On Wednesday 09 January 2008 7:51:44 am Stephen Smalley wrote: > On Tue, 2008-01-08 at 23:30 -0500, Paul Moore wrote: > > So, in summary, here are the SECMARK permission checks applied to locally > > generated or consumed traffic [this is the status quo]: > > > > # inbound traffic > > allow socket_t secmark_t:packet recv; > > # outbound traffic > > allow socket_t secmark_t:packet send; > > > > ... and these are the proposed SECMARK permission checks applied to > > forwarded traffic as it enters and exists the forwarding-host/router: > > > > # inbound traffic to be forwarded > > allow peer_t secmark_t:packet forward; > > # outbound forwarded traffic > > allow peer_t secmark_t:packet send; > > The problem with the last one is that it also allows the same thing to > happen for locally generated traffic, which might not be what the policy > writer wants to allow. Fair enough. I'll try to think of something catchy to replace the send permission in the forwarding outbound case ... if anybody has any great ideas I'd love to hear them. -- paul moore linux security @ hp -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.