Re: netif labelling

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> I just wanted to note that I have had much more difficulty knowing if I 
> have control over my network devices since the 2.6.30 kernel.  Network 
> control (Internet) is the only reason I use SELinux.
I agree completely! One thing I find really frustrating is 
working/defining ports and assigning different types to these ports.

For example: In the targeted policy there is a line in corenetwork.te.in 
which defines tor ports as 9001, 9090, 9091, 9050 and 9051. All this is 
classified as tor_port_t type. Most applications utilising tor (like 
Privoxy for example) only need to have access to the 9050 (and, may be, 
9051) tor port and not the rest, but as things stand this is impossible 
to achieve as the above group of ports are lumbered together having the 
same type.

This, of course, presents a security loophole for applications to 
exploit. The above example is not unique to tor - I experienced very 
similar scenario when dealing with pop/smtp/imap ports - they are all 
packed together as one type - very inflexible.

So, in order to avoid this I had 2 choices: redefine the targeted policy 
and alter the corenetwork.te.in file appropriately, or, find another way 
of defining these ports and fine tune my custom policy to suit. Since I 
hit the wall with the latter (I posted a thread on here and got zero 
responses!) I was left with no choice, but to redefine the targeted 
policy and, in the above example, split the tor port classification in 4 
groups (as they should be!):

tor_or - port 9001 (used internally by tor)
tor_dir - ports 9090, 9091 (tor directory/bridge connections are done here)
tor_proxy - port 9050 (most applications utilising tor use this port)
tor_ctl - port 9051 (tor control port, used for controlling tor by other 
applications - like Vitalia for example)

> If there is new and improved documentation for the usage of the network controls, I 
> would greatly appreciate knowing about it.
>   
I second that! Searching for sources of good information to resolve the 
above issues proved very frustrating indeed!

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux