TY - GEN
T1 - Leveraging IPsec for mandatory per-packet access control
AU - Jaeger, Trent
AU - King, David H.
AU - Butler, Kevin R.
AU - Hallyn, Serge
AU - Latten, Joy
AU - Zhang, Xiaolan
PY - 2006
Y1 - 2006
N2 - Mandatory access control (MAC) enforcement is becoming available for commercial environments. For example, Linux 2.6 includes the Linux Security Modules (LSM) framework that enables the enforcement of MAC policies (e.g., Type Enforcement or Multi-Level Security) for individual systems. While this is a start, we envision that MAC enforcement should span multiple machines. The goal is to be able to control interaction between applications on different machines based on MAC policy. In this paper, we describe a recent extension of the LSM framework that enables labeled network communication via IPsec that is now available in mainline Linux as of version 2.6.16. This functionality enables machines to control communication with processes on other machines based on the security label assigned to an IPsec security association. We outline a security architecture based on labeled IPsec to enable distributed MAC authorization. In particular, we examine the construction of a xinetd service that uses labeled IPsec to limit client access on Linux 2.6.16 systems. We also discuss the application of labeled IPsec to distributed storage and virtual machine access control.
AB - Mandatory access control (MAC) enforcement is becoming available for commercial environments. For example, Linux 2.6 includes the Linux Security Modules (LSM) framework that enables the enforcement of MAC policies (e.g., Type Enforcement or Multi-Level Security) for individual systems. While this is a start, we envision that MAC enforcement should span multiple machines. The goal is to be able to control interaction between applications on different machines based on MAC policy. In this paper, we describe a recent extension of the LSM framework that enables labeled network communication via IPsec that is now available in mainline Linux as of version 2.6.16. This functionality enables machines to control communication with processes on other machines based on the security label assigned to an IPsec security association. We outline a security architecture based on labeled IPsec to enable distributed MAC authorization. In particular, we examine the construction of a xinetd service that uses labeled IPsec to limit client access on Linux 2.6.16 systems. We also discuss the application of labeled IPsec to distributed storage and virtual machine access control.
UR - http://www.scopus.com/inward/record.url?scp=50049106863&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=50049106863&partnerID=8YFLogxK
U2 - 10.1109/SECCOMW.2006.359530
DO - 10.1109/SECCOMW.2006.359530
M3 - Conference contribution
AN - SCOPUS:50049106863
SN - 1424404231
SN - 9781424404230
T3 - 2006 Securecomm and Workshops
BT - 2006 Securecomm and Workshops
T2 - 2006 Securecomm and Workshops
Y2 - 28 August 2006 through 1 September 2006
ER -