Skip to content

Commit

Permalink
Smack: unlabeled outgoing ambient packets
Browse files Browse the repository at this point in the history
Smack uses CIPSO labeling, but allows for unlabeled packets by
specifying an "ambient" label that is applied to incoming unlabeled
packets.

Because the other end of the connection may dislike IP options, and ssh
is one know application that behaves thus, it is prudent to respond in
kind.

This patch changes the network labeling behavior such that an outgoing
packet that would be given a CIPSO label that matches the ambient label
is left unlabeled.  An "unlbl" domain is added and the netlabel
defaulting mechanism invoked rather than assuming that everything is
CIPSO.  Locking has been added around changes to the ambient label as
the mechanisms used to do so are more involved.

Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Acked-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
  • Loading branch information
Casey Schaufler authored and Linus Torvalds committed Feb 19, 2008
1 parent 9a4c854 commit 4bc87e6
Show file tree
Hide file tree
Showing 2 changed files with 74 additions and 23 deletions.
36 changes: 28 additions & 8 deletions security/smack/smack_lsm.c
Original file line number Diff line number Diff line change
Expand Up @@ -1251,9 +1251,8 @@ static void smack_to_secattr(char *smack, struct netlbl_lsm_secattr *nlsp)

switch (smack_net_nltype) {
case NETLBL_NLTYPE_CIPSOV4:
nlsp->domain = NULL;
nlsp->flags = NETLBL_SECATTR_DOMAIN;
nlsp->flags |= NETLBL_SECATTR_MLS_LVL;
nlsp->domain = kstrdup(smack, GFP_ATOMIC);
nlsp->flags = NETLBL_SECATTR_DOMAIN | NETLBL_SECATTR_MLS_LVL;

rc = smack_to_cipso(smack, &cipso);
if (rc == 0) {
Expand Down Expand Up @@ -1282,15 +1281,14 @@ static int smack_netlabel(struct sock *sk)
{
struct socket_smack *ssp;
struct netlbl_lsm_secattr secattr;
int rc = 0;
int rc;

ssp = sk->sk_security;
netlbl_secattr_init(&secattr);
smack_to_secattr(ssp->smk_out, &secattr);
if (secattr.flags != NETLBL_SECATTR_NONE)
rc = netlbl_sock_setattr(sk, &secattr);

rc = netlbl_sock_setattr(sk, &secattr);
netlbl_secattr_destroy(&secattr);

return rc;
}

Expand All @@ -1313,6 +1311,7 @@ static int smack_inode_setsecurity(struct inode *inode, const char *name,
struct inode_smack *nsp = inode->i_security;
struct socket_smack *ssp;
struct socket *sock;
int rc = 0;

if (value == NULL || size > SMK_LABELLEN)
return -EACCES;
Expand Down Expand Up @@ -1341,7 +1340,10 @@ static int smack_inode_setsecurity(struct inode *inode, const char *name,
ssp->smk_in = sp;
else if (strcmp(name, XATTR_SMACK_IPOUT) == 0) {
ssp->smk_out = sp;
return smack_netlabel(sock->sk);
rc = smack_netlabel(sock->sk);
if (rc != 0)
printk(KERN_WARNING "Smack: \"%s\" netlbl error %d.\n",
__func__, -rc);
} else
return -EOPNOTSUPP;

Expand Down Expand Up @@ -2214,6 +2216,9 @@ static void smack_sock_graft(struct sock *sk, struct socket *parent)
ssp->smk_packet[0] = '\0';

rc = smack_netlabel(sk);
if (rc != 0)
printk(KERN_WARNING "Smack: \"%s\" netlbl error %d.\n",
__func__, -rc);
}

/**
Expand Down Expand Up @@ -2345,6 +2350,20 @@ static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
return 0;
}

/*
* smack_secctx_to_secid - return the secid for a smack label
* @secdata: smack label
* @seclen: how long result is
* @secid: outgoing integer
*
* Exists for audit and networking code.
*/
static int smack_secctx_to_secid(char *secdata, u32 seclen, u32 *secid)
{
*secid = smack_to_secid(secdata);
return 0;
}

/*
* smack_release_secctx - don't do anything.
* @key_ref: unused
Expand Down Expand Up @@ -2475,6 +2494,7 @@ static struct security_operations smack_ops = {
.key_permission = smack_key_permission,
#endif /* CONFIG_KEYS */
.secid_to_secctx = smack_secid_to_secctx,
.secctx_to_secid = smack_secctx_to_secid,
.release_secctx = smack_release_secctx,
};

Expand Down
61 changes: 46 additions & 15 deletions security/smack/smackfs.c
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@
#include <net/cipso_ipv4.h>
#include <linux/seq_file.h>
#include <linux/ctype.h>
#include <linux/audit.h>
#include "smack.h"

/*
Expand All @@ -45,6 +46,7 @@ enum smk_inos {
*/
static DEFINE_MUTEX(smack_list_lock);
static DEFINE_MUTEX(smack_cipso_lock);
static DEFINE_MUTEX(smack_ambient_lock);

/*
* This is the "ambient" label for network traffic.
Expand Down Expand Up @@ -342,6 +344,9 @@ void smk_cipso_doi(void)
struct cipso_v4_doi *doip;
struct netlbl_audit audit_info;

audit_info.loginuid = audit_get_loginuid(current);
audit_info.secid = smack_to_secid(current->security);

rc = netlbl_cfg_map_del(NULL, &audit_info);
if (rc != 0)
printk(KERN_WARNING "%s:%d remove rc = %d\n",
Expand All @@ -363,6 +368,30 @@ void smk_cipso_doi(void)
__func__, __LINE__, rc);
}

/**
* smk_unlbl_ambient - initialize the unlabeled domain
*/
void smk_unlbl_ambient(char *oldambient)
{
int rc;
struct netlbl_audit audit_info;

audit_info.loginuid = audit_get_loginuid(current);
audit_info.secid = smack_to_secid(current->security);

if (oldambient != NULL) {
rc = netlbl_cfg_map_del(oldambient, &audit_info);
if (rc != 0)
printk(KERN_WARNING "%s:%d remove rc = %d\n",
__func__, __LINE__, rc);
}

rc = netlbl_cfg_unlbl_add_map(smack_net_ambient, &audit_info);
if (rc != 0)
printk(KERN_WARNING "%s:%d add rc = %d\n",
__func__, __LINE__, rc);
}

/*
* Seq_file read operations for /smack/cipso
*/
Expand Down Expand Up @@ -709,31 +738,25 @@ static ssize_t smk_read_ambient(struct file *filp, char __user *buf,
size_t cn, loff_t *ppos)
{
ssize_t rc;
char out[SMK_LABELLEN];
int asize;

if (*ppos != 0)
return 0;
/*
* Being careful to avoid a problem in the case where
* smack_net_ambient gets changed in midstream.
* Since smack_net_ambient is always set with a value
* from the label list, including initially, and those
* never get freed, the worst case is that the pointer
* gets changed just after this strncpy, in which case
* the value passed up is incorrect. Locking around
* smack_net_ambient wouldn't be any better than this
* copy scheme as by the time the caller got to look
* at the ambient value it would have cleared the lock
* and been changed.
*/
strncpy(out, smack_net_ambient, SMK_LABELLEN);
asize = strlen(out) + 1;
mutex_lock(&smack_ambient_lock);

if (cn < asize)
return -EINVAL;
asize = strlen(smack_net_ambient) + 1;

if (cn >= asize)
rc = simple_read_from_buffer(buf, cn, ppos,
smack_net_ambient, asize);
else
rc = -EINVAL;

rc = simple_read_from_buffer(buf, cn, ppos, out, asize);
mutex_unlock(&smack_ambient_lock);

return rc;
}
Expand All @@ -751,6 +774,7 @@ static ssize_t smk_write_ambient(struct file *file, const char __user *buf,
size_t count, loff_t *ppos)
{
char in[SMK_LABELLEN];
char *oldambient;
char *smack;

if (!capable(CAP_MAC_ADMIN))
Expand All @@ -766,7 +790,13 @@ static ssize_t smk_write_ambient(struct file *file, const char __user *buf,
if (smack == NULL)
return -EINVAL;

mutex_lock(&smack_ambient_lock);

oldambient = smack_net_ambient;
smack_net_ambient = smack;
smk_unlbl_ambient(oldambient);

mutex_unlock(&smack_ambient_lock);

return count;
}
Expand Down Expand Up @@ -974,6 +1004,7 @@ static int __init init_smk_fs(void)

sema_init(&smack_write_sem, 1);
smk_cipso_doi();
smk_unlbl_ambient(NULL);

return err;
}
Expand Down

0 comments on commit 4bc87e6

Please sign in to comment.