#039;s bad news via the usual orifice? An error occurs, errno is set and the app calls perror() or whatever. The message is &quot;SELInux says you can only run virt images from /var/virt ...&quot; and it pops out on stderr or in a dialog box ir in the apps own log file -- the normal places you would look to find all errors.

How are folks supposed to cope when SELinux fails silently, as in this case? It&#039;s bad enough you have to grovel about in some completely different set of log files, just in case, you know, whatever error you happen to be having might be another SELinux oddity.

The promise of SELinux is great. No one is criticizing that. But I could make my computer secure by pulling the plug. Do you see that there are other forces at work here other than &#039;be secure&#039;?  Be secure and not working half the time is not an acceptable compromise.</description>
		<content:encoded><![CDATA[<p>&gt; Basically, selinux is not for you, and you are not for Selinux.</p>
<p>No. *This* is a negative viewpoint. You are blaming the user for a bug in SELinux. It&#8217;s not the user&#8217;s fault. And SELinux will never get better until the developers acknowledge that.</p>
<p>Why can&#8217;t SELinux deliver it&#8217;s bad news via the usual orifice? An error occurs, errno is set and the app calls perror() or whatever. The message is &#8220;SELInux says you can only run virt images from /var/virt &#8230;&#8221; and it pops out on stderr or in a dialog box ir in the apps own log file &#8212; the normal places you would look to find all errors.</p>
<p>How are folks supposed to cope when SELinux fails silently, as in this case? It&#8217;s bad enough you have to grovel about in some completely different set of log files, just in case, you know, whatever error you happen to be having might be another SELinux oddity.</p>
<p>The promise of SELinux is great. No one is criticizing that. But I could make my computer secure by pulling the plug. Do you see that there are other forces at work here other than &#8216;be secure&#8217;?  Be secure and not working half the time is not an acceptable compromise.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Karsten Wade</title>
		<link>http://www.jonmasters.org/blog/2008/06/27/i-love-selinux-part-iii/comment-page-1/#comment-131279</link>
		<dc:creator>Karsten Wade</dc:creator>
		<pubDate>Fri, 27 Jun 2008 17:05:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.jonmasters.org/blog/?p=687#comment-131279</guid>
		<description>Jon makes a good point about the complexity of what a computer user is going to do.  I think this is why setroubleshoot and other tools were written.  There seems to be agreement from e.g. Dan Walsh that there can be a mechanism for a user to say, &quot;Yes, I did mean to do that, allow it now and everafter.&quot;

We have mechanisms like this in many interactions.  Until you disable the notice, a new Firefox install tells you each time you join or leave an HTTPS page.  That notice has been around since HTTPS was first used, and it has always &quot;confused users.&quot;  How many people do you think check the box as part of the, &quot;I don&#039;t understand this, go away&quot; school of ignoring?

The users are the main group who are going to do the complex things that need to be constrained or allowed by SELinux policy.  It has always been a problem, one which Jon is encountering, that SELinux quickly moves a user into the arena of security policy maintainer.  Even a simple firewall policy such as that exposed by system-config-securitylevel is daunting for many people.  No matter how we expose SELinux (if we choose to!), it is going to be daunting.

So, what options are there besides continuing this way or turning it off forever?  One thing is for some user interface experts to come apply their trade to the problem of users managing security policy.  SELinux is one, so are firewall rules, various Firefox settings, settings in mail client, settings in IM client, ad nauseum.

I think Dan has been moving in the right direction, basically all by himself AFAICT:

* Create more types of groups that a user can be self-slotted in to; then a &quot;full features&quot; user can have a better SELinux interaction through a less constrained environment, while an &quot;online desktop&quot; user can be in a near-kiosk environment. (xguest)

* Better end-to-end tooling to allow a user to permit policy changes and report back on the reason why to SELinux developers.  Perhaps come up with a way for per-user policies to be implemented, so different users on the same machine don&#039;t have to run the same policy in all places.

Jon&#039;s example of virt-manager not having the permissions to boot an ISO is just the kind of complexity that is beyond a team of SELinux developers dreaming up all variations.  Having him file a bug report and wait even a day for a policy update is a bit ridiculous.  It could be a user settable boolean, but then ... it would have to be imagined first.

How about a process like this:

1. Tool hits an SELinux denial

2. setroubleshoot pops up a nice, tight GUI that clearly hides all the extra information in favor of a short descriptive sentence and a call to action.

3. Actions include allowing the action once, allowing the action always for the user, and denying the action.

4. If the action is allowed even one time, the setroubleshoot details are made ready to deliver to SELinux developers for review.  The user is given a chance to put in an email address to receive back questions and feedback.  NOTE:  no email address to interact may mean the problem does not get addressed, sorry.

At the very least, this would give someone like Jon a way to get his stuff done with SELinux running, and not be tempted to blog to the entire world about it! ;-D</description>
		<content:encoded><![CDATA[<p>Jon makes a good point about the complexity of what a computer user is going to do.  I think this is why setroubleshoot and other tools were written.  There seems to be agreement from e.g. Dan Walsh that there can be a mechanism for a user to say, &#8220;Yes, I did mean to do that, allow it now and everafter.&#8221;</p>
<p>We have mechanisms like this in many interactions.  Until you disable the notice, a new Firefox install tells you each time you join or leave an HTTPS page.  That notice has been around since HTTPS was first used, and it has always &#8220;confused users.&#8221;  How many people do you think check the box as part of the, &#8220;I don&#8217;t understand this, go away&#8221; school of ignoring?</p>
<p>The users are the main group who are going to do the complex things that need to be constrained or allowed by SELinux policy.  It has always been a problem, one which Jon is encountering, that SELinux quickly moves a user into the arena of security policy maintainer.  Even a simple firewall policy such as that exposed by system-config-securitylevel is daunting for many people.  No matter how we expose SELinux (if we choose to!), it is going to be daunting.</p>
<p>So, what options are there besides continuing this way or turning it off forever?  One thing is for some user interface experts to come apply their trade to the problem of users managing security policy.  SELinux is one, so are firewall rules, various Firefox settings, settings in mail client, settings in IM client, ad nauseum.</p>
<p>I think Dan has been moving in the right direction, basically all by himself AFAICT:</p>
<p>* Create more types of groups that a user can be self-slotted in to; then a &#8220;full features&#8221; user can have a better SELinux interaction through a less constrained environment, while an &#8220;online desktop&#8221; user can be in a near-kiosk environment. (xguest)</p>
<p>* Better end-to-end tooling to allow a user to permit policy changes and report back on the reason why to SELinux developers.  Perhaps come up with a way for per-user policies to be implemented, so different users on the same machine don&#8217;t have to run the same policy in all places.</p>
<p>Jon&#8217;s example of virt-manager not having the permissions to boot an ISO is just the kind of complexity that is beyond a team of SELinux developers dreaming up all variations.  Having him file a bug report and wait even a day for a policy update is a bit ridiculous.  It could be a user settable boolean, but then &#8230; it would have to be imagined first.</p>
<p>How about a process like this:</p>
<p>1. Tool hits an SELinux denial</p>
<p>2. setroubleshoot pops up a nice, tight GUI that clearly hides all the extra information in favor of a short descriptive sentence and a call to action.</p>
<p>3. Actions include allowing the action once, allowing the action always for the user, and denying the action.</p>
<p>4. If the action is allowed even one time, the setroubleshoot details are made ready to deliver to SELinux developers for review.  The user is given a chance to put in an email address to receive back questions and feedback.  NOTE:  no email address to interact may mean the problem does not get addressed, sorry.</p>
<p>At the very least, this would give someone like Jon a way to get his stuff done with SELinux running, and not be tempted to blog to the entire world about it! ;-D</p>
]]></content:encoded>
	</item>
</channel>
</rss>
