On Tue, 2008-06-24 at 18:10 +0900, KaiGai Kohei wrote: > Kohei KaiGai wrote: > > Christopher J. PeBenito wrote: > >> On Wed, 2008-02-20 at 14:11 +0900, Kohei KaiGai wrote: > >>> Paul Moore wrote: > >>>> On Tuesday 19 February 2008 7:59:22 pm Kohei KaiGai wrote: > >>>>> Is it acceptable one, if we provide an interface to allow a domain > >>>>> to communicate postgresql_t via labeled networking, separated from > >>>>> existing permissions for local ports and nodes? > >>>>> > >>>>> For example: > >>>>> -- at postgresql.if > >>>>> interface(`postgresql_labeled_connect',` > >>>>> gen_require(` > >>>>> type postgresql_t; > >>>>> ') > >>>>> corenet_tcp_recvfrom_labeled($1,postgresql_t) > >>>>> ') > >>>>> > >>>>> and > >>>>> -- at apache.te > >>>>> postgresql_labeled_connect(httpd_t) > >>>>> > >>>>> I think this approach enables to keep independency between modules > >>>>> in unlabeled networking cases too. > >>>> For what it is worth, it looks like a good idea to me. > >>> At first, I implemented this idea for three services (PostgreSQL/MySQL/SSHd). > >>> > >>> This patch adds the following interfaces: > >>> - postgresql_labeled_communicate(domain) > >>> - mysql_labeled_communicate(domain) > >>> - ssh_labeled_communicate(domain) > >>> > >>> Chris, is it suitable for refpolicy framework? > >> The only issue I have with it would just be the interface naming; > >> probably something like mysql_tcp_recvfrom() would be better. > > > > I think the name of "xxxx_tcp_recvfrom()" is not obvious whether it means > > permissions related to labeled networking, or not. > > > > What do you think the following ideas? > > - something_labeled_recvfrom(domain) > > or > > - something_labeled_tcp_recvfrom(domain) > > > > Thanks, > > Oops, I found out this topic has not been progressed for a long time. > > An interface of corenet_*_recvfrom_labeled(dom1, dom2) is > provided in the latest policy, but nobody uses it except > for a few cases like: > - communication between unconfined domain and any other domain. > - communication between httpd_t and postgresql_t. > > In the previous discussion, you were hesitant to add permissions > which allows to communicate between widespread domains, so we > made a decision to put per-domain interfaces as above. > > At first, could you fix its naming scheme? > I think somethind_labeled_tcp_recvfrom(domain) is more obvious > to show its meanings. Thats fine. Its consistent with refpolicy naming. e.g. apache_tcp_recvfrom() would be fine. > And, I'm worried about massive enumeration of these interfaces > at userdom_basic_networking_template. > Currently, it allows widespread permissions toward any nodes, > port and interfaces. > I don't think "daemon_labeled_tcp_recvfrom($1_t)" here makes > security degrading. Is it reasonable to allow to communicate > between userdomains and daemon attribute? Yes, thats fine. -- Chris PeBenito Tresys Technology, LLC (410) 290-1411 x150 -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.