One of the biggest differences between NetLabel and the labeled networking mechanisms of existing Trusted OSs is how outbound traffic is selected for labeling. Ever since NetLabel was first introduced in kernel 2.6.19 the on-the-wire outbound labeling protocol was determined by the label of the sending application's socket. Despite the departure
(
Read more... )
Comments 6
Reply
Reply
Reply
Some answers that should help:
1. The LSM "domain" is a term that has a different meaning depending on the LSM; for SELinux the "domain" would be the SELinux type or domain, e.g. unconfined_t.
2. I think the answer in #1 above should help answer this question.
3. Smack does things a bit differently than SELinux when it comes to NetLabel. When using Smack you should refrain from using the netlabelctl tool as the Smack kernel will handle all of the NetLabel configuration for you.
Good luck!
Reply
Reply
Here are the answers to your questions:
1. Yes, translation mode is only supported with tag type #1. It could be expanded to the other tag types, but it doesn't make as much sense for tag types #2 and #5; the translation mode was created as a workaround for the limited IPv4 header space.
2. No, wildcards are not presently supported.
3. It is entirely possible there is a limit or a bug in the NetLabel netlink code, we had a similar issue when dumping large numbers of static label configurations that was fixed recently. This is something we can look at, but I think it is best to first ask what you are trying to do, often times there may be another, easier solution ...
Reply
Leave a comment