Research
.
Skip Search Box

SELinux Mailing List

Re: Question on networking accesses

From: Paul Moore <paul.moore_at_hp.com>
Date: Tue, 22 May 2007 10:13:40 -0400


On Tuesday, May 22 2007 8:39:56 am Steve G wrote:
> The access
> control is mostly at the entry points to the transaction and not on a
> packet by packet basis (except perhaps udp where every packet is an entry
> point to the transaction).

Access control checks are performed on a packet by packet basis as it is received by the socket, see selinux_socket_sock_rcv_skb().

-- 
paul moore
linux security @ hp

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Tue 22 May 2007 - 10:13:54 EDT
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service