James Morris wrote:
For example, SELinux will now be able to utilize connection tracking, so that only packets which are known to be valid for a specific connection will be allowed to reach the subject.

Sample iptables rules for labeling packets are at:
http://people.redhat.com/jmorris/selinux/secmark/rules/

And examples of new policy controls may be found here:
http://people.redhat.com/jmorris/selinux/secmark/policy/
It looks like you are labeling all packets on an established connection as tracked_packet_t. What is the rationale for not labeling all ftp traffic as ftpd_packet_t? Granted that its very unlikely for established connections to go to the wrong process but the SELinux policy should be able to clearly show that ftpd and sshd cannot see each others packets but these policies say that they can both send/receive tracked_packet_t.

Obviously these are just examples, I'm just curious if there was a reason to label established packets differently from the new connection packets (and the same as all the other established packets)

I imagine that, at least at first, it would be good to have allow domain unlabeled_t:packet { send recv }; in an (enabled) conditional so that the migration will be easier.

Also, we need to come up with a mechanism for distributing default marking rules that can accompany a policy. The rules could go into a section in the .pp file but how does that integrate with various firewall systems that take control of the iptables rules?

And finally, what happens if the labeling rule changes during an established connection? Do the packets related to that connection retain the original label or will they get the new label?

Thanks, this will be very beneficial to the SELinux community
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to