Re: Network flow controls and subj/obj ordering

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2007-12-12 at 15:18 -0500, Paul Moore wrote:
> On Tuesday 11 December 2007 3:23:22 pm Christopher J. PeBenito wrote:
> > On Tue, 2007-12-11 at 12:02 -0500, Paul Moore wrote:
> > > After a discussion with Venkat last week we decided that it was
> > > probably best if I took responsibility for the flow control patches
> > > and ported/cleaned them up for inclusion in the labeled networking
> > > patches for 2.6.25.  In the course of doing so I ran across the
> > > problem of subject/object "ordering" (probably not the best term,
> > > but it's all I can think of right now).  In both the "flow in" and
> > > "flow out" cases I'm tempted to use the packet's peer label as the
> > > object just for the sake of consistency and the ability to use the
> > > new "peer" object class for all network peer label access checks. 
> > > However, I wanted to make sure that is what everyone had in mind
> > > from a conceptual point of view. See the two simple policy examples
> > > below:
> > >
> > >  * Packet "flows" into the system, peer label is the object
> > >
> > >    allow netif_t peerlbl_t:peer flow_in;
> > >
> > >  * Packet "flows" out of the system, peer label is the object
> > >
> > >    allow netif_t peerlbl_t:peer flow_out;
> >
> > Can you give an example for the forwarding case?  Also, how about in
> > the non-labeled networking case?
> 
> Sorry, I wasn't trying to get into a detailed discussion about the 
> policy involved in all this, but I understand it's probably necessary 
> to get your head around it so I'll give it a shot.  If you haven't yet, 
> go read my reply to Casey first as I'll build upon that here ...

Sure; I find it useful to see the checks in the context of the whole
operation.

> First off, these access checks would only become active if labeled 
> networking was "enabled".  This means that either labeled IPsec or 
> NetLabel has some configuration loaded.  For labeled IPsec this means 
> an entry was created in the SPD or SAD with a SELinux context assigned 
> to it.  For NetLabel this means a CIPSO DOI configuration was loaded 
> into the kernel.  If labeled networking is not "enabled" then these 
> access checks will never happen; this was done to help reduce the 
> impact of the network access controls on the common case.
> 
> Assuming labeled networking is enabled, a forwarded packet would hit 
> four checks:
> 
>  # inbound checks
>  allow netif_t peer_t:peer ingress;
>  allow netnode_t peer_t:peer ingress;
>  # outbound checks
>  allow netif_t peer_t:peer egress;
>  allow netnode_t peer_t:peer egress;

This helps.  But this seems to be for the old networking, how does it
work with the secmark stuff?

-- 
Chris PeBenito
Tresys Technology, LLC
(410) 290-1411 x150


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux