From: Paul Moore <paul@paul-moore.com>
To: "Christopher J. PeBenito" <cpebenito@tresys.com>
Cc: SELinux Mail List <selinux@tycho.nsa.gov>
Subject: Re: RFC: packet checks always on option
Date: Mon, 14 May 2012 11:35:06 -0400 [thread overview]
Message-ID: <2254819.3TiCjlmuru@sifl> (raw)
In-Reply-To: <4FB1000D.4040403@tresys.com>
On Monday, May 14, 2012 08:52:29 AM Christopher J. PeBenito wrote:
> On 05/10/12 16:02, Paul Moore wrote:
> > Ever since secmark was introduced it has required users/admins to ensure,
> > via a secondary mechanism not contained within the SELinux policy, that
> > the netfilter/iptables configuration was both correctly matched to the
> > policy and that is was not tampered with, either maliciously or
> > accidentally. Failure to do this verification and correctly configure
> > netfilter/iptables could result in the mis-labeling of network traffic
> > via the secmark label.
> >
> > This applies to both the current behavior and the "old" behavior.
> >
> > Simply going back to always applying the per-packet secmark access
> > controls does nothing to solve the problem of ensuring correctness. This
> > is my main problem with your argument.
>
> I don't understand what correctness you're referring to. Labeling
> correctness? You always need that; thats the crux of having a proper
> running system. But we don't stop enforcing policy if its not correct.
That last sentence is particularly interesting, but I'll avoid commentary on
it for right now ...
My concern is that for every aspect of the system that I can think of, and
feel free to correct me if I'm missing something (as I know you will), the
system's policy can enforce the (re)labeling of the subjects and objects on
the system so it has _some_ control over the assigned labels. There are also
tools, e.g. restorecon, which can be used to verify/reset/correct the labels
on persistent filesystem objects. With those two things you should be able to
verify the correctness of a filesystem's labels and then ensure it stays
correct.
With secmark labels we still have the ability to enforce the (re)labeling via
the system's policy, but we are missing the ability to verify/reset/correct
the label assignment.
> >> * during boot and shutdown you can guarantee no network access
> >
> > You can do this through a variety of other mechanisms that have nothing to
> > do with secmark labels.
>
> No, you can't.
Yes, you can. See "netif:{ ingress egress }".
--
paul moore
www.paul-moore.com
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2012-05-14 15:35 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-05-08 16:58 RFC: packet checks always on option Christopher J. PeBenito
2012-05-10 20:02 ` Paul Moore
2012-05-14 12:52 ` Christopher J. PeBenito
2012-05-14 15:35 ` Paul Moore [this message]
2012-05-14 16:42 ` Chad Hanson
2012-05-14 20:54 ` Paul Moore
2012-05-14 17:17 ` Stephen Smalley
2012-05-14 17:22 ` Stephen Smalley
2012-05-14 21:15 ` Paul Moore
2012-05-15 13:24 ` Christopher J. PeBenito
2012-05-15 14:13 ` Paul Moore
2012-05-15 14:47 ` Christopher J. PeBenito
2012-05-15 15:04 ` Paul Moore
2012-05-15 15:46 ` Christopher J. PeBenito
2012-05-15 18:45 ` Paul Moore
2012-05-17 14:06 ` david caplan
2012-05-17 14:42 ` Paul Moore
2012-05-17 15:31 ` david caplan
2012-05-17 16:51 ` Paul Moore
2012-05-16 2:18 ` Daniel J Walsh
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2254819.3TiCjlmuru@sifl \
--to=paul@paul-moore.com \
--cc=cpebenito@tresys.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.