On Tuesday, February 7, 2017 10:56:39 PM EST Paul Moore wrote: > On Tue, Feb 7, 2017 at 3:52 PM, Richard Guy Briggs <rgb@xxxxxxxxxx> wrote: > > So while I'm not advocating this is what should be done and I'm trying > > to establish bounds to the scope of this feature, but would it be > > reasonable to simply not log packets that were transiting this machine > > without a local endpoint? > > I'm still waiting on more detailed requirements information from > Steve, but based on what we've heard so far, it seems that ignoring > forwarded traffic is a reasonable thing to do. OK, I have done teh analysis to see where things stand on this. A long time ago, there was no security requirements around virtualization except OSPP v2.0 from BSI which had a virtualization extended module. In it, it had the following requirements: FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: [assignment: for each operation, the security attribute-based relationship that must hold between subject and information security attributes, which must allow to define the security attribute-based relationship between two subjects such that information flow between the compartments is not permitted]. FDP_IFF.1.3 The TSF shall enforce the [assignment: additional information flow control SFP rules]. FDP_IFF.1.4 The TSF shall explicitly authorise an information flow based on the following rules: [assignment: rules, based on security attributes, that explicitly authorise information flows]. FDP_IFF.1.5 The TSF shall explicitly deny an information flow based on the following rules: [assignment: rules, based on security attributes, that explicitly deny information flows]. So, whenever there was an allow or deny, then that needed to be auditable. The audit target was added and it can be configured to closely mirrored the rules. When auditing sufficient information needs to be recorded to make sense of why the flow was allowed or denied. Ultimately you really want this connected to a process and user if applicable. However, in reviewing server virtualization protection profile v1.1 and operating system protection profile v4.1, there is no FDP_IFF.1 requirement which means that there are no more requirements to audit network packets. I did not review the network device protection profile which may or may not levy requirements for network auditing. At this point, I would say there is no purpose for xt_AUDIT.c based on Common Criteria. It looks like its built in response to the CONFIG_NETFILTER_XT_TARGET_AUDIT config option. So, it can be cleanly deprecated. -Steve -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html