From: "Christopher J. PeBenito" <cpebenito@tresys.com>
To: "Stephen Smalley" <sds@tycho.nsa.gov>
Cc: "Joshua Brindle" <method@manicmethod.com>,
"Paul Moore" <paul.moore@hp.com>, <selinux@tycho.nsa.gov>
Subject: Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
Date: Fri, 18 Jan 2008 08:32:07 -0500 [thread overview]
Message-ID: <1200663127.4595.23.camel@gorn> (raw)
In-Reply-To: <1200598421.7025.73.camel@moss-spartans.epoch.ncsc.mil>
On Thu, 2008-01-17 at 14:33 -0500, Stephen Smalley wrote:
> On Thu, 2008-01-17 at 14:13 -0500, Joshua Brindle wrote:
> > Paul Moore wrote:
> > > At some point in the Fedora 6 timeframe the "flow_in" and "flow_out"
> > > permissions were added to the "packet" class, most likely as part of the
> > > ill-fated secid-reconciliation effort. Despite the fact that these permissions
> > > are not currently used they should be included in the Reference Policy as they
> > > are now a permanent fixture in Fedora and it is crucial that the FLASK
> > > defines be kept in sync.
> > >
> > > This patch needs to be applied before any other patches that affect the
> > > "packet" class, otherwise the resulting policy may not load.
> > This also points out how much of a bad idea it is to add object
> > class/perm definitions into distro policies before they are in
> > refpolicy, I hope that this will be avoided in the future.
Definitely.
> The situation is this:
> - policy shipped in Fedora 6 and later had these flow_in/flow_out
> permissions defined in their base modules and in their gen_requires.
> - Paul Moore is adding new permissions to that class in his labeled
> networking tree that is included in -mm and queued for 2.6.25,
> - when you try to load those policies into the resulting kernel, the
> class validation logic rejects the policies,
> - any policy modules built by any third parties also have these perms
> defined in their requires and will fail if we remove them from base,
> - we can't make any changes to the kernel that break existing userspace
> and policy (which is why handle_unknown is largely useless to us until
> all legacy distros that predate it are sufficiently dead and gone).
>
> This all came up because akpm reported the failure on his FC6 test box
> with latest -mm.
>
> I suggested just using flow_in/flow_out instead of
> forward_in/forward_out for Paul's new controls so that we don't have any
> unused permissions, but Paul and Eric want the more precise names.
I strongly agree with Stephen's suggestion. Do we have a strategy for
eventually reclaiming these permissions if we don't reuse them right
now?
--
Chris PeBenito
Tresys Technology, LLC
(410) 290-1411 x150
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2008-01-18 13:32 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-01-17 17:22 [PATCH] REFPOL: Add "rogue" Fedora packet class permissions Paul Moore
2008-01-17 17:30 ` Eric Paris
2008-01-17 19:13 ` Joshua Brindle
2008-01-17 19:23 ` Paul Moore
2008-01-17 19:33 ` Stephen Smalley
2008-01-18 13:32 ` Christopher J. PeBenito [this message]
2008-01-18 14:11 ` Paul Moore
2008-01-18 14:38 ` Christopher J. PeBenito
2008-01-19 3:44 ` Paul Moore
2008-01-18 15:06 ` Eric Paris
2008-01-18 16:52 ` Joshua Brindle
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1200663127.4595.23.camel@gorn \
--to=cpebenito@tresys.com \
--cc=method@manicmethod.com \
--cc=paul.moore@hp.com \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.