Christopher J. PeBenito wrote:
> On Wed, 2006-10-04 at 10:33 -0400, Paul Moore wrote:
> 
>>Venkat Yekkirala wrote:
>>
>>>The following replaces unlabeled_t with network_t for
>>>better characterization of the flow out/in checks in
>>>SELinux, as well as to allow for mls packets to
>>>flow out/in from the network since network_t would allow
>>>the full range of MLS labels, as opposed to the unlabeled init sid
>>>that only allows system-hi.
>>>
>>>Signed-off-by: Venkat Yekkirala <[EMAIL PROTECTED]>
>>>---
>>>This is an incremental patch the secid-reconcilation v4 patchset.
>>>
>>>--- net-2.6.sid3/security/selinux/hooks.c    2006-10-01 15:43:12.000000000 
>>>-0500
>>>+++ net-2.6/security/selinux/hooks.c 2006-10-03 16:43:21.000000000 -0500
>>>@@ -3703,7 +3703,8 @@ static int selinux_skb_flow_in(struct sk
>>>     err = selinux_xfrm_decode_session(skb, &xfrm_sid, 0);
>>>     BUG_ON(err);
>>> 
>>>-    err = avc_has_perm(xfrm_sid, skb->secmark, SECCLASS_PACKET,
>>>+    err = avc_has_perm(xfrm_sid, skb->secmark? : SECINITSID_NETMSG,
>>>+                                    SECCLASS_PACKET,
>>>                                     PACKET__FLOW_IN, NULL);
>>>     if (err)
>>>             goto out;
>>>@@ -3900,7 +3901,7 @@ static unsigned int selinux_ip_postroute
>>>                             skb->secmark = sksec->sid;
>>>                     }
>>>             }
>>>-            err = avc_has_perm(skb->secmark, SECINITSID_UNLABELED,
>>>+            err = avc_has_perm(skb->secmark, SECINITSID_NETMSG,
>>>                                SECCLASS_PACKET, PACKET__FLOW_OUT, &ad);
>>>     }
>>> out:
>>
>>Considering the above change, I wonder if it would also make sense to
>>update the secmark to SECINITSID_UNLABELED in the abscence of any
>>external labeling (labeled IPsec or NetLabel)?
>  
> Wouldn't that make secmark useless in the non labeled networking case?
> 

Sorry, I didn't do a very good job explaining things in my first email
so let me try it again ...

If there is no external labeling, i.e. labeled IPsec or NetLabel, *and*
the secmark is equal to zero/SECSID_NULL I think it might be a good idea
to set the secmark to SECINITSID_NETMSG.

This not affect either local or external labels if they are present, but
if both are not it would give the secmark some meaningful value.

-- 
paul moore
linux security @ hp
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to