From: Joshua Brindle <jbrindle@tresys.com>
To: James Morris <jmorris@namei.org>
Cc: Eric Paris <eparis@parisplace.org>,
Linda Knippers <linda.knippers@hp.com>,
selinux@tycho.nsa.gov, redhat-lspp@redhat.com, paul.moore@hp.com,
vyekkirala@TrustedCS.com
Subject: Re: RHEL5 Kernel with labeled networking
Date: Tue, 03 Oct 2006 12:46:46 -0400 [thread overview]
Message-ID: <452293F6.2050304@tresys.com> (raw)
In-Reply-To: <Pine.LNX.4.64.0610031207260.21081@d.namei>
James Morris wrote:
> On Tue, 3 Oct 2006, Eric Paris wrote:
>
>
>> I think there is going to need to be a policy change that I'm actually
>> talking with Dan about as I type this e-mail. I think we need
>>
>> allow $1 unlabeled_t:packet { flow_in flow_out };
>>
>> to be added to policy to allow things to work as they did. I'll post
>> again as soon as we have a policy that appears to let normal networking
>> work in enforcing.
>>
>
> We need this policy in rawhide before the kernel patches are merged
> upstream, so we can note the required policy version associated with the
> patches. We've do not want to kill Andrew Morton's box again with this
> kind of thing.
>
>
Using these kernels I'm getting some interesting denials. I labeled the
spd's with system_u:object_r:ipsec_spd_t:s0 so that it would be
discernible from any socket contexts that may appear.
First I had to add a polmatch rule for unconfined_t to ipsec_spd_t, so
far it makes sense.
Next I need polmatch on unconfined_t to unconfined_t, I assume this is
because the SA is going to be labeled unconfined_t, seems reasonable.
Racoon also needed setcontext for unconfined_t unconfined_t (not sure
what the source and target mean here)
the denial I totally don't understand is:
audit(1159877238.937:35): avc: denied { polmatch } for
scontext=system_u:object_r:unlabeled_t:s0
tcontext=root:system_r:unconfined_t:s0-s0:c0.c255 tclass=association
there is no unlabeled anything, except for a non-ipsec connection which
isn't being used, I don't understand how this would happen at all.
After all that it isn't working as expected. the SA's get set up
correctly based on the initiators socket (I'm using semanage_t in this
case) but the reciever SA's aren't set up with the receiving process
socket context so I get:
Received: Hello, root:system_r:semanage_t:s0-s0:c0.c255 from
root:system_r:semanage_t:s0-s0:c0.c255
no matter what context the server is running in.
Further, once that SA is created all domains can use it and it retains
the same context, if I rerun the client in unconfined_t I still get:
Received: Hello, root:system_r:semanage_t:s0-s0:c0.c255 from
root:system_r:semanage_t:s0-s0:c0.c255
I am running in permissive (I'd hope that wouldn't affect this but I can
see how it could) because my policy doesn't yet have flow_in and
flow_out permissions (any chance to get a policy patch? :) )
Am I off base here, is this the expected results?
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2006-10-03 16:47 UTC|newest]
Thread overview: 30+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-10-03 0:23 RHEL5 Kernel with labeled networking Eric Paris
2006-10-03 15:34 ` Linda Knippers
2006-10-03 15:41 ` Stephen Smalley
2006-10-03 15:51 ` Linda Knippers
2006-10-03 16:12 ` Linda Knippers
2006-10-03 15:45 ` Eric Paris
2006-10-03 16:08 ` James Morris
2006-10-03 16:24 ` Linda Knippers
2006-10-03 16:41 ` James Morris
2006-10-03 16:46 ` Linda Knippers
2006-10-03 16:46 ` Joshua Brindle [this message]
2006-10-03 19:29 ` Joshua Brindle
2006-10-04 14:09 ` [redhat-lspp] " Stephen Smalley
2006-10-04 19:04 ` Daniel J Walsh
2006-10-03 16:40 ` Paul Moore
-- strict thread matches above, loose matches on Subject: below --
2006-10-03 17:16 Venkat Yekkirala
2006-10-03 18:37 Joy Latten
2006-10-03 19:18 ` Joshua Brindle
2006-10-03 19:16 ` Joy Latten
2006-10-03 20:40 ` Linda Knippers
2006-10-03 21:25 ` Joshua Brindle
2006-10-03 21:27 ` Linda Knippers
2006-10-03 21:30 ` Karl MacMillan
2006-10-03 21:47 ` Linda Knippers
2006-10-03 22:40 ` Joshua Brindle
2006-10-03 22:59 ` Linda Knippers
2006-10-04 14:57 ` Stephen Smalley
2006-10-04 15:20 ` Linda Knippers
2006-10-03 21:28 ` Karl MacMillan
2006-10-04 19:01 Joy Latten
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=452293F6.2050304@tresys.com \
--to=jbrindle@tresys.com \
--cc=eparis@parisplace.org \
--cc=jmorris@namei.org \
--cc=linda.knippers@hp.com \
--cc=paul.moore@hp.com \
--cc=redhat-lspp@redhat.com \
--cc=selinux@tycho.nsa.gov \
--cc=vyekkirala@TrustedCS.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.