All of lore.kernel.org
 help / color / mirror / Atom feed
* RHEL5 Kernel with labeled networking
@ 2006-10-03  0:23 Eric Paris
  2006-10-03 15:34 ` Linda Knippers
  2006-10-03 16:40 ` Paul Moore
  0 siblings, 2 replies; 30+ messages in thread
From: Eric Paris @ 2006-10-03  0:23 UTC (permalink / raw)
  To: selinux, redhat-lssp; +Cc: paul.moore, vyekkirala, jmorris

DO NOT USE THESE KERNELS ON A PRODUCTION SYSTEM!

If you go to http://people.redhat.com/eparis/RHEL5_labeled_networking/
you should find a set of kernels based off of the Red Hat RHEL5 source
tree.  These should include patches for 

network labeling support from Venkat
netlabel auditing
ipsec/secmark secid reconciliation
netlabel secid reconciliation

I need a very fast response from everyone involved if these kernels

A) boot
B) run without labeled networking (very very important)
C) run with labeled networking

If you run across a problem feel free to let me or the list know.  You
may also feel free to open a bug in bugzilla.redhat.com for the product
choose Red Hat Enterprise Linux Public Beta and RHEL5.  If you open a
bug for this labeled networking you can go ahead and assign it to
eparis@redhat.com so I'm sure to see it and bug the correct people.

At this time there is a known ipsec problem with these kernels.  I
haven't looked at it closely but I believe the problem is that processes
which intend to send over an ipsec tunnels but have certain avc denials
will actually cause traffic to flow unencrypted.  SO PLEASE DO NOT USE
THESE ON ANY PRODUCTION SYSTEM!!  There is work going on upstream (on
linux-netdev not either of these lists) to fix this issue in the 2.6-net
tree and when it is finished it will get brought back into RHEL5.  (I
don't think you will hit this bug with relatively modern policy but it
is there and can be a serious security flaw)

Before network labeling is completed we still need some work
implementing how we plan to audit configuration changes in ipsec
labeling decisions.  I believe we agreed today that this auditing must
be done in kernelspace since we do not have fine grained enough controls
on netlink messages to allow for all of the auditing in userspace.

DO NOT USE THESE KERNELS ON A PRODUCTION SYSTEM

-Eric


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 30+ messages in thread
* RE: RHEL5 Kernel with labeled networking
@ 2006-10-03 17:16 Venkat Yekkirala
  0 siblings, 0 replies; 30+ messages in thread
From: Venkat Yekkirala @ 2006-10-03 17:16 UTC (permalink / raw)
  To: Stephen Smalley, Linda Knippers
  Cc: Eric Paris, selinux, redhat-lssp, paul.moore, Venkat Yekkirala,
	jmorris

> Only if you set /selinux/compat_net to 1.
> Otherwise, you need modified policy to define and allow 
> flow_in/flow_out
> permissions as required, and I suspect you need more in order to deal
> with the fact that we now get labeled traffic on loopback by default
> (thus affecting packet send/recv as well).  Venkat, do you 
> have a policy
> patch?

Will post one in a couple of hours.

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 30+ messages in thread
* Re: RHEL5 Kernel with labeled networking
@ 2006-10-03 18:37 Joy Latten
  2006-10-03 19:18 ` Joshua Brindle
  0 siblings, 1 reply; 30+ messages in thread
From: Joy Latten @ 2006-10-03 18:37 UTC (permalink / raw)
  To: eparis, redhat-lssp, selinux; +Cc: jmorris, paul.moore, vyekkirala

>Before network labeling is completed we still need some work
>implementing how we plan to audit configuration changes in ipsec
>labeling decisions.  I believe we agreed today that this auditing must
>be done in kernelspace since we do not have fine grained enough controls
>on netlink messages to allow for all of the auditing in userspace.
>

I've talked to Klaus about what needs to be audited for ipsec and
lspp compliance. I will begin work on a patch and get this out
to the list as soon as I can. We will audit everytime a policy is 
added/removed to/from the ipsec policy database.

