From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: <53FB35D2.3030307@tycho.nsa.gov> Date: Mon, 25 Aug 2014 09:10:42 -0400 From: Stephen Smalley MIME-Version: 1.0 To: "Stepan G. Fedorov" , Selinux@tycho.nsa.gov Subject: Re: semanage interface has no effect References: <53FB19C7.1040500@gmail.com> In-Reply-To: <53FB19C7.1040500@gmail.com> Content-Type: text/plain; charset=ISO-8859-1 List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: On 08/25/2014 07:11 AM, Stepan G. Fedorov wrote: > Hello! > > Goal of this experiment is to see allow rules for netif class objects is > working. > > I use debian wheezy whith MLS selinux policy, in enforced mode. > > eth0 is hte only netwotk interface, except lo. > > sesearch --allow -cnetif shows lots of allow rules for netif_t target > type / netif target class. > > I do: > 1) I add new type nginx_http_if_t with my own policy module; > 2) semanage interface -a -t nginx_http_if_t -r s1:c0.c1023 eth0. > > I expect: to see all the processes in system unable to read/write > packets from eth0 interface. > > I actually got: nothing changes - all networking is working as it was > before changing of interface context. > > > What am I doing/understanding wrong? Legacy network checks are gone; use peer labeling or secmark instead, http://paulmoore.livejournal.com/tag/documentation