Bug#333834: linux-2.6: Please enabled audit support, selinux is pretty much unuseable otherwise.
tag 333834 +fixed-in-experimental thanks On Fri, Oct 14, 2005 at 01:19:47PM +0800, Stanley Peng wrote: CONFIG_AUDIT=y Thanks. This is actually already on in 2.6.13, and I think that is current in 2.6.13-1 which is in experimental, and so the change will trickle down to sid and etch soon enough. Is there a burning desire to push this into 2.6.12 (sid/etch)? I'd rather not duplicate the change there. -- Horms -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#333834: linux-2.6: Please enabled audit support, selinux is pretty much unuseable otherwise.
Processing commands for [EMAIL PROTECTED]: tag 333834 +fixed-in-experimental Bug#333834: linux-2.6: Please enabled audit support, selinux is pretty much unuseable otherwise. There were no tags set. Tags added: fixed-in-experimental thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#333834: linux-2.6: Please enabled audit support, selinux is pretty much unuseable otherwise.
I wonder which version of linux-2.6 will be the stable one of etch. 2.6.12 or 2.6.13? If it's 2.6.12, I think it is better to push it into 2.6.12 :)On 10/14/05, Horms [EMAIL PROTECTED] wrote: tag 333834 +fixed-in-experimentalthanksOn Fri, Oct 14, 2005 at 01:19:47PM +0800, Stanley Peng wrote: CONFIG_AUDIT=yThanks.This is actually already on in 2.6.13, and I think that is current in 2.6.13-1 which is in experimental, and so the change will trickledown to sid and etch soon enough.Is there a burning desire to push this into 2.6.12 (sid/etch)?I'd rather not duplicate the change there. --Horms--To UNSUBSCRIBE, email to [EMAIL PROTECTED]with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#333834: linux-2.6: Please enabled audit support, selinux is pretty much unuseable otherwise.
On Fri, Oct 14, 2005 at 02:12:38PM +0200, Thiemo Seufer wrote: Erich Schubert wrote: Hi, I'm not entirely sure which kernel config option this refers to, could you dig that up? That not withstanding, your suggestion seems fine to me, though I would appreciate some feedback from others. I've CCed Manoj in case he has some oppinions. CONFIG_AUDIT and CONFIG_AUDIT_SYSCALL. IIRC the latter allows you to disable audit logging from userspace as well as configure where the logs go to (e.g. via netlink to a userspace audit daemon) AFAIR CONFIG_AUDIT_SYSCALL was disabled because of its performance overhead and limited usefulness. The debian-kernel list archive should have some discussion about it. It was already reenabled for 2.6.13 before this request came in. Probably by Dilinger or Walidi, perhaps they can comment on the performance issue. -- Horms -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#333834: linux-2.6: Please enabled audit support, selinux is pretty much unuseable otherwise.
Package: linux-2.6 Severity: normal While you can run SELinux just fine without audit enabled, it's next to impossible to write or debug SELinux policy without it. But SELinux hasn't reached the stage where there is a perfect policy for everything, so users need to have the ability to debug their policy (or write new for applications htere is no policy for yet) Please enable audit in the debian kernels ASAP. The kernels are unuseable for typical SELinux deployment otherwise. Thank you. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#333834: linux-2.6: Please enabled audit support, selinux is pretty much unuseable otherwise.
CONFIG_AUDIT=yOn 10/14/05, Horms [EMAIL PROTECTED] wrote: On Fri, Oct 14, 2005 at 12:37:51AM +0200, Erich Schubert wrote: Package: linux-2.6 Severity: normal While you can run SELinux just fine without audit enabled, it's next to impossible to write or debug SELinux policy without it. But SELinux hasn't reached the stage where there is a perfect policy for everything, so users need to have the ability to debug their policy (or write new for applications htere is no policy for yet) Please enable audit in the debian kernels ASAP. The kernels are unuseable for typical SELinux deployment otherwise.Hi Erich,I'm not entirely sure which kernel config option this refers to, could you dig that up? That not withstanding, your suggestion seems fine tome, though I would appreciate some feedback from others. I've CCedManoj in case he has some oppinions.--Horms--To UNSUBSCRIBE, email to [EMAIL PROTECTED]with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]