Commit 07feee8f authored by Paul Moore's avatar Paul Moore Committed by James Morris

netlabel: Cleanup the Smack/NetLabel code to fix incoming TCP connections

This patch cleans up a lot of the Smack network access control code.  The
largest changes are to fix the labeling of incoming TCP connections in a
manner similar to the recent SELinux changes which use the
security_inet_conn_request() hook to label the request_sock and let the label
move to the child socket via the normal network stack mechanisms.  In addition
to the incoming TCP connection fixes this patch also removes the smk_labled
field from the socket_smack struct as the minor optimization advantage was
outweighed by the difficulty in maintaining it's proper state.
Signed-off-by: default avatarPaul Moore <paul.moore@hp.com>
Acked-by: default avatarCasey Schaufler <casey@schaufler-ca.com>
Signed-off-by: default avatarJames Morris <jmorris@namei.org>
parent 8651d5c0
...@@ -417,6 +417,7 @@ int netlbl_conn_setattr(struct sock *sk, ...@@ -417,6 +417,7 @@ int netlbl_conn_setattr(struct sock *sk,
const struct netlbl_lsm_secattr *secattr); const struct netlbl_lsm_secattr *secattr);
int netlbl_req_setattr(struct request_sock *req, int netlbl_req_setattr(struct request_sock *req,
const struct netlbl_lsm_secattr *secattr); const struct netlbl_lsm_secattr *secattr);
void netlbl_req_delattr(struct request_sock *req);
int netlbl_skbuff_setattr(struct sk_buff *skb, int netlbl_skbuff_setattr(struct sk_buff *skb,
u16 family, u16 family,
const struct netlbl_lsm_secattr *secattr); const struct netlbl_lsm_secattr *secattr);
...@@ -547,6 +548,10 @@ static inline int netlbl_req_setattr(struct request_sock *req, ...@@ -547,6 +548,10 @@ static inline int netlbl_req_setattr(struct request_sock *req,
{ {
return -ENOSYS; return -ENOSYS;
} }
static inline void netlbl_req_delattr(struct request_sock *req)
{
return;
}
static inline int netlbl_skbuff_setattr(struct sk_buff *skb, static inline int netlbl_skbuff_setattr(struct sk_buff *skb,
u16 family, u16 family,
const struct netlbl_lsm_secattr *secattr) const struct netlbl_lsm_secattr *secattr)
......
...@@ -860,6 +860,19 @@ int netlbl_req_setattr(struct request_sock *req, ...@@ -860,6 +860,19 @@ int netlbl_req_setattr(struct request_sock *req,
return ret_val; return ret_val;
} }
/**
* netlbl_req_delattr - Delete all the NetLabel labels on a socket
* @req: the socket
*
* Description:
* Remove all the NetLabel labeling from @req.
*
*/
void netlbl_req_delattr(struct request_sock *req)
{
cipso_v4_req_delattr(req);
}
/** /**
* netlbl_skbuff_setattr - Label a packet using the correct protocol * netlbl_skbuff_setattr - Label a packet using the correct protocol
* @skb: the packet * @skb: the packet
......
...@@ -42,7 +42,6 @@ struct superblock_smack { ...@@ -42,7 +42,6 @@ struct superblock_smack {
struct socket_smack { struct socket_smack {
char *smk_out; /* outbound label */ char *smk_out; /* outbound label */
char *smk_in; /* inbound label */ char *smk_in; /* inbound label */
int smk_labeled; /* label scheme */
char smk_packet[SMK_LABELLEN]; /* TCP peer label */ char smk_packet[SMK_LABELLEN]; /* TCP peer label */
}; };
......
...@@ -7,6 +7,8 @@ ...@@ -7,6 +7,8 @@
* Casey Schaufler <casey@schaufler-ca.com> * Casey Schaufler <casey@schaufler-ca.com>
* *
* Copyright (C) 2007 Casey Schaufler <casey@schaufler-ca.com> * Copyright (C) 2007 Casey Schaufler <casey@schaufler-ca.com>
* Copyright (C) 2009 Hewlett-Packard Development Company, L.P.
