diff --git a/policy/modules/kernel/domain.if b/policy/modules/kernel/domain.if
index 069f6a3..0b74810 100644
--- a/policy/modules/kernel/domain.if
+++ b/policy/modules/kernel/domain.if
@@ -1231,32 +1231,6 @@ interface(`domain_entry_file_spec_domtrans',`
########################################
##
-## Unconfined access to domains.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
-interface(`domain_unconfined',`
- gen_require(`
- attribute set_curr_context;
- attribute can_change_object_identity;
- attribute unconfined_domain_type;
- attribute process_uncond_exempt;
- ')
-
- typeattribute $1 unconfined_domain_type;
-
- # pass constraints
- typeattribute $1 can_change_object_identity;
- typeattribute $1 set_curr_context;
- typeattribute $1 process_uncond_exempt;
-')
-
-########################################
-##
## Ability to mmap a low area of the address space,
## as configured by /proc/sys/kernel/mmap_min_addr.
## Preventing such mappings helps protect against
@@ -1280,18 +1254,52 @@ interface(`domain_mmap_low',`
########################################
##
-## Allow specified type to associate ipsec packets from any domain
+## Allow specified type to receive labeled
+## networking packets from all domains, over
+## all protocols (TCP, UDP, etc)
##
##
##
-## Type of subject to be allowed this.
+## Domain allowed access.
##
##
#
-interface(`domain_ipsec_labels',`
+interface(`domain_all_recvfrom_all_domains',`
gen_require(`
attribute domain;
')
-
- allow $1 domain:association { sendto recvfrom };
+
+ # IPSEC-based labeled networking
+ allow $1 domain:association recvfrom;
+
+ # Netlabel (CIPSO)-based labeled networking
+ # currently only supports MLS portion of label
+ corenet_all_recvfrom_netlabel($1)
+')
+
+########################################
+##
+## Unconfined access to domains.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`domain_unconfined',`
+ gen_require(`
+ attribute set_curr_context;
+ attribute can_change_object_identity;
+ attribute unconfined_domain_type;
+ attribute process_uncond_exempt;
+ ')
+
+ typeattribute $1 unconfined_domain_type;
+
+ # pass constraints
+ typeattribute $1 can_change_object_identity;
+ typeattribute $1 set_curr_context;
+ typeattribute $1 process_uncond_exempt;
')
+
diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
index 3fa734c..17231cd 100644
--- a/policy/modules/kernel/domain.te
+++ b/policy/modules/kernel/domain.te
@@ -1,5 +1,5 @@
-policy_module(domain,1.4.2)
+policy_module(domain,1.4.3)
########################################
#