On Sat, 27 May 2006, James Morris wrote:

> One of the problems is that different Netlink protocols bury their 
> commands at different levels, so the SELinux code has to know how how deep 
> to dig (and then do the digging) to determine exactly which command is 
> being called.

Actually, a possible solution here is to completely remove all internal 
knowledge of netlink messages from SELinux and have the netfilter 
framework and protocols provide methods to determine message types and 
permissions.

One of the issues still to resolve for SELinux and generic netlink is that 
we don't know what the netlink protocol for the socket really is until 
messages are sent over it, so some socket-level perms for NETLINK_GENERIC 
will have to be handed out to all potential users (although actual 
transfer of data can be mediated at a finer granularity).


- James
-- 
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to