* Paul Moore <paul.moore@hp.com>
* *
* This program is free software; you can redistribute it and/or modify * This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2, * it under the terms of the GNU General Public License version 2,
...@@ -20,6 +22,7 @@ ...@@ -20,6 +22,7 @@
#include <linux/ext2_fs.h> #include <linux/ext2_fs.h>
#include <linux/kd.h> #include <linux/kd.h>
#include <asm/ioctls.h> #include <asm/ioctls.h>
#include <linux/ip.h>
#include <linux/tcp.h> #include <linux/tcp.h>
#include <linux/udp.h> #include <linux/udp.h>
#include <linux/mutex.h> #include <linux/mutex.h>
...@@ -1275,7 +1278,6 @@ static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags) ...@@ -1275,7 +1278,6 @@ static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags)
ssp->smk_in = csp; ssp->smk_in = csp;
ssp->smk_out = csp; ssp->smk_out = csp;
ssp->smk_labeled = SMACK_CIPSO_SOCKET;
ssp->smk_packet[0] = '\0'; ssp->smk_packet[0] = '\0';
sk->sk_security = ssp; sk->sk_security = ssp;
...@@ -1294,6 +1296,39 @@ static void smack_sk_free_security(struct sock *sk) ...@@ -1294,6 +1296,39 @@ static void smack_sk_free_security(struct sock *sk)
kfree(sk->sk_security); kfree(sk->sk_security);
} }
/**
* smack_host_label - check host based restrictions
* @sip: the object end
*
* looks for host based access restrictions
*
* This version will only be appropriate for really small sets of single label
* hosts. The caller is responsible for ensuring that the RCU read lock is
* taken before calling this function.
*
* Returns the label of the far end or NULL if it's not special.
*/
static char *smack_host_label(struct sockaddr_in *sip)
{
struct smk_netlbladdr *snp;
struct in_addr *siap = &sip->sin_addr;
if (siap->s_addr == 0)
return NULL;
list_for_each_entry_rcu(snp, &smk_netlbladdr_list, list)
/*
* we break after finding the first match because
* the list is sorted from longest to shortest mask
* so we have found the most specific match
*/
if ((&snp->smk_host.sin_addr)->s_addr ==
(siap->s_addr & (&snp->smk_mask)->s_addr))
return snp->smk_label;
return NULL;
}
/** /**
* smack_set_catset - convert a capset to netlabel mls categories * smack_set_catset - convert a capset to netlabel mls categories
* @catset: the Smack categories * @catset: the Smack categories
...@@ -1365,11 +1400,10 @@ static void smack_to_secattr(char *smack, struct netlbl_lsm_secattr *nlsp) ...@@ -1365,11 +1400,10 @@ static void smack_to_secattr(char *smack, struct netlbl_lsm_secattr *nlsp)
*/ */
static int smack_netlabel(struct sock *sk, int labeled) static int smack_netlabel(struct sock *sk, int labeled)
{ {
struct socket_smack *ssp; struct socket_smack *ssp = sk->sk_security;
struct netlbl_lsm_secattr secattr; struct netlbl_lsm_secattr secattr;
int rc = 0; int rc = 0;
ssp = sk->sk_security;
/* /*
* Usually the netlabel code will handle changing the * Usually the netlabel code will handle changing the
* packet labeling based on the label. * packet labeling based on the label.
...@@ -1393,20 +1427,44 @@ static int smack_netlabel(struct sock *sk, int labeled) ...@@ -1393,20 +1427,44 @@ static int smack_netlabel(struct sock *sk, int labeled)
bh_unlock_sock(sk); bh_unlock_sock(sk);
local_bh_enable(); local_bh_enable();
/*
* Remember the label scheme used so that it is not
* necessary to do the netlabel setting if it has not
* changed the next time through.
*
* The -EDESTADDRREQ case is an indication that there's
* a single level host involved.
*/
if (rc == 0)
ssp->smk_labeled = labeled;
return rc; return rc;
} }
/**
* smack_netlbel_send - Set the secattr on a socket and perform access checks
* @sk: the socket
* @sap: the destination address
*
* Set the correct secattr for the given socket based on the destination
* address and perform any outbound access checks needed.
*
* Returns 0 on success or an error code.
*
*/
static int smack_netlabel_send(struct sock *sk, struct sockaddr_in *sap)
{
int rc;
int sk_lbl;
char *hostsp;
struct socket_smack *ssp = sk->sk_security;
rcu_read_lock();
hostsp = smack_host_label(sap);
if (hostsp != NULL) {
sk_lbl = SMACK_UNLABELED_SOCKET;
rc = smk_access(ssp->smk_out, hostsp, MAY_WRITE);
} else {
sk_lbl = SMACK_CIPSO_SOCKET;
rc = 0;
}
rcu_read_unlock();
if (rc != 0)
return rc;
return smack_netlabel(sk, sk_lbl);
}
/** /**
* smack_inode_setsecurity - set smack xattrs * smack_inode_setsecurity - set smack xattrs
* @inode: the object * @inode: the object
...@@ -1488,43 +1546,6 @@ static int smack_socket_post_create(struct socket *sock, int family, ...@@ -1488,43 +1546,6 @@ static int smack_socket_post_create(struct socket *sock, int family,
return smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET); return smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET);
} }
/**
* smack_host_label - check host based restrictions
* @sip: the object end
*
* looks for host based access restrictions
*
* This version will only be appropriate for really small
* sets of single label hosts.
*
* Returns the label of the far end or NULL if it's not special.
*/
static char *smack_host_label(struct sockaddr_in *sip)
{
struct smk_netlbladdr *snp;
struct in_addr *siap = &sip->sin_addr;
if (siap->s_addr == 0)
return NULL;
rcu_read_lock();
list_for_each_entry_rcu(snp, &smk_netlbladdr_list, list) {
/*
* we break after finding the first match because
* the list is sorted from longest to shortest mask
* so we have found the most specific match
*/
if ((&snp->smk_host.sin_addr)->s_addr ==
(siap->s_addr & (&snp->smk_mask)->s_addr)) {
rcu_read_unlock();
return snp->smk_label;
}
}
rcu_read_unlock();
return NULL;
}
/** /**
* smack_socket_connect - connect access check * smack_socket_connect - connect access check
* @sock: the socket * @sock: the socket
...@@ -1538,30 +1559,12 @@ static char *smack_host_label(struct sockaddr_in *sip) ...@@ -1538,30 +1559,12 @@ static char *smack_host_label(struct sockaddr_in *sip)
static int smack_socket_connect(struct socket *sock, struct sockaddr *sap, static int smack_socket_connect(struct socket *sock, struct sockaddr *sap,
int addrlen) int addrlen)
{ {
struct socket_smack *ssp = sock->sk->sk_security;
char *hostsp;
int rc;
if (sock->sk == NULL || sock->sk->sk_family != PF_INET) if (sock->sk == NULL || sock->sk->sk_family != PF_INET)
return 0; return 0;
if (addrlen < sizeof(struct sockaddr_in)) if (addrlen < sizeof(struct sockaddr_in))
return -EINVAL; return -EINVAL;
hostsp = smack_host_label((struct sockaddr_in *)sap); return smack_netlabel_send(sock->sk, (struct sockaddr_in *)sap);
if (hostsp == NULL) {
if (ssp->smk_labeled != SMACK_CIPSO_SOCKET)
return smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET);
return 0;
}
rc = smk_access(ssp->smk_out, hostsp, MAY_WRITE);
if (rc != 0)
return rc;
if (ssp->smk_labeled != SMACK_UNLABELED_SOCKET)
return smack_netlabel(sock->sk, SMACK_UNLABELED_SOCKET);
return 0;
} }
/** /**
...@@ -2262,9 +2265,6 @@ static int smack_socket_sendmsg(struct socket *sock, struct msghdr *msg, ...@@ -2262,9 +2265,6 @@ static int smack_socket_sendmsg(struct socket *sock, struct msghdr *msg,
int size) int size)
{ {
struct sockaddr_in *sip = (struct sockaddr_in *) msg->msg_name; struct sockaddr_in *sip = (struct sockaddr_in *) msg->msg_name;
struct socket_smack *ssp = sock->sk->sk_security;
char *hostsp;
int rc;
/* /*
* Perfectly reasonable for this to be NULL * Perfectly reasonable for this to be NULL
...@@ -2272,22 +2272,7 @@ static int smack_socket_sendmsg(struct socket *sock, struct msghdr *msg, ...@@ -2272,22 +2272,7 @@ static int smack_socket_sendmsg(struct socket *sock, struct msghdr *msg,
if (sip == NULL || sip->sin_family != PF_INET) if (sip == NULL || sip->sin_family != PF_INET)
return 0; return 0;
hostsp = smack_host_label(sip); return smack_netlabel_send(sock->sk, sip);
if (hostsp == NULL) {
if (ssp->smk_labeled != SMACK_CIPSO_SOCKET)
return smack_netlabel(sock->sk, SMACK_CIPSO_SOCKET);
return 0;
}
rc = smk_access(ssp->smk_out, hostsp, MAY_WRITE);
if (rc != 0)
return rc;
if (ssp->smk_labeled != SMACK_UNLABELED_SOCKET)
return smack_netlabel(sock->sk, SMACK_UNLABELED_SOCKET);
return 0;
} }
...@@ -2492,31 +2477,24 @@ static int smack_socket_getpeersec_dgram(struct socket *sock, ...@@ -2492,31 +2477,24 @@ static int smack_socket_getpeersec_dgram(struct socket *sock,
} }
/** /**
* smack_sock_graft - graft access state between two sockets * smack_sock_graft - Initialize a newly created socket with an existing sock
* @sk: fresh sock * @sk: child sock
* @parent: donor socket * @parent: parent socket
* *
* Sets the netlabel socket state on sk from parent * Set the smk_{in,out} state of an existing sock based on the process that
* is creating the new socket.
*/ */
static void smack_sock_graft(struct sock *sk, struct socket *parent) static void smack_sock_graft(struct sock *sk, struct socket *parent)
{ {
struct socket_smack *ssp; struct socket_smack *ssp;
int rc;
if (sk == NULL)
return;
if (sk->sk_family != PF_INET && sk->sk_family != PF_INET6) if (sk == NULL ||
(sk->sk_family != PF_INET && sk->sk_family != PF_INET6))
return; return;
ssp = sk->sk_security; ssp = sk->sk_security;
ssp->smk_in = ssp->smk_out = current_security(); ssp->smk_in = ssp->smk_out = current_security();
ssp->smk_packet[0] = '\0'; /* cssp->smk_packet is already set in smack_inet_csk_clone() */
rc = smack_netlabel(sk, SMACK_CIPSO_SOCKET);
if (rc != 0)
printk(KERN_WARNING "Smack: \"%s\" netlbl error %d.\n",
__func__, -rc);
} }
/** /**
...@@ -2531,35 +2509,82 @@ static void smack_sock_graft(struct sock *sk, struct socket *parent) ...@@ -2531,35 +2509,82 @@ static void smack_sock_graft(struct sock *sk, struct socket *parent)
static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb,
struct request_sock *req) struct request_sock *req)
{ {
struct netlbl_lsm_secattr skb_secattr; u16 family = sk->sk_family;
