>I understand why there is no labeling after doing "setkey -FP". That was >expected. > >My question is why does the labeling work in enforcing mode, even though >my policy does not provide the following rules: >allow brindle_client_t ipsec_spd_t:association polmatch; >allow brindle_client_t brindle_server_t:association recvfrom; > >With labeled IPSec over the loopback, I did not have to provide any >rules in my brindle_client module or my brindle_server module with >respect to the association object class. Without the association rules, >the policy doesn't have any way of enforcing MLS constraints, or TE on >the client server connections, which is the reason that I set up labeled >IPSec over loopback in the first place. If I recall correctly, these rules are in Redhat's policy. The interface ipsec_labeled(domain) allows types with domain attribute to polmatch to ipsec_spd_t and to also have recvfrom and sendto permissions. When you did domain_type(brindle_server_t) and domain_type(brindle_clent_t) they acquired the domain attribute. As long as you use ipsec_spd_t as default ipsec policy type, things should work without having to add new policy for labeled ipsec. However, if you create or use a new ipsec policy type other than ipsec_spd_t, you will need new rules to get labeled ipsec working. What I am not sure I understand is why you want to add mls constraints to these rules. I think mls constraints already exist for "association". Unless you want to add them for your client and server... regards, Joy -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.