From: "Justin P. Mattock" <justinmattock@gmail.com>
To: Paul Moore <paul.moore@hp.com>
Cc: linux-kernel@vger.kernel.org, linux-wireless@vger.kernel.org,
SE-Linux <selinux@tycho.nsa.gov>
Subject: Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
Date: Wed, 14 Jan 2009 17:54:22 -0800 [thread overview]
Message-ID: <496E974E.1040806@gmail.com> (raw)
In-Reply-To: <200901141736.43805.paul.moore@hp.com>
Paul Moore wrote:
> On Wednesday 14 January 2009 4:35:25 pm Justin P. Mattock wrote:
>
>> Anyways heres what I'm trying to achieve:
>>
>> default looks like this:
>> Configured NetLabel domain mappings(1)
>> domain: DEFAULT
>> protocol: UNLABELED
>>
>> I want to try and have three of these for the
>> different types of media:
>> (in theory)
>> Configured NetLabel domain mappings(3)
>> domain:radio
>> protocol: UNLABELED
>> domain:T.V.
>> protocol: UNLABELED
>> domain:web
>> protocol: UNLABELED
>> (and if possible three different tags(either 1,2,5), but probably can
>> only do that with cipsov4);
>>
>
>
apologize for the slow response
(had to do some external activities);
> Actually, in your case you are probably always going to want to send
> network traffic without any labels attached to the packets (no labeled
> IPsec or CIPSO) so you can stick with the default domain mapping
> configuration which sends all packets "unlabeled". The part you should
> be concerned about is the static/fallback configuration which assigns
> network peer labels to packets which do not have labels attached to
> them by the remote host.
>
sure would be nice to use ipsec/cipsov4 with a internet radio.
(lock down that tcp line);
I'll have to look into making sure I have static/fallback
configured correctly.
> NOTE: the domain mapping configuration only controls how outbound
> network traffic is labeled on-the-wire; it "maps" the
> LSM/SELinux "domains" to a specific labeling protocol configuration,
> e.g. all apache_t traffic should be labeled with CIPSO DOI 3 while all
> firefox_t traffic should not be labeled at all.
>
>
>> heres what I've come up with so far:
>>
>> netlabelctl -p map del default
>>
>> netlabelctl unlbl add domain:radio interface:wlan0 address:<myadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>> netlabelctl unlbl add domain:radio interface:wlan0 address:<radioadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>>
>> netlabelctl unlbl add domain:T.V. interface:wlan0 address:<myadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>> netlabelctl unlbl add domain:T.V. interface:wlan0 address:<t.v.add>
>> label:system_u:object_r:netlabel_peer_t:s0
>>
>
> I think what you mean to type is the following:
>
> # netlabelctl unlbl add interface:wlan0 address:<radioadd> \
> label:system_u:object_r:netlabel_peer_t:s0
>
> ... note there is no "domain" argument, that only exists
> for "netlabelctl map ..." commands.
>
> NOTE: if you really want to get fancy you can create new SELinux domains
> for each type of media and add NetLabel configurations for those new
> domains. Imagine you create a new "internet_radio_t" domain/type and
> only allow the "netplayer_t" domain (yeah, I made that up but you get
> the point) access to network traffic labeled with internet_radio_t.
> You would then use the following command to label your incoming traffic
> with NetLabel:
>
> # netlabelctl unlbl add interface:wlan0 address:<radioadd> \
> label:system_u:object_r:internet_radio_t:s0
>
> NOTE: you can also skip the "interface:wlan0" argument and just
> use "default" instead if you want the configuration to apply to all
> your network interfaces; although bear in mind that the "default"
> configuration can be overridden by the interface specific
> configurations.
>
>
Alright, I thought you could use the map option for unlbl.
>> As for the new capabilities, I don't mind trying that out when
>> the time comes(but first I need to figure the this out before any
>> other ways);
>>
>
> No problem, I understand. Let me know if you have any more problems.
>
>
>> here is what the error looks like:
>>
>> netlabel_tools-0.19# make
>> INFO: creating the version header file
>> .: 10: version_info: not found
>> make: *** [include/version.h] Error 2
>>
>
> Huh, can you try the following:
>
> 1. Open the netlabel_tools-0.19/Makefile in your favorite editor
> 2. Change the ". version_info; \" line to "source ./version_info; \"
> 3. Save your changes
> 4. Try running "make" again
>
> Thanks.
>
>
Thanks for the info,
Ill try this right away and let you know
if the package compiles.
regards;
Justin P. Mattock
WARNING: multiple messages have this Message-ID (diff)
From: "Justin P. Mattock" <justinmattock@gmail.com>
To: Paul Moore <paul.moore@hp.com>
Cc: linux-kernel@vger.kernel.org, linux-wireless@vger.kernel.org,
SE-Linux <selinux@tycho.nsa.gov>
Subject: Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
Date: Wed, 14 Jan 2009 17:54:22 -0800 [thread overview]
Message-ID: <496E974E.1040806@gmail.com> (raw)
In-Reply-To: <200901141736.43805.paul.moore@hp.com>
Paul Moore wrote:
> On Wednesday 14 January 2009 4:35:25 pm Justin P. Mattock wrote:
>
>> Anyways heres what I'm trying to achieve:
>>
>> default looks like this:
>> Configured NetLabel domain mappings(1)
>> domain: DEFAULT
>> protocol: UNLABELED
>>
>> I want to try and have three of these for the
>> different types of media:
>> (in theory)
>> Configured NetLabel domain mappings(3)
>> domain:radio
>> protocol: UNLABELED
>> domain:T.V.
