FS#37578 - [linux] 3.13 enable SELinux LSM
Attached to Project:
Arch Linux
Opened by Timothée Ravier (Siosm) - Friday, 01 November 2013, 10:45 GMT
Last edited by Dave Reisner (falconindy) - Thursday, 24 April 2014, 14:07 GMT
Opened by Timothée Ravier (Siosm) - Friday, 01 November 2013, 10:45 GMT
Last edited by Dave Reisner (falconindy) - Thursday, 24 April 2014, 14:07 GMT
|
Details
Description:
Enable SELinux LSM in the default Arch Linux kernel (keep DAC as the default). AppArmor and Tomoyo are already enabled, so why not SELinux? Required userspace tools will stay in AUR for now. Additional configuration options required: CONFIG_SECURITY_SELINUX=y CONFIG_SECURITY_SELINUX_BOOTPARAM=y CONFIG_SECURITY_SELINUX_DISABLE=y CONFIG_SECURITY_SELINUX_DEVELOP=y CONFIG_SECURITY_SELINUX_BOOTPARAM_VALUE=1 CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1 CONFIG_SECURITY_SELINUX_ENABLE_SECMARK_DEFAULT=y CONFIG_SECURITY_SELINUX_AVC_STATS=y CONFIG_SECURITY_SELINUX_POLICYDB_VERSION_MAX=n CONFIG_LSM_MMAP_MIN_ADDR=65536 |
This task depends upon
Closed by Dave Reisner (falconindy)
Thursday, 24 April 2014, 14:07 GMT
Reason for closing: Won't implement
Additional comments about closing: Support intentionally removed
Thursday, 24 April 2014, 14:07 GMT
Reason for closing: Won't implement
Additional comments about closing: Support intentionally removed
Moreover activating SELinux apparently forced the audit subsystem to be enabled, according to https://mailman.archlinux.org/pipermail/arch-general/2014-March/035679.html. I haven't tested myself and haven't found related bug reports about this specific issue, but enabling the audit subsystem by default is broken: it produces unwanted logs and doesn't work with containers (even though I don't know if containers are officially supported because the official config enables CONFIG_UTS_NS but not CONFIG_USER_NS, and there is a good reason related to security not to enable the latter).
I'll write a longer reply about the "LSMs drop" from the default Arch kernel on the mailing list ASAP.