On Mon, 17 Apr 2006, [EMAIL PROTECTED] wrote:

> Secmark, or skfilter is exactly what fireflier needs to solve the shared 
> socket issue. Thanks for working on this. If this gets integrated in 
> mainline, fireflier LSM will be dropped.

I think you probably need skfilter as a standalone option.

> Is it possible to have an SELinux policy that reinjects the packets if didn't 
> match any rules?
> I.e. if a program that listens on port 80 doesn't have access to the packet, 
> (because it doesn't have the proper domain,)
> and the SELinux won't allow the program to read the packet: is it possible to 
> reinject this packet in the netfilter chain,
> instead of dropping it?
> 
> This would allow creating rules interactively (fireflier). 

This could be done with nfqueue, modular policy and a pretty simple tool.  

Although, nfqueue doesn't work at the socket layer (but perhaps would with 
skfilter).

> What does the secmark currently do with packets that aren't allowed by policy 
> to be received?

Under SELinux, they'd be silently dropped.

> P.S.: Where can I get the full secmark patches, so I can test them to see if 
> they really fit my needs?
> Do you have an estimate timeline for mainline integration? (in terms of n 
> weeks, m months)

The rest of the secmark related patches don't exist yet, I posted the core 
changes needed, and the others will be SELinux-specific.  Mainline 
integration would hopefully be 2.6.18, if it all works out ok.


If you're looking for skfilter:
http://people.redhat.com/jmorris/selinux/skfilter/

Patrick McHardy has some ideas on resolving some of the skfilter issues.


- James
-- 
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to