Re: SELinux revisited

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thursday 18 October 2007, Gene Heskett wrote:
>On Thursday 18 October 2007, Andy Green wrote:
>>Somebody in the thread at some point said:
>>> Greetings;
>>>
>>> Running 2.6.23 here, on a AMD XP-2800, gig of ram, lots of drive.
>>>
>>> I thought maybe I should give selinux another chance here.  So I removed
>>> the selinux=0 in my grub.conf, and edited its .conf file in
>>> /etc/sysconfig to set it for permissive.
>>>
>>> On the reboot, the relabel wasn't done, so I looked around and reset a
>>> fresh /.autorelabel file and rebooted again.  It was already present
>>> however.
>>>
>>> This time it did a very short autorelabel, maybe 2 screens full and was
>>> done in just a couple of seconds, at which point it went into yet another
>>> reboot cycle making me think it was stuck in a loop or something.
>>
>>Sounds like you are going about it in a good way FWIW.
>>
>>> But the next reboot then had auditd advise me there was an error in line
>>> 16 of /etc/audit/auditd.rules.
>>
>>That file looks like this here, in full:
>>
>># This file contains the auditctl rules that are loaded
>># whenever the audit daemon is started via the initscripts.
>># The rules are simply the parameters that would be passed
>># to auditctl.
>>
>># First rule - delete all
>>-D
>>
>># Increase the buffers to survive stress events.
>># Make this bigger for busy systems
>>-b 320
>>
>># Feel free to add below this line. See auditctl man page
>>
>>
>>Here's the state of the selinux packages here for reference
>>
>># rpm -qa | grep selinux
>>libselinux-2.0.14-9.fc7
>>libselinux-python-2.0.14-9.fc7
>>selinux-policy-targeted-2.6.4-48.fc7
>>selinux-policy-2.6.4-48.fc7
>># rpm -qa | grep audit
>>audit-libs-python-1.5.6-2.fc7
>>audit-libs-1.5.6-2.fc7
>>audit-1.5.6-2.fc7
>
>All fc6 here, but uptodate.
>
>># chkconfig --list | grep audit
>>auditd          0:off   1:off   2:on    3:on    4:on    5:on    6:off
>>
>>I would nuke the entries at the end of your /etc/audit/auditd.rules and
>>retry.
>
>I'll give that a shot tomorrow, its getting sleepy out around here, 4am &
> I've already lost any chance at beauty sleep, which wouldn't help at my age
> anyway. :)
>
>>-Andy
>
>Thanks Andy.
>
Ok, up again, nuked a pint of coffee but its too hot yet.

I commented that line 16 in audit.rules, and it moved the error to line 17, so 
I commented that one too.

Step & repeat until there is only one active line in the file, line 15.
--------------
# This file contains the auditctl rules that are loaded
# whenever the audit daemon is started via the initscripts.
# The rules are simply the parameters that would be passed
# to auditctl.

# First rule - delete all
-D

# Increase the buffers to survive stress events.
# Make this bigger for busy systems
-b 320

# Feel free to add below this line. See auditctl man page

-a exit,always -S chroot
#-a exit,always -S chdir -F obj_type=dhclient_t
#-a exit,always -S chdir -F obj_type=sendmail_t
#-a exit,always -S chdir -F obj_type=mcstransd_t
#-a exit,always -S chdir -F obj_type=sshd_t
#-a exit,always -S chdir -F obj_type=ntpd_t
#-a exit,always -S chdir -F obj_type=samba_t
#-a exit,always -S chdir -F obj_type=named_t
#-a exit,always -S chdir -F obj_type=klogd_t
#-a exit,always -S chdir -F obj_type=crond_t
#-a exit,always -S chdir -F obj_type=httpd_t
#-a exit,always -S chdir -F obj_type=auditd_t
#-a exit,always -S chdir -F obj_type=portmap_t
#-a exit,always -S chdir -F obj_type=syslogd_t
-----------
Now it seems to me that those rules were there for a reason, and to have to 
comment all but the first one out to get rid of the error:
---------
[root@coyote audit]# service auditd restart
Stopping auditd:                                           [  OK  ]
Starting auditd:                                           [  OK  ]
Error sending add rule data request (Unknown error 524)
There was an error in line 27 of /etc/audit/audit.rules
[root@coyote audit]# vim audit.rules
[root@coyote audit]# service auditd restart
Stopping auditd:                                           [  OK  ]
Starting auditd:                                           [  OK  ]
----------
isn't the real problem, so what do the experts here think?

SELinux is running in permissive mode, and seems to be logging res=success for 
everything so far, so it may be possible to set it to targeted.  I figured if 
I tried it on a known, fully working system, that would be a hell of a lot 
more accurate test than trying to make it work on a fresh install, which 
forced me to disable it months ago.

Would it have logged res=denied for anything if set to permissive?

-- 
Cheers, Gene
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
A Vulcan can no sooner be disloyal than he can exist without breathing.
		-- Kirk, "The Menagerie", stardate 3012.4

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux