From: Paul Moore <paul.moore@hp.com>
To: Joshua Brindle <method@manicmethod.com>
Cc: selinux@tycho.nsa.gov
Subject: Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
Date: Thu, 17 Jan 2008 14:23:26 -0500 [thread overview]
Message-ID: <200801171423.26498.paul.moore@hp.com> (raw)
In-Reply-To: <478FA8C3.40600@manicmethod.com>
On Thursday 17 January 2008 2:13:07 pm Joshua Brindle wrote:
> Paul Moore wrote:
> > At some point in the Fedora 6 timeframe the "flow_in" and
> > "flow_out" permissions were added to the "packet" class, most
> > likely as part of the ill-fated secid-reconciliation effort.
> > Despite the fact that these permissions are not currently used they
> > should be included in the Reference Policy as they are now a
> > permanent fixture in Fedora and it is crucial that the FLASK
> > defines be kept in sync.
> >
> > This patch needs to be applied before any other patches that affect
> > the "packet" class, otherwise the resulting policy may not load.
>
> Hrm, they are last in the class definitions so until new perms are
> added to that class it is fairly irrelevant. The policy upgrade to
> remove them would only require a reboot to get rid of them so adding
> them to upstream refpolicy doesn't seem necessary at all.
>
> This also points out how much of a bad idea it is to add object
> class/perm definitions into distro policies before they are in
> refpolicy, I hope that this will be avoided in the future.
>
> I'm not sure what Chris feels about this but I'm opposed to adding
> definitions to the policy like this.
It turns out it's not quite as irrelevant as you think. The labeled
networking work targeted for 2.6.25 adds two new permissions to the
packet class, "forward_in" and "forward_out", (see patch on January
10th, "Add forwarding permissions to the packet object class") which
conflict with the existing permissions in Fedora. Failure to add these
permissions to the upstream reference policy will result in Fedora
forever having to patch both the policy and the kernel to get a
bootable system. It also makes life much more difficult for people
experimenting with SELinux on Fedora based systems.
I understand this isn't a patch anyone is going to be excited about (I
know I'm not) but it is necessary if we hope to move forward.
For clarity, here is what the packet class _should_ look like with both
the Fedora "flow" permissions and the new "forward" permissions:
class packet
{
send
recv
relabelto
flow_in # not currently in use
flow_out # not currently in use
forward_in
forward_out
}
--
paul moore
linux security @ hp
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2008-01-17 19:23 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-01-17 17:22 [PATCH] REFPOL: Add "rogue" Fedora packet class permissions Paul Moore
2008-01-17 17:30 ` Eric Paris
2008-01-17 19:13 ` Joshua Brindle
2008-01-17 19:23 ` Paul Moore [this message]
2008-01-17 19:33 ` Stephen Smalley
2008-01-18 13:32 ` Christopher J. PeBenito
2008-01-18 14:11 ` Paul Moore
2008-01-18 14:38 ` Christopher J. PeBenito
2008-01-19 3:44 ` Paul Moore
2008-01-18 15:06 ` Eric Paris
2008-01-18 16:52 ` Joshua Brindle
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200801171423.26498.paul.moore@hp.com \
--to=paul.moore@hp.com \
--cc=method@manicmethod.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.