Re: Selinux process transition

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks Dominick!

I had already tried to add the role access from unconfined_r to
xguest_r with no luck, but I tried it right now and it simply worked!

module dominick 1.0;

require {
type unconfined_t;
type xguest_t;
class process transition;
role xguest_r;
role unconfined_r;
}

allow unconfined_t xguest_t:process transition;
allow unconfined_r xguest_r;

It works! Thanks again!


On Fri, Jan 29, 2010 at 8:49 PM, Dominick Grift <domg472@xxxxxxxxx> wrote:
> On 01/29/2010 08:53 PM, Fernando Magro wrote:
>> Hi there,
>>
>> I have fedora 11 installed and I'm running a program with root, but
>> need to drop priviledges to another user (xguest_u) and change to the
>> proper security context. When I tried to use simple tools like runcon
>> or newrole, I wasn't able to modify the context. I tried:
>>
>> su -c 'runcon -c -t xguest_t -u xguest_u -r xguest_r -l s0
>> /usr/bin/id' unpriviledged-user-that-is-xguest_u
>>
>> I always get permission denied. After checking /var/log/audit and
>> doing an audit2allow it pointed out:
>>
>> allow unconfined_t xguest_t : process transition.
>>
>> However, when I load the module, the problem continues... Any easy way
>> to run a program with another UID and another security context from
>> root/unconfined_t/unconfined_r?
>
> I guess policycoreutils sandbox could be useful here. Or create a user
> application domain policy.
>
> With regard to what you are trying there are a few things you could try:
>
> 1. leave out the -u xguest_u. This could cause issues i believe. ( I
> have had some weird issues in this regard which to me looked like ubac
> side effects on a configuration with ubac disabled but i may be wrong )
> 2. you probably need a rule allowing role access for unconfined_r: allow
> unconfined_r xguest_r; (looks for an SELINUX_ERR in audit.log)
> 3. You should probably also modify your unconfined_u selinux user
> mapping to include the xguest_r role.
>
> Unconfined user is not designed to transition to other user domains or
> roles (except probably system_r).
>
> I think it is probably best to create a user application domain. This
> allows you to define policy that is tailor made to your applications
> properties.
>
> You could probably also extend or clone a policycoreutils sandbox to
> meet the requirement of your application.
>>
>> thanks!
>> --
>> selinux mailing list
>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>
>
>
> --
> selinux mailing list
> selinux@xxxxxxxxxxxxxxxxxxxxxxx
> https://admin.fedoraproject.org/mailman/listinfo/selinux
>
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux