labeling traffic over lo

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

I am trying to have some applications communicate over loopback under a f12 mls policy using some sort of labeled networking, the reason being that otherwise I hit a selinux avc about an unlabeled_t ingress:

avc: denied { ingress } for saddr=127.0.0.1 daddr=127.0.0.1 netif=lo scontext=system_u:object_r:unlabeled_t:s15:c0.c1023 tcontext=...:lo_netif_t:s0-s15:c0.c1023 tclass=netif

Thus far I have tried secmark, but there appear to be issues. I have incoming and outgoing labeled ipsec from this box working, until I add a secmark rule like:

iptables -t mangle -A INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 -i lo --dport $secondary_app_port -j SECMARK --selctx system_u:system_r:httpd_t:s0-s1:c0,c3

And then labeled ipsec falls over and I get avcs similar to:

avc: denied { recv } for saddr=$remote daddr=$local netif=eth0 scontext=...:application_t tcontext=...:unlabeled_t tclass=packet

It seems as if having any secmark labels causes selinux to "forget" about the labels retrieved from labeled ipsec? When I delete the secmark rule, I return to getting ingress avcs...

Any ideas?

Thanks,

Josh

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux