• 1

This may sound silly, but...

This may sound silly, but the underscore-letter ( ..._u, ..._r) convention is one of my biggest hangups with SELinux. It just makings _everything_ SELinux-related look like arcane gobbledygook -- a perception SELinux definitely doesn't need *more of*.

And it's a bad sign when something looks enough that way that it makes an experienced linux admin's eyes glaze over. And it's not just mine -- I've seen this reaction from a lot of people when seeing SELinux messages, and I really do blame the underscores. :)

Does it really add a lot in keeping things straight? The libsetrans translation library is new, right? It looks like on FC5, this just is used for the MLS component, but it could be used everywhere, right?

If dropping the convention completely isn't really reasonable, it would be nice to make it so that anyone not actively writing policy would never have to see messages at that level -- or even have to work with them when changing system configuration. (Just as admins rarely or never need to look at assembly language these days....)

That was helpful - it answered some questions I've had about SELinux and its implementation on RedHat-ish systems.

I think the dummies in your part of the world are pretty bright, though, as I was having trouble keeping up but I think I managed.

I disagree with the first commenter - the _r, _u and _t labels are useful reminders. For dummies, anyway! (Surely nobody wants to have to keep remembering in what order the things are listed).

Oh, I agree that a reminder might be helpful -- but maybe "-Role", "-User", and "-Type"? Or maybe better, make it non-positional, and always just _say_:

Role=object, Type=http_exec, User=system, MLS="PatientRecord,CompanyConfidential".

With good tools, this shouldn't ever actually result in more typing, and would make the whole thing a lot less intimidating.

It shouldn't matter if you type the whole thing in one long horizontal line or put double spacing between each line.

Users still a bit confusing to me

Might be that I'm slow, I don't know.

Hypothetically, say I want to create several other SELinux users that regular Linux users can be assigned to (e.g. create other selinux users like apacheadm_u and add my linux users that are allowed to mess with apache and nothing else to it). How do I do that? I just mean how do I set up the linux->selinux user mapping, I can figure out the rest :).

The current method is I *think* done in userdomain.if, but I'm finding the 'going through all these m4 macros' part of the job rather trying, and can't figure out how to change login to make a logged in user my new selinux user.

Cheers and thanks,
Reid

PS: I run a 'for Dummies' website and was threatened by IDG. I told them to shove off and cited a few court cases proving that I would win. They haven't bothered me since. This site is rather amusing and informative (read their disclaimer), its owners went through a very similar situation.

Re: Users still a bit confusing to me

Nevermind, looks like your entry on May 8th covers it. I wonder what changes those commands make (if any) to policy.conf?

Reid

  • 1
?

Log in