Re: RFC: packet checks always on option

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tuesday, May 15, 2012 09:24:20 AM Christopher J. PeBenito wrote:
> On 05/14/12 17:15, Paul Moore wrote:
> > On Monday, May 14, 2012 01:17:30 PM Stephen Smalley wrote:
> >> Didn't the old behavior lead to the undesirable result that refpolicy
> >> allows every domain (or at least every domain that does networking) to
> >> send/recv unlabeled packets, such that you cannot effectively employ
> >> SECMARK unless you first modify and rebuild your entire policy to take
> >> away the unlabeled packet access?  Whereas with the new behavior one
> >> could drop those rules and then when someone does enable SECMARK, they
> >> get to fully define the allowable network traffic?
> > 
> > Yep.
> 
> Not any worse than with the old networking checks.

I believe that was Stephen's point.

> >> I'm not adverse to making it optional/configurable, but I think a policy
> >> capability is how you should do it.  That is what they are for, and they
> >> are supposed to provide a more explicit mechanism than either the
> >> handle_unknown logic or the old compat_net logic ...
> > 
> > *If* we decide to go this route, I agree, policy capabilities seem to be
> > the best fit.
> > 
> > However, as I said earlier in my emails to Chris, I'm still not certain
> > this actually accomplishes anything useful.
> 
> I don't understand how you can say this doesn't accomplish anything useful.

See my earlier comments in this thread about being able to verify the 
correctness of the secmark labels.  This has always been my core concern with 
your argument: you are concerned about the ability for policy to control 
network traffic labeled via secmark, but you seem to ignore the issue that 
there is no mechanism to verify the correctness of the secmark labels.  Making 
strong guarantees about the ability to enforce a given policy without any 
assurance that the labels are correct seems a bit silly to me.

> You don't want an *option* for changing the behavior of an enabled
> mechanism (SECMARK), and then in another email you're suggesting adding an
> additional mechanism (labeled ipsec/netlabel), which would otherwise be
> unused (assuming you're turning it on just to handle the situations I'm
> mentioning).

I'm not suggesting adding anything, what I've suggested already exists.  
However, as Chad pointed out, this approach has its own drawbacks.

-- 
paul moore
www.paul-moore.com


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux