Research Menu

.
Skip Search Box

SELinux Mailing List

Re: Question on networking accesses

From: Paul Moore <paul.moore_at_hp.com>
Date: Mon, 21 May 2007 14:20:04 -0400


On Monday, May 21 2007 12:07:21 pm Casey Schaufler wrote:
> --- Paul Moore <paul.moore@hp.com> wrote:
> > On Monday, May 21 2007 9:48:52 am Casey Schaufler wrote:
> > > I have what I hope is a fairly straitforward question on the SELinux
> > > networking model. Let's pretend that I have a process A that sends a
> > > UDP packet P to a second process B. From the viewpoint of access
> > > control is this:
> > >
> > > - process A writing to process B
> > > - process B reading from process A
> > > - process A creating packet P, and process B reading packet P
> > >
> > > some combination of the above, or something else entirely?
> > >
> > >From 10,000 feet up in the air that sounds roughly about right.
> > > Although if
> >
> > you are talking about labeled networking it can be a bit more involved,
> > especially if you are using labeled IPsec.
> >
> > Can you be a bit more specific?
>
> How about if I throw out an example. The evaluation team loved this
> one back in '92.

The example wasn't quite what I was hoping for as I'm still a little confused as to exactly what you are looking for. However, it's Monday and writing email is looking more attractive than real work so let me take a stab at explaining the network access controls from both a sender and receiver point of view. I'm certain I'll make a mistake or two, but hopefully somebody will point those out.

 A - sender without any form of labeled networking:

  1. The process must have write/send access to the socket
  2. The socket must have write/send access for the compat_net/SECMARK controls

 B - receiver without any form of labeled networking

  1. The packet's receiving socket must have read/recv access for the incoming packet based on the compat_net/SECMARK label
  2. The process must have read/recv access for the socket

 C - sender with labeled networking using NetLabel    (same as without any labeled networking, see "A")

 D - receiver with labeled networking using NetLabel

  1. The packet's receiving socket must have read/recv access for the incoming packet based on the compat_net/SECMARK label
  2. The packet's receiving socket must have read/recv access for the incoming packet based on the NetLabel security attributes
  3. The process must have read/recv access for the socket

It is a bit more complicated with labeled IPsec as you have to deal with labeled matching of the socket and SPD/SA but I'll leave that as an exercise for the reader.

-- 
paul moore
linux security @ hp

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Mon 21 May 2007 - 14:20:29 EDT
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service