> Was computing the MLS label the only part you needed? With respect to > having the daemon run in the same label as the peer (or the label > derived from the intersection of the peer and the daemon), you may > wish to have a look at mod_selinux for Apache and/or the old xinetd > LABELED option, although neither of those would have included the new > glblub support so you'll have to integrate that yourself. Ah, really helpful pointers, thank you very much! > Or your daemon can just use setcon(3) directly if allowed by policy. My assumption was that I can use the greatest lower bound, and then preform a `setexeccon` and `exec` to transition to the new security context provided I can pass the open fd according to policy (for now -- at least until I can find a better way to restrict a thread -- I'll do some reading in mod_selinux / xinetd). Is this the case, or am I going to wind up in a world of hurt? The use-case here is to allow an RPC server to listen to network traffic, and when properly authenticated, raise the sensitivity level and category as required, both so the RPC server can logically handle access controls (not shocked the crunchy folks hit this first) as well as a system level protection in case there's a slip up and the server attempts to read a secure file (less urgent but still very nice to have!). I'm very much still learning the MLS ropes here, so if someone sees me hurtling to the edge of a cliff, do let me know! -- :wq