>> protocol: UNLABELED
>> domain:web
>> protocol: UNLABELED
>> (and if possible three different tags(either 1,2,5), but probably can
>> only do that with cipsov4);
>>
>
>
apologize for the slow response
(had to do some external activities);
> Actually, in your case you are probably always going to want to send
> network traffic without any labels attached to the packets (no labeled
> IPsec or CIPSO) so you can stick with the default domain mapping
> configuration which sends all packets "unlabeled". The part you should
> be concerned about is the static/fallback configuration which assigns
> network peer labels to packets which do not have labels attached to
> them by the remote host.
>
sure would be nice to use ipsec/cipsov4 with a internet radio.
(lock down that tcp line);
I'll have to look into making sure I have static/fallback
configured correctly.
> NOTE: the domain mapping configuration only controls how outbound
> network traffic is labeled on-the-wire; it "maps" the
> LSM/SELinux "domains" to a specific labeling protocol configuration,
> e.g. all apache_t traffic should be labeled with CIPSO DOI 3 while all
> firefox_t traffic should not be labeled at all.
>
>
>> heres what I've come up with so far:
>>
>> netlabelctl -p map del default
>>
>> netlabelctl unlbl add domain:radio interface:wlan0 address:<myadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>> netlabelctl unlbl add domain:radio interface:wlan0 address:<radioadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>>
>> netlabelctl unlbl add domain:T.V. interface:wlan0 address:<myadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>> netlabelctl unlbl add domain:T.V. interface:wlan0 address:<t.v.add>
>> label:system_u:object_r:netlabel_peer_t:s0
>>
>
> I think what you mean to type is the following:
>
> # netlabelctl unlbl add interface:wlan0 address:<radioadd> \
> label:system_u:object_r:netlabel_peer_t:s0
>
> ... note there is no "domain" argument, that only exists
> for "netlabelctl map ..." commands.
>
> NOTE: if you really want to get fancy you can create new SELinux domains
> for each type of media and add NetLabel configurations for those new
> domains. Imagine you create a new "internet_radio_t" domain/type and
> only allow the "netplayer_t" domain (yeah, I made that up but you get
> the point) access to network traffic labeled with internet_radio_t.
> You would then use the following command to label your incoming traffic
> with NetLabel:
>
> # netlabelctl unlbl add interface:wlan0 address:<radioadd> \
> label:system_u:object_r:internet_radio_t:s0
>
> NOTE: you can also skip the "interface:wlan0" argument and just
> use "default" instead if you want the configuration to apply to all
> your network interfaces; although bear in mind that the "default"
> configuration can be overridden by the interface specific
> configurations.
>
>
Alright, I thought you could use the map option for unlbl.
>> As for the new capabilities, I don't mind trying that out when
>> the time comes(but first I need to figure the this out before any
>> other ways);
>>
>
> No problem, I understand. Let me know if you have any more problems.
>
>
>> here is what the error looks like:
>>
>> netlabel_tools-0.19# make
>> INFO: creating the version header file
>> .: 10: version_info: not found
>> make: *** [include/version.h] Error 2
>>
>
> Huh, can you try the following:
>
> 1. Open the netlabel_tools-0.19/Makefile in your favorite editor
> 2. Change the ". version_info; \" line to "source ./version_info; \"
> 3. Save your changes
> 4. Try running "make" again
>
> Thanks.
>
>
Thanks for the info,
Ill try this right away and let you know
if the package compiles.
regards;
Justin P. Mattock
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2009-01-15 1:54 UTC|newest]
Thread overview: 38+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-01-14 5:18 netlabel: UNLABELED ath9k not denying unlabeled traffic Justin P. Mattock
2009-01-14 14:57 ` Paul Moore
2009-01-14 16:15 ` Justin P. Mattock
2009-01-14 16:15 ` Justin P. Mattock
2009-01-14 17:05 ` Paul Moore
2009-01-14 17:05 ` Paul Moore
2009-01-14 17:24 ` Stephen Smalley
2009-01-14 17:43 ` Paul Moore
2009-01-18 16:17 ` Eric Paris
2009-01-18 19:37 ` Justin P. Mattock
2009-01-14 17:32 ` Justin P. Mattock
2009-01-14 17:32 ` Justin P. Mattock
2009-01-14 20:04 ` Paul Moore
2009-01-14 20:04 ` Paul Moore
2009-01-14 20:08 ` Paul Moore
2009-01-14 20:08 ` Paul Moore
2009-01-14 21:35 ` Justin P. Mattock
2009-01-14 21:35 ` Justin P. Mattock
2009-01-14 22:36 ` Paul Moore
2009-01-14 22:36 ` Paul Moore
2009-01-15 1:54 ` Justin P. Mattock [this message]
2009-01-15 1:54 ` Justin P. Mattock
2009-01-15 17:45 ` Paul Moore
2009-01-15 17:45 ` Paul Moore
2009-01-15 2:43 ` Justin P. Mattock
2009-01-15 2:43 ` Justin P. Mattock
2009-01-15 17:46 ` Paul Moore
2009-01-15 17:46 ` Paul Moore
2009-01-15 22:00 ` Justin Mattock
2009-01-15 22:00 ` Justin Mattock
2009-01-15 22:52 ` Paul Moore
2009-01-15 22:52 ` Paul Moore
2009-01-16 0:44 ` Justin Mattock
2009-01-16 0:44 ` Justin Mattock
2009-01-16 16:09 ` Paul Moore
2009-01-16 16:09 ` Paul Moore
2009-01-16 17:18 ` Justin P. Mattock
2009-01-16 17:18 ` Justin P. Mattock
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=496E974E.1040806@gmail.com \
--to=justinmattock@gmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-wireless@vger.kernel.org \
--cc=paul.moore@hp.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.