Tal Palant wrote:
what do you mean by intent firewall?

and how can i tell if applications talk using system_server over binder?

Look at external/sepolicy/ifw.xml in your SEAndroid tree.

Practically all applications talk to system_server over binder, almost all framework calls that require another service go through system_server.

On Tue, Oct 21, 2014 at 5:53 PM, Joshua Brindle
<[email protected] <mailto:[email protected]>> wrote:

    William Roberts wrote:


        On Oct 21, 2014 7:37 AM, "Tal Palant" <[email protected]
        <mailto:[email protected]>
        <mailto:[email protected] <mailto:[email protected]>>> wrote:
        >
        >  How can i block specific ipc calls between processes (in theory)?
        >
        >  what kind of policy do i need to define in order to do so?
        >
        >
        >  On Mon, Oct 20, 2014 at 4:10 PM, Stephen Smalley
        <[email protected] <mailto:[email protected]>
        <mailto:[email protected] <mailto:[email protected]>>> wrote:
        > >
        > > On 10/18/2014 05:24 AM, Tal Palant wrote:
        > > > Hello all,
        > > >
        > > > i'm trying to get a better understanding on how SEAndroid can
        effect the
        > > > ipc in Android.
        > > >
        > > > Can SEAndroid prevent applications from sending binder to other
        > > > applications?
        > > >
        > > > Thanks in advance,
        > >
        > > Yes, we added security hooks to the kernel binder driver, and
        therefore
        > > SELinux can mediate binder IPC.  However, in practice, apps
        are expected
        > > to be able to call each other, and much IPC is indirect
        through the
        > > system_server, so the current policy is not enforcing a
        particular goal
        > > in this regard

        You can either use type enforcement by placing the apps in new
        domains
        and not allowing any binder class permissions.

        You can use mls, and enable the mls constraint in the policy
        file mls.
        Look for a commented out constraint that references binder.


    Of course, none of that stops apps from talking through
    system_server over binder. For that you'll need to use the intent
    firewall.




--
טל פולו פלנט
כי שם כזה יש רק אחד

_______________________________________________
Seandroid-list mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to 
[email protected].

Reply via email to