On Wed, 10 Jan 2007, Herbert Xu wrote:

> Hi:
> 
> [IPSEC] flow: Cache negative security checks

We did some work in this part of the code a few months back -- IIRC it was 
resolved correctly from a security point of view.

(cc'ing Venkat & Paul for review).

> 
> This patch causes security policy denials to be cached instead of
> causing a relookup every time.  This is OK because we already cache
> positive security policy results which is strictly worse as far as
> security is concerned.  In particular, if the security system (not
> IPsec policies but the rules under security/) changes such that a
> positive result turns negative (denial), we will ignore it and
> continue to allow traffic through based on the cached policy.
> 
> So if the security folks actually care about this, they'd need to
> flush the flow cache whenever a relevant change is made to the
> security database.  Whether this is done or not does not affect
> this patch.
> 
> Given that we do want to cache positive results even in the presence
> of SELinux (otherwise we might as well disable flow.c entirely), it
> is natural to cache negative results too.
> 
> This patch also happens to fix a nasty bug where if an expiring
> flow entry that's not at the head happens to trigger a security
> denial, all entries before it are removed from the cache and
> leaked.
> 
> Signed-off-by: Herbert Xu <[EMAIL PROTECTED]>
> 
> Cheers,
> 

-- 
James Morris
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to