Re: [PATCH 1/1] networkmanager: Grant access to unlabeled PKeys

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/27/2017 05:50 PM, Paul Moore wrote:
On Mon, Nov 27, 2017 at 3:04 PM, Daniel Jurgens <danielj@xxxxxxxxxxxx> wrote:
On 11/27/2017 10:19 AM, Paul Moore wrote:
On Mon, Nov 27, 2017 at 9:03 AM, Dan Jurgens <danielj@xxxxxxxxxxxx> wrote:
From: Daniel Jurgens <danielj@xxxxxxxxxxxx>

For controlling IPoIB VLANs

Reported-by: Honggang LI <honli@xxxxxxxxxx>
Signed-off-by: Daniel Jurgens <danielj@xxxxxxxxxxxx>
Tested-by: Honggang LI <honli@xxxxxxxxxx>
---
  networkmanager.te |    2 ++
  1 files changed, 2 insertions(+), 0 deletions(-)
[NOTE: resending due to a typo in the refpol mailing list address]

We obviously need something like this now so we don't break IPoIB, but
I wonder if we should make the IB access controls dynamic like the
per-packet network access controls.  We could key off the presence of
the IB pkey and endport definitions: if there are any objects defined
in the loaded policy we enable the controls, otherwise we disable
them.

I think I understand what you're saying Paul, but I'm not clear on the mechanism.  Are you referring to the netlabel/IPSEC enable checks? They are wrapped up in selinux_peerlbl_enabled.

Basically, yes.  We could add a new variable/function that gates the
access control checks in selinux_ib_pkey_access() and
selinux_ib_endport_manage_subnet(); the checks would be enabled when
there was Infiniband configuration loaded with the policy.  Without
the IB config loaded, all the checks would end up being just a domain
check against unlabeled_t, which isn't very interesting, so we would
just drop the checks.

As long as it also respects policycap always_check_network, it works for me.

--
Chris PeBenito




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux