Re: RFC: packet checks always on option

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tuesday, May 15, 2012 10:47:25 AM Christopher J. PeBenito wrote:
> On 05/15/12 10:13, Paul Moore wrote:
> > On Tuesday, May 15, 2012 09:24:20 AM Christopher J. PeBenito wrote:
> >> On 05/14/12 17:15, Paul Moore wrote:
> >>> On Monday, May 14, 2012 01:17:30 PM Stephen Smalley wrote:
> >>>> Didn't the old behavior lead to the undesirable result that refpolicy
> >>>> allows every domain (or at least every domain that does networking) to
> >>>> send/recv unlabeled packets, such that you cannot effectively employ
> >>>> SECMARK unless you first modify and rebuild your entire policy to take
> >>>> away the unlabeled packet access?  Whereas with the new behavior one
> >>>> could drop those rules and then when someone does enable SECMARK, they
> >>>> get to fully define the allowable network traffic?
> >>> 
> >>> Yep.
> >> 
> >> Not any worse than with the old networking checks.
> > 
> > I believe that was Stephen's point.
> 
> I'm still standing by my point which you deleted ...

I didn't "delete" it - it's a public mailing list that is well archived after 
all - I just didn't feel the need to reply to that point so I left it out of 
my email.

> >>>> I'm not adverse to making it optional/configurable, but I think a
> >>>> policy
> >>>> capability is how you should do it.  That is what they are for, and
> >>>> they
> >>>> are supposed to provide a more explicit mechanism than either the
> >>>> handle_unknown logic or the old compat_net logic ...
> >>> 
> >>> *If* we decide to go this route, I agree, policy capabilities seem to be
> >>> the best fit.
> >>> 
> >>> However, as I said earlier in my emails to Chris, I'm still not certain
> >>> this actually accomplishes anything useful.
> >> 
> >> I don't understand how you can say this doesn't accomplish anything
> >> useful.
> > 
> > See my earlier comments in this thread about being able to verify the
> > correctness of the secmark labels.  This has always been my core concern
> > with your argument: you are concerned about the ability for policy to
> > control network traffic labeled via secmark, but you seem to ignore the
> > issue that there is no mechanism to verify the correctness of the secmark
> > labels.  Making strong guarantees about the ability to enforce a given
> > policy without any assurance that the labels are correct seems a bit
> > silly to me.
> 
> Believe me, as a policy person, I'd never ignore labeling correctness.  I
> don't think SECMARK rule correctness has anything to do with this
> discussion, as this is about the mechanism/enforcement itself.

Perhaps I'm reading the two sentences above wrong, perhaps I'm thinking about 
it wrong, or perhaps you didn't write them as intended; but the two sentences 
above seem to contradict each other in my mind.  I just don't see how you can 
have enforcement via labels without correct application of the labels 
themselves.

> What do you want to do with correctness?

While it is a bit simplistic, the quickest example I can think of is a 
restorecon mechanism for secmark labels.

-- 
paul moore
www.paul-moore.com


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux