Leveraging IPsec for mandatory per-packet access control

Trent Jaeger, David H. King, Kevin R. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Mandatory access control (MAC) enforcement is becoming available for commercial environments. For example, Linux 2.6 includes the Linux Security Modules (LSM) framework that enables the enforcement of MAC policies (e.g., Type Enforcement or Multi-Level Security) for individual systems. While this is a start, we envision that MAC enforcement should span multiple machines. The goal is to be able to control interaction between applications on different machines based on MAC policy. In this paper, we describe a recent extension of the LSM framework that enables labeled network communication via IPsec that is now available in mainline Linux as of version 2.6.16. This functionality enables machines to control communication with processes on other machines based on the security label assigned to an IPsec security association. We outline a security architecture based on labeled IPsec to enable distributed MAC authorization. In particular, we examine the construction of a xinetd service that uses labeled IPsec to limit client access on Linux 2.6.16 systems. We also discuss the application of labeled IPsec to distributed storage and virtual machine access control.

Original languageEnglish (US)
Title of host publication2006 Securecomm and Workshops
DOIs
StatePublished - 2006
Event2006 Securecomm and Workshops - Baltimore, MD, United States
Duration: Aug 28 2006Sep 1 2006

Publication series

Name2006 Securecomm and Workshops

Other

Other2006 Securecomm and Workshops
Country/TerritoryUnited States
CityBaltimore, MD
Period8/28/069/1/06

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'Leveraging IPsec for mandatory per-packet access control'. Together they form a unique fingerprint.

Cite this