Today was the first day of Linux Conf Au 2009 . KaiGai Kohei was unable to attend the conference and give a database mini-conf presentation about his work on Security Enhanced PostgreSQL , so I gave the presentation in his place. It was a fairly difficult presentation and required that I learn a lot about […]
I have just had a need to install packages from Debian-Multimedia.org to correctly play .3gp files from my mobile phone (the stock Mplayer in Debian would not play the sound).
As part of getting this to work in a way that I like I rebuilt some packages so that shared objects would not demand an […]
There is currently a discussion on the Debian-security mailing list about how to protect data which came from an encrypted file. I was going to skip that one until someone summoned me by mentioning SE Linux.
The issue which was raised is that data from an encrypted file can be read from /dev/mem (for all […]
One ongoing problem with TCP networking is the combination of RPC services and port based services on the same host. If you have an RPC service that uses a port less than 1024 then typically it will start at 1023 and try lower ports until it finds one that works. A problem that I have […]
In my previous post about DKIM  I forgot to mention one critical item, how to get Postfix to actually talk to the DKIM milter. This wasn’t a bad thing because it turned out that I hadn’t got it right.
I had configured the DKIM milter on the same line as the milters for ClamAV […]
My Play Machine  was offline for most of the past 48 hours (it’s up again now). I have upgraded the hardware for the Dom0 used to run it so that it now has the ability to run more DomU’s. I can now run at least 5 DomUs while previously I could only run 3. […]
I have previously written about the execmod permission check in SE Linux  and in a post about SE Linux on the desktop I linked to some bug reports about it  (which probably won’t be fixed in Debian).
One thing I didn’t mention is the proof of the implication of this. When running a […]
I previously described the goals for SE Linux development in Lenny and assigned numbers to the levels of support . I have just uploaded a new policy to unstable which I hope to get in Lenny that will solve all the major issues for level 1 of support (default configuration with the unconfined_t domain for […]
In a comment on my AppArmor is dead post  someone complained that SE Linux is not “Unixish“.
The security model in Unix is almost exclusively Discretionary Access Control (DAC) . This means that any process that owns a resource can grant access to the resource to other processes without restriction. For example a user […]
A large part of the disagreement about the way to manage the policy seems to be based on who will be the primary “owner” of the policy on the machine. This isn’t a problem that only applies to SE Linux, the same issue applies for various types of configuration files and scripts throughout the process […]