netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* RE: [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates
@ 2006-08-31 14:08 Venkat Yekkirala
  2006-08-31 14:45 ` Paul Moore
  0 siblings, 1 reply; 6+ messages in thread
From: Venkat Yekkirala @ 2006-08-31 14:08 UTC (permalink / raw)
  To: Paul Moore
  Cc: James Morris, netdev, selinux, Stephen Smalley, Chad Hanson,
	David S. Miller

> My main concern with these patches is that moving the 
> NetLabel check out
> of selinux_socket_sock_rcv_skb() and into 
> selinux_skb_policy_check() (as
> it is currently written) would force us to compare a packet's NetLabel
> with either the IPsec label or the secmark label

Yes you would do these checks (while using a netlabel based off of the
secmark at that point) to enforce flow control and when they succeed,
you will copy netlabel into secmark.

> and not the socket's
> label.

The socket Vs. secmark check that happens later in rcv_skb will in fact be
looking at the cipso label that is by then a part of the secmark context.

>  The ability to make access decisions based on the process
> consuming the data and the data itself it one of the nicer 
> qualities of
> NetLabel in my opinion.

This nicer quality ends up being preserved as explained above :)

We just need to get out of the mindset of viewing netlabel separately
once we are past the reconciliation point.

^ permalink raw reply	[flat|nested] 6+ messages in thread
* RE: [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates
@ 2006-08-31 15:13 Venkat Yekkirala
  0 siblings, 0 replies; 6+ messages in thread
From: Venkat Yekkirala @ 2006-08-31 15:13 UTC (permalink / raw)
  To: Paul Moore, Venkat Yekkirala
  Cc: James Morris, netdev, selinux, Stephen Smalley, Chad Hanson,
	David S. Miller

> Assuming the permission is granted the packet's secmark is 
> replaced with
> the updated context.  This updated secmark context would then 
> be used in
> sock_rcv_skb() to make an access decision, yes?

You got it.

> 
> >> The ability to make access decisions based on the process
> >>consuming the data and the data itself it one of the nicer 
> >>qualities of
> >>NetLabel in my opinion.
> > 
> > This nicer quality ends up being preserved as explained above :)
> 
> It wasn't clear to me from your patch or the "master plan" what you
> intended to do with the NetLabel context.  I thought the "/* See if
> CIPSO can flow in thru the current secmark here */" comment in your
> patch was rather cryptic.

That was a test for you :)
> 
> > We just need to get out of the mindset of viewing netlabel 
> separately
> > once we are past the reconciliation point.
> 
> Agreed.  Although to be honest, I think the NetLabel context can be
> reconciled with the secmark and XFRM contexts just as easily using the
> existing sock_rcv_skb() hook.

Nope. That won't work for forwarded traffic.

>  I guess I need to see where the
> xfrm[4|6]_policy_check() hooks are called from in the stack to better
> understand ...

You are on the right path here.

^ permalink raw reply	[flat|nested] 6+ messages in thread
* RE: [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates
@ 2006-08-25 13:30 Venkat Yekkirala
  2006-08-25 14:26 ` James Morris
  0 siblings, 1 reply; 6+ messages in thread
From: Venkat Yekkirala @ 2006-08-25 13:30 UTC (permalink / raw)
  To: James Morris; +Cc: netdev, selinux, sds, Chad Hanson

> I like these changes, but wondering why you haven't supplied 
> code for the 
> outbound case ?
> 
> 
> - James

The code for the outbound is still in the works. I hope to have it
out in a week or so.

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2006-08-31 15:13 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-08-31 14:08 [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates Venkat Yekkirala
2006-08-31 14:45 ` Paul Moore
  -- strict thread matches above, loose matches on Subject: below --
2006-08-31 15:13 Venkat Yekkirala
2006-08-25 13:30 Venkat Yekkirala
2006-08-25 14:26 ` James Morris
2006-08-30 20:21   ` Paul Moore

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).