Re: decipher the secmark number from nf_conntrack/ip_conntrack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Monday 2010-09-20 01:04, Mr Dash Four wrote:

> When I list my connections with 'cat /proc/net/nf_conntrack' I get the SELinux
> context secmark as a number, like secmark=XXX.
>
> Is there a way I could map that number to the name of the actual context when I
> set it up originally with the --selctx option in iptables? If that is not
> possible do you plan to include such feature in the upcoming versions of
> netfilter?

Apart from SMACK, I don't think the kernel has knowledge about any names 
of sorts, especially since SELinux labels seem to be able to 
be longer than 8 chars.

So if anything, it would be done so in conntrack-tools which you should 
be using over /proc anyway.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux