■ National Information Assurance Research Laboratory ■
1
What's New with SELinux Stephen D. Smalley sds@tycho.nsa.gov - - PowerPoint PPT Presentation
What's New with SELinux Stephen D. Smalley sds@tycho.nsa.gov National Information Assurance Research Laboratory National Security Agency National Information Assurance Research Laboratory 1 Advances in SELinux Deploying new
■ National Information Assurance Research Laboratory ■
1
■ National Information Assurance Research Laboratory ■
2
■ National Information Assurance Research Laboratory ■
3
– Reference policy – Loadable modules – Policy management infrastructure
■ National Information Assurance Research Laboratory ■
4
■ National Information Assurance Research Laboratory ■
5
■ National Information Assurance Research Laboratory ■
6
– Initial support for direct manipulation of local policy store. – Work in progress for remote policy.
– semodule, semanage, setsebool
■ National Information Assurance Research Laboratory ■
7
– Fedora Core 5 and 6 – Red Hat Enterprise Linux 5 – Hardened Gentoo – Debian etch
■ National Information Assurance Research Laboratory ■
8
– Enhanced audit and MLS support. – RHEL 4 - Validated for CAPP EAL4+ – RHEL 5 - In evaluation for CAPP, LSPP, RBACPP EAL4+
– Providing a mechanism for data separation. – NetTop, NetTop 2 – Certifiable Linux Integration Platform (CLIP) – Cross Domain Solutions (CDS)
■ National Information Assurance Research Laboratory ■
9
■ National Information Assurance Research Laboratory ■
10
– Runtime option. – Constraint-based configuration. – Engine and labeling enabled by default.
– Multi-level directories via Linux namespaces. – Labeled networking (labeled IPSEC, NetLabel). – Application integration.
■ National Information Assurance Research Laboratory ■
11
– Labeled IPSEC (improved) – NetLabel (new)
– SECMARK (new)
■ National Information Assurance Research Laboratory ■
12
– Granular security associations based on socket context. – Support for obtaining peer security context. – Flow and sock labeling. – MLS labeling of child sockets.
■ National Information Assurance Research Laboratory ■
13
– Supports use of CIPSO with IPv4 for MLS labels. – Planned extensions for IPv6, full contexts.
■ National Information Assurance Research Laboratory ■
14
– Use iptables to select and label packets. – Use SELinux to enforce policy based on those labels.
■ National Information Assurance Research Laboratory ■
15
– General framework for access control in X server. – Similar to LSM framework for the Linux kernel. – Merged into Xorg server 1.2
– Flask policy engine for flexible MAC. – Planned to be merged into Xorg server 1.4
■ National Information Assurance Research Laboratory ■
16
– Setroubleshoot (new)
– Polgen (updated)
– Razor (new)
– Madison / SEPolgen (new)
■ National Information Assurance Research Laboratory ■
17
– SLIDE (new)
– CDS Framework (new)
and goals
– SETools (updated)
■ National Information Assurance Research Laboratory ■
18
– semodule, semanage, setsebool (updated)
– system-config-selinux (new)
– Brickwall (new)
■ National Information Assurance Research Laboratory ■
19
– Xen Security Modules (XSM) and Flask
– GConf, PostgresQL – RADaC
– SEBSD and SEDarwin
– Embedded
■ National Information Assurance Research Laboratory ■
20
– Labeled windows, trusted input and display – Desktop applications
– Fine-grained access control over policy – Distributed policy management – Managing the platform policy – Improved front-end tools
■ National Information Assurance Research Laboratory ■
21
– SELinux awareness – Leveraging SELinux – Application level access control
■ National Information Assurance Research Laboratory ■
22
■ National Information Assurance Research Laboratory ■
23
■ National Information Assurance Research Laboratory ■
24
■ National Information Assurance Research Laboratory ■
25