From: Paul Moore <paul.moore@hp.com>
To: "Christopher J. PeBenito" <cpebenito@tresys.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>,
Joshua Brindle <method@manicmethod.com>,
selinux@tycho.nsa.gov
Subject: Re: [PATCH] REFPOL: Add "rogue" Fedora packet class permissions
Date: Fri, 18 Jan 2008 22:44:25 -0500 [thread overview]
Message-ID: <200801182244.26071.paul.moore@hp.com> (raw)
In-Reply-To: <1200667130.4595.45.camel@gorn>
On Friday 18 January 2008 9:38:50 am Christopher J. PeBenito wrote:
> On Fri, 2008-01-18 at 09:11 -0500, Paul Moore wrote:
> > On Friday 18 January 2008 8:32:07 am Christopher J. PeBenito wrote:
> > > I strongly agree with Stephen's suggestion.
> >
> > So, does the "strongly agree" position mean you won't accept the patch
> > adding both "flow" and "forward" permissions to the packet class?
>
> No, if I meant that, I would have said that.
Okay, just wanted to clarify.
I suppose I'm a little hyper sensitive to problems right now because the merge
window for 2.6.25 is very close and I don't want there to be any known issues
with the labeled networking code when the window opens.
> > I'll reiterate my
> > belief that using "flow" instead of "forward" for the new permission
> > checks is a mistake which will cause more confusion in the long run than
> > the addition of two unused permissions. However, you hold the key to the
> > policy and if changing the permissions to use "flow" is the only way for
> > us to enable the new network access controls then I have little choice.
>
> I'm not completely unreasonable :) Also that would be an abuse of power.
Yes, you're right - you are a very reasonable guy, despite all the crap Josh
says about you when you're not around :) Re-reading the text above I went a
little crazy there, sorry about that.
> > > Do we have a strategy for eventually reclaiming these permissions if we
> > > don't reuse them right now?
> >
> > I'm not aware of one, but it is always possible that future work might
> > find a use for the packet "flow" permissions. It's also highly doubtful
> > from where I sit now that we'll come even remotely close to hitting the
> > 32 permission limit in the packet class.
>
> I just don't like these rogue permissions filtering up to upstream. One
> thing that I'm also looking ahead to is that explicit require blocks
> will be ignored by policyrep (requirements will be implicit). So the
> hack that I had to add that requires all of the kernel object classes
> will also be going away, and only classes/perms actually being used will
> be required.
This sounds like a good idea, and I definitely owe you one, so if there is
anything I can do to help (I see that Eric offered to) let me know.
--
paul moore
linux security @ hp
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2008-01-19 3:44 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-01-17 17:22 [PATCH] REFPOL: Add "rogue" Fedora packet class permissions Paul Moore
2008-01-17 17:30 ` Eric Paris
2008-01-17 19:13 ` Joshua Brindle
2008-01-17 19:23 ` Paul Moore
2008-01-17 19:33 ` Stephen Smalley
2008-01-18 13:32 ` Christopher J. PeBenito
2008-01-18 14:11 ` Paul Moore
2008-01-18 14:38 ` Christopher J. PeBenito
2008-01-19 3:44 ` Paul Moore [this message]
2008-01-18 15:06 ` Eric Paris
2008-01-18 16:52 ` Joshua Brindle
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200801182244.26071.paul.moore@hp.com \
--to=paul.moore@hp.com \
--cc=cpebenito@tresys.com \
--cc=method@manicmethod.com \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.