Re: SECMARK: implementation question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sunday 11 October 2009 12:27:14 am Jacques Thomas wrote:
> Dear All,
> 
> If I understand correctly, the permission check for inbound packet (the
> "packet recv" operation) is performed by selinux_socket_sock_recv_skb,
> which hooks into the socket_sock_recv_skb hook.
> 
> Does anybody remember the rationale for doing the check there instead of
> the NF_INET_LOCAL_IN hook ?

When performing the "packet recv" access control the Secmark label needs to be 
compared against the receiving socket's label, to the best of my understanding 
this is not possible with the current netfilter hooks.  At one point there was 
some discussion of implementing socket level netfilter hooks but I don't 
believe they ever went anywhere.
 
> I am asking that because the permission for outbound packets ("packet
> send") seems to be performed in the NF_INET_LOCAL_OUT. I am sure there
> should be a good reason for this asymetry, but I don't get it.

The NF_INET_LOCAL_OUT hook, selinux_ip_output(), doesn't actually perform any 
access control, it only handles labeling packets generated from disconnected 
sockets when NetLabel is in use.  There is outbound Secmark based access 
control (amongst others) in the NF_INET_POST_ROUTING hook, but it is possible 
there because the packet (struct sk_buff) has a back pointer to the socket 
where it originated from enabling us to perform the access check at this point 
in the stack.

-- 
paul moore
linux @ hp

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux