On Wednesday, January 18, 2017 7:32:40 AM EST Paul Moore wrote:
On Wed, Jan 18, 2017 at 12:39 AM, Richard Guy Briggs
<rgb(a)redhat.com> wrote:
> On 2017-01-17 21:34, Richard Guy Briggs wrote:
>> On 2017-01-17 15:17, Paul Moore wrote:
>> > On Tue, Jan 17, 2017 at 11:12 AM, Richard Guy Briggs <rgb(a)redhat.com>
wrote:
>> > > On 2017-01-17 08:55, Steve Grubb wrote:
>> > >> On Tuesday, January 17, 2017 12:25:51 AM EST Richard Guy Briggs
wrote:
>> > ...
>> >
>> > >> > Ones that are not so straightforward:
>> > >> > - "secmark" depends on a kernel config setting, so
should it
>> > >> > always be
>> > >> >
>> > >> > present but "(none)" if that kernel feature is
compiled out?
>> > >>
>> > >> If this is selinux related, I'd treat it the same way that we
do
>> > >> subj
>> > >> everywhere else.
>> > >
>> > > Ok.
>> >
>> > To be clear, a packet's secmark should be recorded via a dedicated
>> > field, e.g. "secmark", and not use the "subj" field (it
isn't a
>> > subject label in the traditional sense).
>>
>> I think Steve was talking about if, when or where to include that field,
>> not what its label is.
>
> In this case it is an "obj=" field, but since it is part of the LSM,
> each one has its own fields.
As I said above, use a "secmark" field and not the subject or object
fields; packet labeling is rather complex and there is value in
differentiating between secmark labels and network peer labels.
As Richard said, I was talking about when to include it, not what to include.
Context labels go through this test to check if there is a secid and log
context information if its there. This keeps the logs self consistent if a MAC
framework is compiled in or not.
-Steve