On Monday, February 28, 2011 6:34:53 AM Steffen Klassert wrote: > On Wed, Feb 23, 2011 at 04:59:17PM -0500, Paul Moore wrote: > > > If we want to keep that behaviour, we should change the Kconfig help > > > of labeled IPsec at least, there one can find: > > > > > > Non-IPSec communications are designated as unlabelled, and only sockets > > > authorized to communicate unlabelled data can send without using IPSec. > > > > > > What is simply not the case, as far as I can see. > > > > Here is the full text of CONFIG_SECURITY_NETWORK_XFRM for those of you > > > > following along at home: > > This enables the XFRM (IPSec) networking security hooks. > > If enabled, a security module can use these hooks to > > implement per-packet access controls based on labels > > derived from IPSec policy. Non-IPSec communications are > > designated as unlabelled, and only sockets authorized > > to communicate unlabelled data can send without using > > IPSec. > > If you are unsure how to answer this question, answer N. > > > > What do you suggest? If you're going to complain about help text you > > have to offer some suggestions, that's the rule :) > > Yeah, I know about the rules. Right now I've tried to change the code to > fit better to the help text. If this does not work out, I still can try > to do it the oher way arround :) > > > If you haven't configured any of the SELinux network access controls, > > meaning _all_ data flowing into and out of the system via the network is > > considered to be unlabeled_t:SystemHigh, then yes, confidential and > > every other type of data can be sent out the network. > > > > Ask yourself this question: why would an admin, running SELinux, who > > cares about restricting what data can be sent over the network not > > configure any of SELinux's network access controls? It just doesn't > > make sense ... > > > > > Even though, we could have a selinux policy rule that enforces the > > > usage of a certain labeled SA. So for example if the key daemon does > > > not start up for some reason, we have no labeled SA and the traffic > > > leaves the system untransformed. That's what I wanted to avoid. > > > > This will not happen, or rather it should not happen if everything works > > the way it should. > > Yes, if everything works the way it should we are fine and we would not > even need to use selinux, but in real live bugs happen. > > Usually I have to answer questions like: > Given there is a bug in subsystem xyz, show that we still on the save > side. And depending on the confidential level I have to show several lines > of defense. Just keep in mind that the kernel operates as one big memory space; if a bug inside the kernel is exploited, it is hard to make any guarantees about the kernel's security properties at that point. -- paul moore linux @ hp -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.