Hi,

We released the beta version of SE-PostgreSQL and the first
official documentation at Jul 01 2007.

The purpose of the version is to improve its quality, like bugfix.
The SE-PostgreSQL development team welcomes any feedback from open
source community, like your comments or opinions, bug-reporting,
and so on.

Thanks,

============================================================
SE-PostgreSQL 1.0 Beta version Released
============================================================

SE-PostgreSQL development team released SE-PostgreSQL 1.0 beta
version and "The security guide of Security-Enhanced PostgreSQL
beta edition (Japanese/English)" at Jul 01 2007.

You can get those packages from the following URL:
 http://code.google.com/p/sepgsql/downloads/list

o SE-PostgreSQL 1.0 beta version
 sepostgresql-8.2.4-0.391.beta.fc6.i386.rpm
 sepostgresql-8.2.4-0.391.beta.fc7.i386.rpm
 sepostgresql-8.2.4-0.391.beta.fc7.src.rpm
 sepostgresql-8.2.4-0.391.beta.fc7.patch
o The base security policy for Fedora 7
 selinux-policy-2.6.4-14.sepgsql.fc7.noarch.rpm
 selinux-policy-targeted-2.6.4-14.sepgsql.fc7.noarch.rpm
 selinux-policy-devel-2.6.4-14.sepgsql.fc7.noarch.rpm
o The base security policy for Fedora core 6
 selinux-policy-2.4.6-74.sepgsql.fc6.noarch.rpm
 selinux-policy-targeted-2.4.6-74.sepgsql.fc6.noarch.rpm
 selinux-policy-devel-2.4.6-74.sepgsql.fc6.noarch.rpm
o "The security guide of Security-Enhanced PostgreSQL" beta edition
 sepgsql_security_guide.20070701.jp.beta.pdf (Japanese)
 sepgsql_security_guide.20070701.en.beta.pdf (English)

See the following URL, for details of installation.
o SE-PostgreSQL installation memo (Fedora 7)
 http://code.google.com/p/sepgsql/wiki/install_memo_Fedora7
o SE-PostgreSQL installation memo (Fedora core 6)
 http://code.google.com/p/sepgsql/wiki/install_memo_FC6

The features of SE-PostgreSQL
-----------------------------
Security Enhanced PostgreSQL (SE-PostgreSQL) is a security extension
built in PostgreSQL. It enables to administrate operating system and
database management system under the unified security policy by
cooperation with SELinux.
In addition, it also provides fine-grained access control including
column and row level, and mandatory access control being non-bypassable,
even if privileged database user.

Those features enables to build a database management system into
information flow control scheme integrated with operating system,
and to protect our information asset from threats like manipulation
or leaking.

The purpose of this version
---------------------------
The purpose of this version is evaluation and test for the stable
SE-PostgreSQL 1.0 release. Therefore, we don't recommends to apply
this version except for test/evaluation purpose.
SE-PostgreSQL development team also declares the feature freeze for
the stable SE-PostgreSQL 1.0. It means that we have no plan to add
any feature except for bug fixes until it is released.
We always welcome any feedback from open source community, such as
bug reporting, question for SE-PostgreSQL and documentation.

Roadmap
-------
SE-PostgreSQL development team have a plan to release the stable
SE-PostgreSQL 1.0 after one month's evaluation.
In the future, we continue our activity to merge PGACE/SE-PostgreSQL
features into the upstreamed PostgreSQL.

Changes since SE-PostgreSQL 1.0 alpha
-------------------------------------
The following remarkable changes are applied from SE-PostgreSQL 1.0
alpha released at May 05 2007.

o Applying PGACE framework
 PostgreSQL Access Control Extension (PGACE) is a framework consist
 of many hooks and a mechanism to associate a security attribute with
 database objects, to provide a common infrastructure for multiple
 security extensions built in PostgreSQL.
o backup/restore utility
 '--enable-security' option was added for pg_dump and pg_dumpall commands.
 It enables to backup and restore database with security context.
o Extended SQL statement
 Extensions of CREATE TABLE/FUNCTION/DATABASE and ALTER TABLE/FUNCTION/DATABASE
 statements enables to configure security context of database object without
 modifying system catalog directly.
o Adding new permissions
 {use} permission was added for table, column and tuple object classes.
 It is evaluated in the case when a column is accessed without reading its
 contents such as use on WHERE or GROUP BY clause.
o Improve security policy
 Two new types are defined.
 One is sepgsql_ro_table_t for read-only tables. The other is 
sepgsql_fixed_table_t
 for non-manipulatable tables. A type of 'sepgsql_user_proc_t' is attached for
 user defined SQL function. Administrative domain cannot execute a function 
with this
 type, so we can avoid to execute untrusted functions with unconfined 
authorities.

Fixed many bugs
---------------
 We found and fixed many bugs for four months since alpha release on this March.

Acknowledgment
--------------
 The development of SE-PostgreSQL is supported by Exploratory Software Project,
 IPA(Information-technology Promotion Agency, Japan).

Thanks,
-- 
KaiGai Kohei <[EMAIL PROTECTED]>

---------------------------(end of broadcast)---------------------------
TIP 5: don't forget to increase your free space map settings

Reply via email to