struct socket_smack *ssp = sk->sk_security; struct socket_smack *ssp = sk->sk_security;
struct netlbl_lsm_secattr secattr;
struct sockaddr_in addr;
struct iphdr *hdr;
char smack[SMK_LABELLEN]; char smack[SMK_LABELLEN];
int rc; int rc;
if (skb == NULL) /* handle mapped IPv4 packets arriving via IPv6 sockets */
return -EACCES; if (family == PF_INET6 && skb->protocol == htons(ETH_P_IP))
family = PF_INET;
netlbl_secattr_init(&skb_secattr); netlbl_secattr_init(&secattr);
rc = netlbl_skbuff_getattr(skb, sk->sk_family, &skb_secattr); rc = netlbl_skbuff_getattr(skb, family, &secattr);
if (rc == 0) if (rc == 0)
smack_from_secattr(&skb_secattr, smack); smack_from_secattr(&secattr, smack);
else else
strncpy(smack, smack_known_huh.smk_known, SMK_MAXLEN); strncpy(smack, smack_known_huh.smk_known, SMK_MAXLEN);
netlbl_secattr_destroy(&skb_secattr); netlbl_secattr_destroy(&secattr);
/* /*
* Receiving a packet requires that the other end * Receiving a packet requires that the other end be able to write
* be able to write here. Read access is not required. * here. Read access is not required.
*
* If the request is successful save the peer's label
* so that SO_PEERCRED can report it.
*/ */
rc = smk_access(smack, ssp->smk_in, MAY_WRITE); rc = smk_access(smack, ssp->smk_in, MAY_WRITE);
if (rc == 0) if (rc != 0)
strncpy(ssp->smk_packet, smack, SMK_MAXLEN); return rc;
/*
* Save the peer's label in the request_sock so we can later setup
* smk_packet in the child socket so that SO_PEERCRED can report it.
*/
req->peer_secid = smack_to_secid(smack);
/*
* We need to decide if we want to label the incoming connection here
* if we do we only need to label the request_sock and the stack will
* propogate the wire-label to the sock when it is created.
*/
hdr = ip_hdr(skb);
addr.sin_addr.s_addr = hdr->saddr;
rcu_read_lock();
if (smack_host_label(&addr) == NULL) {
rcu_read_unlock();
netlbl_secattr_init(&secattr);
smack_to_secattr(smack, &secattr);
rc = netlbl_req_setattr(req, &secattr);
netlbl_secattr_destroy(&secattr);
} else {
rcu_read_unlock();
netlbl_req_delattr(req);
}
return rc; return rc;
} }
/**
* smack_inet_csk_clone - Copy the connection information to the new socket
* @sk: the new socket
* @req: the connection's request_sock
*
* Transfer the connection's peer label to the newly created socket.
*/
static void smack_inet_csk_clone(struct sock *sk,
const struct request_sock *req)
{
struct socket_smack *ssp = sk->sk_security;
char *smack;
if (req->peer_secid != 0) {
smack = smack_from_secid(req->peer_secid);
strncpy(ssp->smk_packet, smack, SMK_MAXLEN);
} else
ssp->smk_packet[0] = '\0';
}
/* /*
* Key management security hooks * Key management security hooks
* *
...@@ -2911,6 +2936,7 @@ struct security_operations smack_ops = { ...@@ -2911,6 +2936,7 @@ struct security_operations smack_ops = {
.sk_free_security = smack_sk_free_security, .sk_free_security = smack_sk_free_security,
.sock_graft = smack_sock_graft, .sock_graft = smack_sock_graft,
.inet_conn_request = smack_inet_conn_request, .inet_conn_request = smack_inet_conn_request,
.inet_csk_clone = smack_inet_csk_clone,
/* key management security hooks */ /* key management security hooks */
#ifdef CONFIG_KEYS #ifdef CONFIG_KEYS
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment