Re: gpg avc

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2004-04-20 at 22:36, Colin Walters wrote:
> On Tue, 2004-04-20 at 22:02, Josh Boyer wrote:
> > Trying to generate a new gpg key fails with the latest policy updates. 
> > Below is the avc:
> > 
> > audit(1082512578.827:0): avc:  denied  { read } for  pid=2543
> > exe=/usr/bin/gpg name=random dev=hda5 ino=267501
> > scontext=user_u:user_r:user_gpg_t
> > tcontext=system_u:object_r:random_device_t tclass=chr_file
> > 
> > [jwboyer@localhost jwboyer]$ rpm -q policy
> > policy-1.11.2-9
> 
> Try this patch, will be in the next policy.

I presume by the way there's a reason access to random_device_t is was
originally denied - it prevents users from draining your good entropy by
generating a ton of keys. On the other hand, if you have GPG installed
on a system, I think most system administrators are going to expect
users to be able to generate keys securely.  

Maybe the right way is a resource constraint framework.  Anyways, do
people think this is worth being made into a tunable or something?

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux