From: "Christopher J. PeBenito" <cpebenito@tresys.com>
To: Paul Moore <paul@paul-moore.com>
Cc: SELinux Mail List <selinux@tycho.nsa.gov>
Subject: Re: RFC: packet checks always on option
Date: Mon, 14 May 2012 08:52:29 -0400 [thread overview]
Message-ID: <4FB1000D.4040403@tresys.com> (raw)
In-Reply-To: <1540303.QUZeuyPSRI@sifl>
On 05/10/12 16:02, Paul Moore wrote:
> On Tuesday, May 08, 2012 12:58:00 PM Christopher J. PeBenito wrote:
>> I recently became aware that the packet checks are now disabled when there
>> are no SECMARK rules ...
>>
>> ... this behavior is "allow by default": the opposite of what SELinux stands
>> for. SELinux doesn't stop file checks if you mount an xattr filesystem that
>> has no labels. High assurance systems would actually want the old behavior
>> so that networking would be denied if:
>>
>> * iptables rules fail to load
>> * iptables rules maliciously flushed, e.g. by compromised domain that has
>> net_admin
>
> Ever since secmark was introduced it has required users/admins to ensure, via
> a secondary mechanism not contained within the SELinux policy, that the
> netfilter/iptables configuration was both correctly matched to the policy and
> that is was not tampered with, either maliciously or accidentally. Failure to
> do this verification and correctly configure netfilter/iptables could result
> in the mis-labeling of network traffic via the secmark label.
>
> This applies to both the current behavior and the "old" behavior.
>
> Simply going back to always applying the per-packet secmark access controls
> does nothing to solve the problem of ensuring correctness. This is my main
> problem with your argument.
I don't understand what correctness you're referring to. Labeling correctness? You always need that; thats the crux of having a proper running system. But we don't stop enforcing policy if its not correct. It sounds like you'd argue that if a filesystem with no labels is loaded that it should not have any enforcement. That relies on the VFS as a secondary mechanism.
>> * during boot and shutdown you can guarantee no network access
>
> You can do this through a variety of other mechanisms that have nothing to do
> with secmark labels.
No, you can't. None of them are enforceable as soon as the policy is loaded. Otherwise you have gaps in enforcement, which is not desired for some systems. The whole point of MAC systems is to reduce the trust in userspace code, and the above suggestion puts more trust in userspace code.
--
Chris PeBenito
Tresys Technology, LLC
www.tresys.com | oss.tresys.com
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2012-05-14 12:52 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-05-08 16:58 RFC: packet checks always on option Christopher J. PeBenito
2012-05-10 20:02 ` Paul Moore
2012-05-14 12:52 ` Christopher J. PeBenito [this message]
2012-05-14 15:35 ` Paul Moore
2012-05-14 16:42 ` Chad Hanson
2012-05-14 20:54 ` Paul Moore
2012-05-14 17:17 ` Stephen Smalley
2012-05-14 17:22 ` Stephen Smalley
2012-05-14 21:15 ` Paul Moore
2012-05-15 13:24 ` Christopher J. PeBenito
2012-05-15 14:13 ` Paul Moore
2012-05-15 14:47 ` Christopher J. PeBenito
2012-05-15 15:04 ` Paul Moore
2012-05-15 15:46 ` Christopher J. PeBenito
2012-05-15 18:45 ` Paul Moore
2012-05-17 14:06 ` david caplan
2012-05-17 14:42 ` Paul Moore
2012-05-17 15:31 ` david caplan
2012-05-17 16:51 ` Paul Moore
2012-05-16 2:18 ` Daniel J Walsh
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4FB1000D.4040403@tresys.com \
--to=cpebenito@tresys.com \
--cc=paul@paul-moore.com \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.