split untrusted_app SELinux domain to make app_data_file execute optional #530

Closed
thestinger opened this Issue Dec 15, 2016 · 2 comments

Comments

Projects
None yet
1 participant
@thestinger
Contributor

thestinger commented Dec 15, 2016

It should be possible to entirely remove this for all apps included in the base system. It will need to start out as opt-in for third party apps but it could become opt-out at a new API level if this feature was landed upstream. It needs to be implemented before considering that.

@thestinger

This comment has been minimized.

Show comment Hide comment
@thestinger

thestinger Dec 19, 2016

Contributor
Contributor

thestinger commented Dec 19, 2016

@thestinger

This comment has been minimized.

Show comment Hide comment
@thestinger

thestinger Dec 19, 2016

Contributor

This has been implemented for the base system by splitting the domain untrusted_base_app and untrusted_app. It would still be nice to allow third party apps to opt-in to similar hardening but it's very unlikely that it would see much adoption without upstream doing this, so this can be closed for now.

Contributor

thestinger commented Dec 19, 2016

This has been implemented for the base system by splitting the domain untrusted_base_app and untrusted_app. It would still be nice to allow third party apps to opt-in to similar hardening but it's very unlikely that it would see much adoption without upstream doing this, so this can be closed for now.

@thestinger thestinger closed this Dec 19, 2016

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment