Re: [PATCH 10/10] selinux: Perform xfrm checks for unlabeled access in any case

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Monday, February 28, 2011 6:34:53 AM Steffen Klassert wrote:
> On Wed, Feb 23, 2011 at 04:59:17PM -0500, Paul Moore wrote:
> > > If we want to keep that behaviour, we should change the Kconfig help
> > > of labeled IPsec at least, there one can find:
> > > 
> > > Non-IPSec communications are designated as unlabelled, and only sockets
> > > authorized to communicate unlabelled data can send without using IPSec.
> > > 
> > > What is simply not the case, as far as I can see.
> > 
> > Here is the full text of CONFIG_SECURITY_NETWORK_XFRM for those of you
> > 
> > following along at home:
> >           This enables the XFRM (IPSec) networking security hooks.
> >           If enabled, a security module can use these hooks to
> >           implement per-packet access controls based on labels
> >           derived from IPSec policy.  Non-IPSec communications are
> >           designated as unlabelled, and only sockets authorized
> >           to communicate unlabelled data can send without using
> >           IPSec.
> >           If you are unsure how to answer this question, answer N.
> > 
> > What do you suggest?  If you're going to complain about help text you
> > have to offer some suggestions, that's the rule :)
> 
> Yeah, I know about the rules. Right now I've tried to change the code to
> fit better to the help text. If this does not work out, I still can try
> to do it the oher way arround :)
> 
> > If you haven't configured any of the SELinux network access controls,
> > meaning _all_ data flowing into and out of the system via the network is
> > considered to be unlabeled_t:SystemHigh, then yes, confidential and
> > every other type of data can be sent out the network.
> > 
> > Ask yourself this question: why would an admin, running SELinux, who
> > cares about restricting what data can be sent over the network not
> > configure any of SELinux's network access controls?  It just doesn't
> > make sense ...
> > 
> > > Even though, we could have a selinux policy rule that enforces the
> > > usage of a certain labeled SA. So for example if the key daemon does
> > > not start up for some reason, we have no labeled SA and the traffic
> > > leaves the system untransformed. That's what I wanted to avoid.
> > 
> > This will not happen, or rather it should not happen if everything works
> > the way it should.
> 
> Yes, if everything works the way it should we are fine and we would not
> even need to use selinux, but in real live bugs happen.
> 
> Usually I have to answer questions like:
> Given there is a bug in subsystem xyz, show that we still on the save
> side. And depending on the confidential level I have to show several lines
> of defense.

Just keep in mind that the kernel operates as one big memory space; if a bug 
inside the kernel is exploited, it is hard to make any guarantees about the 
kernel's security properties at that point.

--
paul moore
linux @ hp

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux