On 4/12/2016 1:58 PM, Jason Gunthorpe wrote:
> On Tue, Apr 12, 2016 at 05:06:45PM +0000, Hefty, Sean wrote:
>>> Wouldn't QP1 require different access control than QP0 due to SA clients
>>> on every end node ?
>>
>> QP1 still allows modification of the fabric (e.g. multicast join) or
>> an DoS attack against the SA.  Though the latter probably requires
>> restricting how a UD QP may be used.
> 
> Right, I don't disagree we should have smp and gmp 'just in case'
> (fine names as well) labels, I just don't really understand why you'd
> trust something enough to grant gmp but not enough for smp...
> 
> Particularly encouraging people to grant gmp as though that was 'safe'
> is really bad advice.

I'm not sure what the motivation is either. The nature of the QP1 threat
is somewhat different from the QP0 threat. Only thing I can think of is
that it's hard to protect GMPs/QP1 since any UD QP can send to QP1.

-- Hal

> Which in turn makes me wonder why the umad dev node label is not
> sufficient.
> 
> Jason
> 
_______________________________________________
Selinux mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to [email protected].

Reply via email to