Re: Help Needed Identifying a File and a Security Failure on it.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Tim:
>> You could use the file, less, cat, or hexdump commands.  "file"
>> would try to identify it, the others will just show you the
>> contents for you to try and identify it.
>>
>> If it's zero bytes in size, the system is probably just using the
>> name of the file, itself, to do a job.
> 


Stephen Morris:
> What I'm trying to determine is why journal-offline get a security 
> failure on that file and not the equivalent file that has system before 
> the @, especially when all 4 files in /var/log/journal are owned by 
> root. If the ".#" is removed and the suffix after journal is removed 
> then that file seems to be being persisted across boots, or is being 
> deleted and recreated across boots, so why should there be an selinux 
> issue and is it a bug?

Well, I was just answering the identifying what the file was question.

But, SELinux applies its rules to new files based on filepaths/names. 
When files are written, SELinux labels it according to its rules.

If I create any old file in my homespace, it's likely to get the
context of "unconfined_u:object_r:user_home_t:s0"

[tim@fluffy ~]$ touch nothing
[tim@fluffy ~]$ ll -Z nothing 
-rw-rw-r--. 1 tim tim unconfined_u:object_r:user_home_t:s0 0 Dec 24
23:20 nothing

But if I look at another file, one with special meaning that special
rules have been created to handle it, you can see it has different
contexts:

-rw-------.  1 tim  tim  system_u:object_r:xdm_home_t:s0           
9275 Dec 24 23:16 .xsession-errors

And some other ones, as further examples:

[tim@fluffy ~]$ ll -aZ .config/pulse/
total 12
drwx------.  2 tim tim unconfined_u:object_r:pulseaudio_home_t:s0 4096
Nov 20 07:37 .
drwxr-xr-x. 32 tim tim unconfined_u:object_r:config_home_t:s0     4096
Dec 12 11:54 ..
-rw-------.  1 tim tim unconfined_u:object_r:pulseaudio_home_t:s0  256
Jun 12  2022 cookie
lrwxrwxrwx.  1 tim tim unconfined_u:object_r:pulseaudio_home_t:s0   23
Nov 20 07:37 f700387ca7ba4498a9edcb910aee3078-runtime -> /tmp/pulse-
M5DMLD7vGw9D


So, I suppose the questions about your file may be:

Was your file named in an expected way, and stored in an expected
location?

And is it one that SELinux is supposed to know about?

If it's an oddball unexpected thing, it might end up with generic
SELinux contexts that label it as a naughty foreign file.

If I look in /var/log/journal/long-hash-of-psuedo-random-numbers/, none
of the files in there start with a dot or hash character.  I wonder if
it something's failing as it's creating a journal file, and mangling
things?  And without knowing it's contents, we can't guess at what's
causing its creation.

All the files in my /var/log/journal/j0rwsdf9u09usdf;oughj;/ filepath
(I faked the hash, there) have this SELinux context:

   systemd-journal system_u:object_r:var_log_t:s0 

If your problem file doesn't have that, you could try setting it to
that, and see if you can read it.

>From time to time the behaviours of our systems change, and SELinux
gets updated with new rules to handle them.  Sometimes there's a
relabelling of files as part of those changes.

Have you had any SELinux updates recently?

-- 
 
NB:  All unexpected mail to my mailbox is automatically deleted.
I will only get to see the messages that are posted to the list.
 
The following system info data is generated fresh for each post:
 
uname -rsvp
Linux 6.0.10-200.fc36.x86_64 #1 SMP PREEMPT_DYNAMIC Sat Nov 26 16:53:11
UTC 2022 x86_64
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux