RE: [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates

2006-08-25 Thread Venkat Yekkirala
> I like these changes, but wondering why you haven't supplied > code for the > outbound case ? > > > - James The code for the outbound is still in the works. I hope to have it out in a week or so. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to

RE: [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates

2006-08-25 Thread James Morris
On Fri, 25 Aug 2006, Venkat Yekkirala wrote: > > I like these changes, but wondering why you haven't supplied > > code for the > > outbound case ? > > > > > > - James > > The code for the outbound is still in the works. I hope to have it > out in a week or so. Ok, I guess we should wait unti

Re: [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates

2006-08-30 Thread Paul Moore
James Morris wrote: > On Fri, 25 Aug 2006, Venkat Yekkirala wrote: >>>I like these changes, but wondering why you haven't supplied >>>code for the >>>outbound case ? >> >>The code for the outbound is still in the works. I hope to have it >>out in a week or so. > > Ok, I guess we should wait unti

RE: [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates

2006-08-31 Thread Venkat Yekkirala
> My main concern with these patches is that moving the > NetLabel check out > of selinux_socket_sock_rcv_skb() and into > selinux_skb_policy_check() (as > it is currently written) would force us to compare a packet's NetLabel > with either the IPsec label or the secmark label Yes you would do t

Re: [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates

2006-08-31 Thread Paul Moore
Venkat Yekkirala wrote: >>My main concern with these patches is that moving the >>NetLabel check out >>of selinux_socket_sock_rcv_skb() and into >>selinux_skb_policy_check() (as >>it is currently written) would force us to compare a packet's NetLabel >>with either the IPsec label or the secmark l

RE: [PATCH 0/3] secid reconciliation-v01: Repost patchset with up dates

2006-08-31 Thread Venkat Yekkirala
> Assuming the permission is granted the packet's secmark is > replaced with > the updated context. This updated secmark context would then > be used in > sock_rcv_skb() to make an access decision, yes? You got it. > > >> The ability to make access decisions based on the process > >>consuming