[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2896613.2hnUueFeeu@sifl>
Date: Wed, 23 Dec 2015 15:05:24 -0500
From: Paul Moore <paul@...l-moore.com>
To: Marcelo Ricardo Leitner <mleitner@...hat.com>
Cc: netdev@...r.kernel.org, cluster-devel@...hat.com,
teigland@...hat.com, Neil Horman <nhorman@...driver.com>,
Vlad Yasevich <vyasevich@...il.com>, selinux@...ho.nsa.gov,
linux-security-module@...r.kernel.org
Subject: Re: [PATCH net] sctp: label accepted/peeled off sockets
On Wednesday, December 23, 2015 04:44:09 PM Marcelo Ricardo Leitner wrote:
> From: Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
>
> Accepted or peeled off sockets were missing a security label (e.g.
> SELinux) which means that socket was in "unlabeled" state.
>
> This patch clones the sock's label from the parent sock and resolves the
> issue (similar to AF_BLUETOOTH protocol family).
>
> Cc: Paul Moore <pmoore@...hat.com>
> Cc: David Teigland <teigland@...hat.com>
> Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
> ---
> net/sctp/socket.c | 2 ++
> 1 file changed, 2 insertions(+)
[NOTE: added the LSM and SELinux lists to the CC line as a FYI]
Proper SCTP support is on the SELinux todo list, but in the meantime it looks
like the patch below should at least ensure that SCTP sockets inherit their
parent's label which is probably the best we can hope for right now.
Acked-by: Paul Moore <paul@...l-moore.com>
> diff --git a/net/sctp/socket.c b/net/sctp/socket.c
> index
> 400a14d744834c7a503b338bc68f5f8b5b5dae8e..b67162767b7957b3e9f4f7bf52ab51fc1
> a3499c8 100644 --- a/net/sctp/socket.c
> +++ b/net/sctp/socket.c
> @@ -7202,6 +7202,8 @@ void sctp_copy_sock(struct sock *newsk, struct sock
> *sk,
>
> if (newsk->sk_flags & SK_FLAGS_TIMESTAMP)
> net_enable_timestamp();
> +
> + security_sk_clone(sk, newsk);
> }
>
> static inline void sctp_copy_descendant(struct sock *sk_to,
--
paul moore
www.paul-moore.com
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists