Re: Q: SECMARK controls on forwarded packets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2008-01-09 at 08:30 -0500, Paul Moore wrote:
> On Wednesday 09 January 2008 7:51:44 am Stephen Smalley wrote:
> > On Tue, 2008-01-08 at 23:30 -0500, Paul Moore wrote:
> > > So, in summary, here are the SECMARK permission checks applied to locally
> > > generated or consumed traffic [this is the status quo]:
> > >
> > >  # inbound traffic
> > >  allow socket_t secmark_t:packet recv;
> > >  # outbound traffic
> > >  allow socket_t secmark_t:packet send;
> > >
> > > ... and these are the proposed SECMARK permission checks applied to
> > > forwarded traffic as it enters and exists the forwarding-host/router:
> > >
> > >  # inbound traffic to be forwarded
> > >  allow peer_t secmark_t:packet forward;
> > >  # outbound forwarded traffic
> > >  allow peer_t secmark_t:packet send;
> >
> > The problem with the last one is that it also allows the same thing to
> > happen for locally generated traffic, which might not be what the policy
> > writer wants to allow.
> 
> Fair enough.  I'll try to think of something catchy to replace the send 
> permission in the forwarding outbound case ... if anybody has any great ideas 
> I'd love to hear them.

Well, you could just go with the obvious:
# inbound traffic to be forwarded
allow peer_t secmark_t:packet forward_in;
# outbound forwarded traffic
allow peer_t secmark_t:packet forward_out;

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux