Set all packet's secmark to 'System' label on input iptables 26/101426/1 accepted/tizen_3.0.m2_mobile accepted/tizen_3.0.m2_tv accepted/tizen_3.0.m2_wearable tizen_3.0.m2 accepted/tizen/3.0.m2/mobile/20170104.141804 accepted/tizen/3.0.m2/tv/20170104.142137 accepted/tizen/3.0.m2/wearable/20170104.142431 accepted/tizen/3.0/common/20161205.092154 accepted/tizen/3.0/ivi/20161205.065828 accepted/tizen/3.0/mobile/20161205.065747 accepted/tizen/3.0/tv/20161205.065808 accepted/tizen/3.0/wearable/20161205.065822 accepted/tizen/ivi/20161205.233725 accepted/tizen/mobile/20161205.233633 accepted/tizen/tv/20161205.233650 accepted/tizen/wearable/20161205.233709 submit/tizen/20161205.090948 submit/tizen_3.0.m2/20170104.093751 submit/tizen_3.0/20161205.010713
authorjooseong lee <jooseong.lee@samsung.com>
Thu, 1 Dec 2016 06:30:27 +0000 (15:30 +0900)
committerjooseong lee <jooseong.lee@samsung.com>
Thu, 1 Dec 2016 06:55:52 +0000 (15:55 +0900)
commit803258cee1d310d351d6a5becb70e781abfb595a
tree04607083b62106400f2223bb7d4efffa495990eb
parent4eee0042c064d875e955e571fd97ca185f454beb
Set all packet's secmark to 'System' label on input iptables

It is hard to change packet's secmark in specific IP scope
to avoid Smack denial. Nether provides access control for
input and output packet better than IP management.

Change-Id: I7a6da0d53c313a7987217d62fefb16ef2f0b8a0f
Signed-off-by: jooseong lee <jooseong.lee@samsung.com>
conf/nether.rules
conf/nether_ipv6.rules