On Mon, 2006-08-07 at 15:37 -0400, Paul Moore wrote: 
> I spent an hour this afternoon with the latest NetLabel patch and Klaus'
> original "toy" policy module trying to "flesh it out a bit".  The
> resulting policy file is attached (as well as a simple Makefile to build
> and install the module).  I will caution people that I haven't done much
> testing with this new policy module yet but what I have done, mostly
> running 'netlabelctl' seems to work well enough.


> # sending NetLabel'd packets does not require a SELinux privilege, however,
> #   receiving NetLabel'd packets does
> allow user_t user_t:{ tcp_socket udp_socket } { recv_msg };
> allow staff_t staff_t:{ tcp_socket udp_socket } { recv_msg };
> allow sysadm_t sysadm_t:{ tcp_socket udp_socket } { recv_msg };

Do we really want to overload this permission?  It is still being used
for send/receive on ports, e.g., 

allow httpd_t port_type:tcp_socket { send_msg recv_msg };

I realize these port perms are deprecated by secmark; however, these
rules will still be around for a while for compatability.

> # netlink communications
> allow netlabelctl_t self:netlink_socket { create bind write read };

This is like the generic socket; we don't want generic netlink sockets
either, we want all sockets to be specific.  Netlink_socket is just a
fallback for unspecified netlink sockets.

-- 
Chris PeBenito
Tresys Technology, LLC
(410) 290-1411 x150

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to