From: Paul Moore <paul.moore@hp.com>
To: Venkat Yekkirala <vyekkirala@TrustedCS.com>
Cc: Joshua Brindle <jbrindle@tresys.com>,
Stephen Smalley <sds@epoch.ncsc.mil>,
Karl MacMillan <kmacmillan@mentalrootkit.com>,
latten@austin.ibm.com, jmorris@redhat.com, dwalsh@redhat.com,
Darrel Goeddel <DGoeddel@TrustedCS.com>,
Chad Hanson <chanson@TrustedCS.com>,
selinux@tycho.nsa.gov
Subject: Re: Labeled networking packets
Date: Fri, 22 Sep 2006 12:20:04 -0400 [thread overview]
Message-ID: <45140D34.2020001@hp.com> (raw)
In-Reply-To: <36282A1733C57546BE392885C061859201573500@chaos.tcs.tcs-sec.com>
Venkat Yekkirala wrote:
>>>It IS FOR LABELING as far as MLS is concerned.
>>
>>Perhaps we are just overloading the term "labeling". It kinda sounds
>>like the non-MLS folks want to be able to distinguish between "remote
>>labeling", i.e. SA or NetLabel, and "local labeling", i.e. secmark. I
>>realize that there are certain users who don't care to make that
>>distinction because they can put a certain level of trust in the
>>physical network configuration. However, considering the
>>flexibility of
>>SELinux in general I think any built-in assumption is going to upset
>>someone. I think the best idea is to arrive at some sort of policy
>>abstraction which would allow either of the behaviors listed above.
>
> This we have attempted to do via transitions.
Yep, I got that, I think everybody got that. However, I think this
discussion has demonstrated that not everyone believes the transitions
as they are implemented in the current secid reconciliation patches is
the right approach. Maybe it's an issue of not understanding, maybe I'm
just confused ... (maybe I need to stop responding to email and do some
some real work <g>).
Personally, I don't have any strong feelings for any particular
implementation. My main concern is that we arrive at a solution that
works for both the generic SELinux TE users as well as the legacy MLS users.
>>For handling incoming packets this may mean that we keep all of the
>>packet labeling mechanisms separate, allowing each to have it's own
>>permission check.
>
> But how would you then make sure a secret cipso didn't arrive thru a
> TopSecret SA?
First, I think this is what I would call a "smack the user" problem.
However, if somebody really wanted to use both SA and NetLabel labeling
on the same connection I think the important thing is that we control
the flow of data to the socket, not the SA, as the socket is the
endpoint of the communcation channel from a users point of view. With
this in mind, having access checks against the SA/socket and the
NetLabel/socket would ensure that the user doesn't receive any data they
shouldn't - even if the remote labels don't reconcile with each other.
>>For dealing with getpeercon() issues perhaps we only allow "remote
>>labeled" contexts to be reported by default, but if policy
>>allows (yes,
>>we would need some sort of new allow rule or policy construct) the
>>"locally labeled" context could be used as a fallback.
>>
>>I know it's not ideal for any one scenario, but I think it may be
>>flexibile enough to deal with all of them.
>
> That would mean you would have separate policies.
What's wrong with that? We have that already and I suspect we will for
the foreseeable future.
--
paul moore
linux security @ hp
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2006-09-22 16:20 UTC|newest]
Thread overview: 106+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-09-22 15:56 Labeled networking packets Venkat Yekkirala
2006-09-22 16:20 ` Paul Moore [this message]
-- strict thread matches above, loose matches on Subject: below --
2006-09-27 19:35 Venkat Yekkirala
2006-09-27 19:15 Joy Latten
2006-09-27 16:46 Venkat Yekkirala
2006-09-27 16:14 Joy Latten
2006-09-26 22:04 Venkat Yekkirala
2006-09-26 22:43 ` James Morris
2006-09-27 11:37 ` Stephen Smalley
2006-09-27 12:40 ` Joshua Brindle
2006-09-27 12:58 ` Stephen Smalley
2006-09-27 13:15 ` Joshua Brindle
2006-09-27 12:59 ` James Morris
2006-09-27 13:29 ` Stephen Smalley
2006-09-27 17:03 ` James Morris
2006-09-27 17:08 ` James Morris
2006-09-26 15:58 Venkat Yekkirala
2006-09-26 15:51 Venkat Yekkirala
2006-09-26 16:47 ` Stephen Smalley
2006-09-26 20:01 ` James Morris
2006-09-25 21:53 Venkat Yekkirala
2006-09-25 22:00 ` James Morris
2006-09-25 21:46 Venkat Yekkirala
2006-09-26 13:35 ` Stephen Smalley
2006-09-25 20:02 Chad Hanson
2006-09-25 20:47 ` Stephen Smalley
2006-09-25 18:56 Chad Hanson
2006-09-25 19:24 ` Stephen Smalley
2006-09-25 15:28 Chad Hanson
2006-09-25 16:41 ` Karl MacMillan
2006-09-25 18:00 ` Stephen Smalley
2006-09-25 14:45 Chad Hanson
2006-09-25 15:54 ` Casey Schaufler
2006-09-22 23:39 Joy Latten
2006-09-22 23:25 Joy Latten
2006-09-22 21:55 Venkat Yekkirala
2006-09-23 14:13 ` Joshua Brindle
2006-09-25 15:35 ` Stephen Smalley
2006-09-25 15:55 ` Joshua Brindle
2006-09-25 16:43 ` Darrel Goeddel
2006-09-25 17:02 ` Stephen Smalley
2006-09-25 18:14 ` Karl MacMillan
2006-09-25 19:58 ` James Morris
2006-09-25 16:35 ` Karl MacMillan
2006-09-25 18:04 ` Stephen Smalley
2006-09-25 18:25 ` Joshua Brindle
2006-09-25 18:41 ` Karl MacMillan
2006-09-25 18:53 ` Joshua Brindle
2006-09-25 19:00 ` Paul Moore
2006-09-25 19:25 ` Stephen Smalley
2006-09-25 19:38 ` Paul Moore
2006-09-25 19:56 ` Stephen Smalley
2006-09-25 18:49 ` Stephen Smalley
2006-09-25 19:21 ` Stephen Smalley
2006-09-25 14:59 ` Karl MacMillan
2006-09-25 17:58 ` Stephen Smalley
2006-09-25 18:38 ` Karl MacMillan
2006-09-25 18:54 ` Paul Moore
2006-09-25 20:04 ` James Morris
2006-09-25 20:54 ` James Morris
2006-09-22 21:42 Venkat Yekkirala
2006-09-22 20:30 Venkat Yekkirala
2006-09-22 17:23 Venkat Yekkirala
2006-09-22 17:47 ` Paul Moore
2006-09-22 20:44 ` James Morris
2006-09-22 21:07 ` Paul Moore
2006-09-22 18:52 ` Joshua Brindle
2006-09-22 20:45 ` James Morris
2006-09-22 20:57 ` Stephen Smalley
2006-09-25 14:30 ` Karl MacMillan
2006-09-22 16:14 Venkat Yekkirala
2006-09-22 16:05 Venkat Yekkirala
2006-09-22 16:21 ` Paul Moore
2006-09-22 15:45 Venkat Yekkirala
2006-09-22 16:07 ` Paul Moore
2006-09-22 15:41 Venkat Yekkirala
2006-09-22 15:55 ` Paul Moore
2006-09-22 15:36 Venkat Yekkirala
2006-09-22 15:50 ` Paul Moore
2006-09-22 15:21 Venkat Yekkirala
2006-09-22 15:38 ` Joshua Brindle
2006-09-22 15:15 Venkat Yekkirala
2006-09-22 15:30 ` Paul Moore
2006-09-22 15:09 Venkat Yekkirala
2006-09-22 14:57 Venkat Yekkirala
2006-09-22 0:44 Venkat Yekkirala
2006-09-22 2:04 ` Joshua Brindle
2006-09-22 12:47 ` Stephen Smalley
2006-09-22 13:02 ` Joshua Brindle
2006-09-22 14:47 ` Paul Moore
2006-09-22 14:58 ` Joshua Brindle
2006-09-22 15:25 ` Paul Moore
2006-09-22 19:48 ` James Morris
2006-09-22 19:49 ` Stephen Smalley
2006-09-22 19:02 ` Stephen Smalley
2006-09-22 13:26 ` Karl MacMillan
2006-09-22 13:50 ` Joshua Brindle
2006-09-22 15:01 ` James Morris
2006-09-22 19:17 ` Stephen Smalley
2006-09-22 19:07 ` Stephen Smalley
2006-09-21 17:14 Venkat Yekkirala
2006-09-21 19:37 ` Karl MacMillan
2006-09-21 16:27 Venkat Yekkirala
2006-09-21 16:47 ` Karl MacMillan
2006-09-21 15:01 Venkat Yekkirala
2006-09-21 15:55 ` Stephen Smalley
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=45140D34.2020001@hp.com \
--to=paul.moore@hp.com \
--cc=DGoeddel@TrustedCS.com \
--cc=chanson@TrustedCS.com \
--cc=dwalsh@redhat.com \
--cc=jbrindle@tresys.com \
--cc=jmorris@redhat.com \
--cc=kmacmillan@mentalrootkit.com \
--cc=latten@austin.ibm.com \
--cc=sds@epoch.ncsc.mil \
--cc=selinux@tycho.nsa.gov \
--cc=vyekkirala@TrustedCS.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.