Regards,
Joy 

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 30+ messages in thread
* Re: RHEL5 Kernel with labeled networking
@ 2006-10-04 19:01 Joy Latten
  0 siblings, 0 replies; 30+ messages in thread
From: Joy Latten @ 2006-10-04 19:01 UTC (permalink / raw)
  To: eparis, redhat-lssp, selinux

>DO NOT USE THESE KERNELS ON A PRODUCTION SYSTEM!
>
>If you go to http://people.redhat.com/eparis/RHEL5_labeled_networking/
>you should find a set of kernels based off of the Red Hat RHEL5 source
>tree.  These should include patches for 
>
>network labeling support from Venkat
>netlabel auditing
>ipsec/secmark secid reconciliation
>netlabel secid reconciliation
>
>I need a very fast response from everyone involved if these kernels
>
>A) boot
>B) run without labeled networking (very very important)
>C) run with labeled networking
>
>If you run across a problem feel free to let me or the list know.  You
>may also feel free to open a bug in bugzilla.redhat.com for the product
>choose Red Hat Enterprise Linux Public Beta and RHEL5.  If you open a
>bug for this labeled networking you can go ahead and assign it to
>eparis@redhat.com so I'm sure to see it and bug the correct people.
>
>At this time there is a known ipsec problem with these kernels.  I
>haven't looked at it closely but I believe the problem is that processes
>which intend to send over an ipsec tunnels but have certain avc denials
>will actually cause traffic to flow unencrypted.  SO PLEASE DO NOT USE
>THESE ON ANY PRODUCTION SYSTEM!!  There is work going on upstream (on
>linux-netdev not either of these lists) to fix this issue in the 2.6-net
>tree and when it is finished it will get brought back into RHEL5.  (I
>don't think you will hit this bug with relatively modern policy but it
>is there and can be a serious security flaw)
>
>Before network labeling is completed we still need some work
>implementing how we plan to audit configuration changes in ipsec
>labeling decisions.  I believe we agreed today that this auditing must
>be done in kernelspace since we do not have fine grained enough controls
>on netlink messages to allow for all of the auditing in userspace.

A stress test sending streams of tcp and udp packets completed
a 15 hour run successfully. Purpose was to regression test.

Configuration:
non-labeled ipsec, encryption and authentication, 
transport mode using racoon
selinux-policy-mls-2.3.16-2 in permissive
hardware: 2 pseries lpars

I plan to run a stress test using labels with ipsec tonight.

Regards,
Joy

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 30+ messages in thread

end of thread, other threads:[~2006-10-04 19:14 UTC | newest]

Thread overview: 30+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-10-03  0:23 RHEL5 Kernel with labeled networking Eric Paris
2006-10-03 15:34 ` Linda Knippers
2006-10-03 15:41   ` Stephen Smalley
2006-10-03 15:51     ` Linda Knippers
2006-10-03 16:12       ` Linda Knippers
2006-10-03 15:45   ` Eric Paris
2006-10-03 16:08     ` James Morris
2006-10-03 16:24       ` Linda Knippers
2006-10-03 16:41         ` James Morris
2006-10-03 16:46           ` Linda Knippers
2006-10-03 16:46       ` Joshua Brindle
2006-10-03 19:29         ` Joshua Brindle
2006-10-04 14:09       ` [redhat-lspp] " Stephen Smalley
2006-10-04 19:04       ` Daniel J Walsh
2006-10-03 16:40 ` Paul Moore
  -- strict thread matches above, loose matches on Subject: below --
2006-10-03 17:16 Venkat Yekkirala
2006-10-03 18:37 Joy Latten
2006-10-03 19:18 ` Joshua Brindle
2006-10-03 19:16   ` Joy Latten
2006-10-03 20:40     ` Linda Knippers
2006-10-03 21:25       ` Joshua Brindle
2006-10-03 21:27         ` Linda Knippers
2006-10-03 21:30           ` Karl MacMillan
2006-10-03 21:47             ` Linda Knippers
2006-10-03 22:40               ` Joshua Brindle
2006-10-03 22:59                 ` Linda Knippers
2006-10-04 14:57                   ` Stephen Smalley
2006-10-04 15:20                     ` Linda Knippers
2006-10-03 21:28         ` Karl MacMillan
2006-10-04 19:01 Joy Latten

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.