Mikel L. Matthews wrote:
> Paul Moore wrote:
>>James Morris wrote:
>>>On Thu, 25 May 2006, Paul Moore wrote:
>>>
>>>>This patch introduces a new kernel feature designed to support labeled
>>>>networking protocols such as RIPSO and CIPSO.  These protocols are required 
>>>>to
>>>>interoperate with existing "trusted" operating systems such as Trusted
>>>>Solaris.
>>>
>>>A few initial comments.
>>>
>>>- Did you decide that you definitely need to verify labels on fragments?  
>>>
>>>I can see the code's been added to do that, but wonder about a comment 
>>>made during earlier discussion that mislabeled fragments could only come 
>>>from a misbehaving trusted system.  What is the threat model here?
>>>
>>
>>This is one part of the patch that I really don't have a strong feeling
>>for either way.  There was some concern on the LSM list that not
>>checking the fragment options might be an issue so I added some code to
>>check the fragment options.  Personally I think we are probably okay
>>without it as the un-autenticated/un-verified nature of these labeling
>>protocols more or less requires either a trusted network/hosts.
>>
>>If the community decides that this check is not required then I can
>>simply drop all of the changes in ip_fragment.c.
> 
> If you state you are labeling session packets (tcp or udp), that would 
> lead one to believe all packets are labeled (including fragments). Based 
> on our past evaluations I don't think non-labeled fragments would make 
> it through an evaluation if CIPSO/RIPSO  were part of the TOE/security 
> Target.
> 

Outgoing fragment *should* be labeled correctly assuming the Linux base
network stack does the right thing (I haven't tested this yet).  The
issue we are discussing here is what to do about incoming packets where
the fragments are not consistently labeled.

-- 
paul moore
linux security @ hp
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to