From: "Justin P. Mattock" <justinmattock@gmail.com>
To: Paul Moore <paul.moore@hp.com>
Cc: linux-kernel@vger.kernel.org, linux-wireless@vger.kernel.org,
SE-Linux <selinux@tycho.nsa.gov>
Subject: Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
Date: Wed, 14 Jan 2009 18:43:56 -0800 [thread overview]
Message-ID: <496EA2EC.7030602@gmail.com> (raw)
In-Reply-To: <200901141736.43805.paul.moore@hp.com>
Paul Moore wrote:
> On Wednesday 14 January 2009 4:35:25 pm Justin P. Mattock wrote:
>
>> Anyways heres what I'm trying to achieve:
>>
>> default looks like this:
>> Configured NetLabel domain mappings(1)
>> domain: DEFAULT
>> protocol: UNLABELED
>>
>> I want to try and have three of these for the
>> different types of media:
>> (in theory)
>> Configured NetLabel domain mappings(3)
>> domain:radio
>> protocol: UNLABELED
>> domain:T.V.
>> protocol: UNLABELED
>> domain:web
>> protocol: UNLABELED
>> (and if possible three different tags(either 1,2,5), but probably can
>> only do that with cipsov4);
>>
>
> Actually, in your case you are probably always going to want to send
> network traffic without any labels attached to the packets (no labeled
> IPsec or CIPSO) so you can stick with the default domain mapping
> configuration which sends all packets "unlabeled". The part you should
> be concerned about is the static/fallback configuration which assigns
> network peer labels to packets which do not have labels attached to
> them by the remote host.
>
> NOTE: the domain mapping configuration only controls how outbound
> network traffic is labeled on-the-wire; it "maps" the
> LSM/SELinux "domains" to a specific labeling protocol configuration,
> e.g. all apache_t traffic should be labeled with CIPSO DOI 3 while all
> firefox_t traffic should not be labeled at all.
>
>
>> heres what I've come up with so far:
>>
>> netlabelctl -p map del default
>>
>> netlabelctl unlbl add domain:radio interface:wlan0 address:<myadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>> netlabelctl unlbl add domain:radio interface:wlan0 address:<radioadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>>
>> netlabelctl unlbl add domain:T.V. interface:wlan0 address:<myadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>> netlabelctl unlbl add domain:T.V. interface:wlan0 address:<t.v.add>
>> label:system_u:object_r:netlabel_peer_t:s0
>>
>
> I think what you mean to type is the following:
>
> # netlabelctl unlbl add interface:wlan0 address:<radioadd> \
> label:system_u:object_r:netlabel_peer_t:s0
>
> ... note there is no "domain" argument, that only exists
> for "netlabelctl map ..." commands.
>
> NOTE: if you really want to get fancy you can create new SELinux domains
> for each type of media and add NetLabel configurations for those new
> domains. Imagine you create a new "internet_radio_t" domain/type and
> only allow the "netplayer_t" domain (yeah, I made that up but you get
> the point) access to network traffic labeled with internet_radio_t.
> You would then use the following command to label your incoming traffic
> with NetLabel:
>
> # netlabelctl unlbl add interface:wlan0 address:<radioadd> \
> label:system_u:object_r:internet_radio_t:s0
>
> NOTE: you can also skip the "interface:wlan0" argument and just
> use "default" instead if you want the configuration to apply to all
> your network interfaces; although bear in mind that the "default"
> configuration can be overridden by the interface specific
> configurations.
>
>
>> As for the new capabilities, I don't mind trying that out when
>> the time comes(but first I need to figure the this out before any
>> other ways);
>>
>
> No problem, I understand. Let me know if you have any more problems.
>
>
>> here is what the error looks like:
>>
>> netlabel_tools-0.19# make
>> INFO: creating the version header file
>> .: 10: version_info: not found
>> make: *** [include/version.h] Error 2
>>
>
> Huh, can you try the following:
>
> 1. Open the netlabel_tools-0.19/Makefile in your favorite editor
> 2. Change the ". version_info; \" line to "source ./version_info; \"
> 3. Save your changes
> 4. Try running "make" again
>
> Thanks.
>
>
O.k. changed . version like how you had posted.
The package compiled like a charm.
regards;
Justin P. Mattock
WARNING: multiple messages have this Message-ID (diff)
From: "Justin P. Mattock" <justinmattock@gmail.com>
To: Paul Moore <paul.moore@hp.com>
Cc: linux-kernel@vger.kernel.org, linux-wireless@vger.kernel.org,
SE-Linux <selinux@tycho.nsa.gov>
Subject: Re: netlabel: UNLABELED ath9k not denying unlabeled traffic
Date: Wed, 14 Jan 2009 18:43:56 -0800 [thread overview]
Message-ID: <496EA2EC.7030602@gmail.com> (raw)
In-Reply-To: <200901141736.43805.paul.moore@hp.com>
Paul Moore wrote:
> On Wednesday 14 January 2009 4:35:25 pm Justin P. Mattock wrote:
>
>> Anyways heres what I'm trying to achieve:
>>
>> default looks like this:
>> Configured NetLabel domain mappings(1)
>> domain: DEFAULT
>> protocol: UNLABELED
>>
>> I want to try and have three of these for the
>> different types of media:
>> (in theory)
>> Configured NetLabel domain mappings(3)
>> domain:radio
>> protocol: UNLABELED
>> domain:T.V.
