Re: Q: SECMARK controls on forwarded packets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wednesday 09 January 2008 7:51:44 am Stephen Smalley wrote:
> On Tue, 2008-01-08 at 23:30 -0500, Paul Moore wrote:
> > So, in summary, here are the SECMARK permission checks applied to locally
> > generated or consumed traffic [this is the status quo]:
> >
> >  # inbound traffic
> >  allow socket_t secmark_t:packet recv;
> >  # outbound traffic
> >  allow socket_t secmark_t:packet send;
> >
> > ... and these are the proposed SECMARK permission checks applied to
> > forwarded traffic as it enters and exists the forwarding-host/router:
> >
> >  # inbound traffic to be forwarded
> >  allow peer_t secmark_t:packet forward;
> >  # outbound forwarded traffic
> >  allow peer_t secmark_t:packet send;
>
> The problem with the last one is that it also allows the same thing to
> happen for locally generated traffic, which might not be what the policy
> writer wants to allow.

Fair enough.  I'll try to think of something catchy to replace the send 
permission in the forwarding outbound case ... if anybody has any great ideas 
I'd love to hear them.

-- 
paul moore
linux security @ hp

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux