On 04/19/2013 10:16 AM, Kotikela, Srujan wrote:
Hi William,

Thanks for the reply. I understand that the middleware IPC don't need selinux 
enabled kernel. I was just trying to check if middleware IPC will be subjected 
to policy verification at kernel level on a selinux enabled kernel. In other 
words, will all forms of IPC be verified against seandroid policies in the 
kernel? If not, will there be any security implications? Any pointers to 
related work/literature would be appreciated.

It is already the case that all IPC has to ultimately go through the kernel and is mediated by SELinux in terms of senders and receivers and the passing of kernel-managed objects (e.g. binder references, open files), as I mentioned.

However, the kernel only sees the direct IPCs and thus may not be aware of how e.g. one IPC from app A to the system_server is related to a subsequent IPC from the system_server to app B. The kernel also does not understand anything about the semantics of the IPC payload.

The middleware MAC's job is to control these relationships and apply controls over the higher level abstractions and operations implemented via the IPC. The middleware MAC does not query the kernel layer MAC for its decisions.








--
This message was distributed to subscribers of the seandroid-list mailing list.
If you no longer wish to subscribe, send mail to [email protected] with
the words "unsubscribe seandroid-list" without quotes as the message.

Reply via email to