>> protocol: UNLABELED
>> domain:web
>> protocol: UNLABELED
>> (and if possible three different tags(either 1,2,5), but probably can
>> only do that with cipsov4);
>>
>
> Actually, in your case you are probably always going to want to send
> network traffic without any labels attached to the packets (no labeled
> IPsec or CIPSO) so you can stick with the default domain mapping
> configuration which sends all packets "unlabeled". The part you should
> be concerned about is the static/fallback configuration which assigns
> network peer labels to packets which do not have labels attached to
> them by the remote host.
>
> NOTE: the domain mapping configuration only controls how outbound
> network traffic is labeled on-the-wire; it "maps" the
> LSM/SELinux "domains" to a specific labeling protocol configuration,
> e.g. all apache_t traffic should be labeled with CIPSO DOI 3 while all
> firefox_t traffic should not be labeled at all.
>
>
>> heres what I've come up with so far:
>>
>> netlabelctl -p map del default
>>
>> netlabelctl unlbl add domain:radio interface:wlan0 address:<myadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>> netlabelctl unlbl add domain:radio interface:wlan0 address:<radioadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>>
>> netlabelctl unlbl add domain:T.V. interface:wlan0 address:<myadd>
>> label:system_u:object_r:netlabel_peer_t:s0
>> netlabelctl unlbl add domain:T.V. interface:wlan0 address:<t.v.add>
>> label:system_u:object_r:netlabel_peer_t:s0
>>
>
> I think what you mean to type is the following:
>
> # netlabelctl unlbl add interface:wlan0 address:<radioadd> \
> label:system_u:object_r:netlabel_peer_t:s0
>
> ... note there is no "domain" argument, that only exists
> for "netlabelctl map ..." commands.
>
> NOTE: if you really want to get fancy you can create new SELinux domains
> for each type of media and add NetLabel configurations for those new
> domains. Imagine you create a new "internet_radio_t" domain/type and
> only allow the "netplayer_t" domain (yeah, I made that up but you get
> the point) access to network traffic labeled with internet_radio_t.
> You would then use the following command to label your incoming traffic
> with NetLabel:
>
> # netlabelctl unlbl add interface:wlan0 address:<radioadd> \
> label:system_u:object_r:internet_radio_t:s0
>
> NOTE: you can also skip the "interface:wlan0" argument and just
> use "default" instead if you want the configuration to apply to all
> your network interfaces; although bear in mind that the "default"
> configuration can be overridden by the interface specific
> configurations.
>
>
>> As for the new capabilities, I don't mind trying that out when
>> the time comes(but first I need to figure the this out before any
>> other ways);
>>
>
> No problem, I understand. Let me know if you have any more problems.
>
>
>> here is what the error looks like:
>>
>> netlabel_tools-0.19# make
>> INFO: creating the version header file
>> .: 10: version_info: not found
>> make: *** [include/version.h] Error 2
>>
>
> Huh, can you try the following:
>
> 1. Open the netlabel_tools-0.19/Makefile in your favorite editor
> 2. Change the ". version_info; \" line to "source ./version_info; \"
> 3. Save your changes
> 4. Try running "make" again
>
> Thanks.
>
>
O.k. changed . version like how you had posted.
The package compiled like a charm.
regards;
Justin P. Mattock
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2009-01-15 2:44 UTC|newest]
Thread overview: 38+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-01-14 5:18 netlabel: UNLABELED ath9k not denying unlabeled traffic Justin P. Mattock
2009-01-14 14:57 ` Paul Moore
2009-01-14 16:15 ` Justin P. Mattock
2009-01-14 16:15 ` Justin P. Mattock
2009-01-14 17:05 ` Paul Moore
2009-01-14 17:05 ` Paul Moore
2009-01-14 17:24 ` Stephen Smalley
2009-01-14 17:43 ` Paul Moore
2009-01-18 16:17 ` Eric Paris
2009-01-18 19:37 ` Justin P. Mattock
2009-01-14 17:32 ` Justin P. Mattock
2009-01-14 17:32 ` Justin P. Mattock
2009-01-14 20:04 ` Paul Moore
2009-01-14 20:04 ` Paul Moore
2009-01-14 20:08 ` Paul Moore
2009-01-14 20:08 ` Paul Moore
2009-01-14 21:35 ` Justin P. Mattock
2009-01-14 21:35 ` Justin P. Mattock
2009-01-14 22:36 ` Paul Moore
2009-01-14 22:36 ` Paul Moore
2009-01-15 1:54 ` Justin P. Mattock
2009-01-15 1:54 ` Justin P. Mattock
2009-01-15 17:45 ` Paul Moore
2009-01-15 17:45 ` Paul Moore
2009-01-15 2:43 ` Justin P. Mattock [this message]
2009-01-15 2:43 ` Justin P. Mattock
2009-01-15 17:46 ` Paul Moore
2009-01-15 17:46 ` Paul Moore
2009-01-15 22:00 ` Justin Mattock
2009-01-15 22:00 ` Justin Mattock
2009-01-15 22:52 ` Paul Moore
2009-01-15 22:52 ` Paul Moore
2009-01-16 0:44 ` Justin Mattock
2009-01-16 0:44 ` Justin Mattock
2009-01-16 16:09 ` Paul Moore
2009-01-16 16:09 ` Paul Moore
2009-01-16 17:18 ` Justin P. Mattock
2009-01-16 17:18 ` Justin P. Mattock
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=496EA2EC.7030602@gmail.com \
--to=justinmattock@gmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-wireless@vger.kernel.org \
--cc=paul.moore@hp.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.