Skip to content

Commit

Permalink
NetLabel: Introduce static network labels for unlabeled connections
Browse files Browse the repository at this point in the history
Most trusted OSs, with the exception of Linux, have the ability to specify
static security labels for unlabeled networks.  This patch adds this ability to
the NetLabel packet labeling framework.

If the NetLabel subsystem is called to determine the security attributes of an
incoming packet it first checks to see if any recognized NetLabel packet
labeling protocols are in-use on the packet.  If none can be found then the
unlabled connection table is queried and based on the packets incoming
interface and address it is matched with a security label as configured by the
administrator using the netlabel_tools package.  The matching security label is
returned to the caller just as if the packet was explicitly labeled using a
labeling protocol.

Signed-off-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: James Morris <jmorris@namei.org>
  • Loading branch information
pcmoore authored and James Morris committed Jan 29, 2008
1 parent 5dbe1eb commit 8cc4457
Show file tree
Hide file tree
Showing 4 changed files with 1,524 additions and 18 deletions.
6 changes: 5 additions & 1 deletion include/net/netlabel.h
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,11 @@
* NetLabel NETLINK protocol
*/

#define NETLBL_PROTO_VERSION 1
/* NetLabel NETLINK protocol version
* 1: initial version
* 2: added static labels for unlabeled connections
*/
#define NETLBL_PROTO_VERSION 2

/* NetLabel NETLINK types/families */
#define NETLBL_NLTYPE_NONE 0
Expand Down
16 changes: 7 additions & 9 deletions net/netlabel/netlabel_kapi.c
Original file line number Diff line number Diff line change
Expand Up @@ -312,21 +312,15 @@ int netlbl_sock_setattr(struct sock *sk,
* @secattr: the security attributes
*
* Description:
* Examines the given sock to see any NetLabel style labeling has been
* Examines the given sock to see if any NetLabel style labeling has been
* applied to the sock, if so it parses the socket label and returns the
* security attributes in @secattr. Returns zero on success, negative values
* on failure.
*
*/
int netlbl_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
{
int ret_val;

ret_val = cipso_v4_sock_getattr(sk, secattr);
if (ret_val == 0)
return 0;

return netlbl_unlabel_getattr(secattr);
return cipso_v4_sock_getattr(sk, secattr);
}

/**
Expand All @@ -350,7 +344,7 @@ int netlbl_skbuff_getattr(const struct sk_buff *skb,
cipso_v4_skbuff_getattr(skb, secattr) == 0)
return 0;

return netlbl_unlabel_getattr(secattr);
return netlbl_unlabel_getattr(skb, family, secattr);
}

/**
Expand Down Expand Up @@ -434,6 +428,10 @@ static int __init netlbl_init(void)
if (ret_val != 0)
goto init_failure;

ret_val = netlbl_unlabel_init(NETLBL_UNLHSH_BITSIZE);
if (ret_val != 0)
goto init_failure;

ret_val = netlbl_netlink_init();
if (ret_val != 0)
goto init_failure;
Expand Down
Loading

0 comments on commit 8cc4457

Please sign in to comment.