All of lore.kernel.org
 help / color / mirror / Atom feed
From: Paul Moore <paul@paul-moore.com>
To: "Christopher J. PeBenito" <cpebenito@tresys.com>
Cc: SELinux Mail List <selinux@tycho.nsa.gov>
Subject: Re: RFC: packet checks always on option
Date: Thu, 10 May 2012 16:02:09 -0400	[thread overview]
Message-ID: <1540303.QUZeuyPSRI@sifl> (raw)
In-Reply-To: <4FA95098.1050201@tresys.com>

On Tuesday, May 08, 2012 12:58:00 PM Christopher J. PeBenito wrote:
> I recently became aware that the packet checks are now disabled when there
> are no SECMARK rules ...
>
> ... this behavior is "allow by default": the opposite of what SELinux stands
> for.  SELinux doesn't stop file checks if you mount an xattr filesystem that
> has no labels.  High assurance systems would actually want the old behavior
> so that networking would be denied if:
> 
> * iptables rules fail to load
> * iptables rules maliciously flushed, e.g. by compromised domain that has
> net_admin

Ever since secmark was introduced it has required users/admins to ensure, via 
a secondary mechanism not contained within the SELinux policy, that the 
netfilter/iptables configuration was both correctly matched to the policy and 
that is was not tampered with, either maliciously or accidentally.  Failure to 
do this verification and correctly configure netfilter/iptables could result 
in the mis-labeling of network traffic via the secmark label.

This applies to both the current behavior and the "old" behavior.

Simply going back to always applying the per-packet secmark access controls 
does nothing to solve the problem of ensuring correctness.  This is my main 
problem with your argument.

> * during boot and shutdown you can guarantee no network access

You can do this through a variety of other mechanisms that have nothing to do 
with secmark labels.
 
> I think this behavior should be restored ...

I disagree.

-- 
paul moore
www.paul-moore.com


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2012-05-10 20:02 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-05-08 16:58 RFC: packet checks always on option Christopher J. PeBenito
2012-05-10 20:02 ` Paul Moore [this message]
2012-05-14 12:52   ` Christopher J. PeBenito
2012-05-14 15:35     ` Paul Moore
2012-05-14 16:42       ` Chad Hanson
2012-05-14 20:54         ` Paul Moore
2012-05-14 17:17 ` Stephen Smalley
2012-05-14 17:22   ` Stephen Smalley
2012-05-14 21:15   ` Paul Moore
2012-05-15 13:24     ` Christopher J. PeBenito
2012-05-15 14:13       ` Paul Moore
2012-05-15 14:47         ` Christopher J. PeBenito
2012-05-15 15:04           ` Paul Moore
2012-05-15 15:46             ` Christopher J. PeBenito
2012-05-15 18:45               ` Paul Moore
2012-05-17 14:06                 ` david caplan
2012-05-17 14:42                   ` Paul Moore
2012-05-17 15:31                     ` david caplan
2012-05-17 16:51                       ` Paul Moore
2012-05-16  2:18           ` Daniel J Walsh

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1540303.QUZeuyPSRI@sifl \
    --to=paul@paul-moore.com \
    --cc=cpebenito@tresys.com \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.