On Mon, 5 Apr 2010 06:32:23 -0700 (PDT) Vadym Chepkov <chepkov@xxxxxxxxx> wrote: > --- On Mon, 4/5/10, Daniel J Walsh <dwalsh@xxxxxxxxxx> wrote: > > > From: Daniel J Walsh <dwalsh@xxxxxxxxxx> > > Subject: Re: httpd mod_auth_pam winbind > > To: "Vadym Chepkov" <chepkov@xxxxxxxxx> > > Cc: selinux@xxxxxxxxxxxxxxxxxxxxxxx > > Date: Monday, April 5, 2010, 8:11 AM > > On 04/02/2010 12:58 PM, Vadym Chepkov > > wrote: > > > --- On Fri, 4/2/10, Daniel J Walsh<dwalsh@xxxxxxxxxx> > > wrote: > > > > > > > > >> From: Daniel J Walsh<dwalsh@xxxxxxxxxx> > > >> Subject: Re: httpd mod_auth_pam winbind > > >> To: "Vadym Chepkov"<chepkov@xxxxxxxxx> > > >> Cc: selinux@xxxxxxxxxxxxxxxxxxxxxxx > > >> Date: Friday, April 2, 2010, 11:33 AM > > >> On 04/02/2010 12:38 AM, Vadym Chepkov > > >> wrote: > > >> > > >>> Hi, > > >>> > > >>> I have > > selinux-policy-targeted-2.4.6-255.el5_4.4 > > >>> > > >>> allow_httpd_mod_auth_pam > > --> on > > >>> httpd_can_network_connect > > --> on > > >>> > > >>> httpd with mod_auth_pam via winbind > > >>> > > >>> get the following avc when in "permissive" > > mode > > >>> > > >>> > > >>> type=SYSCALL msg=audit(1270181973.950:37): > > >>> > > >> arch=c000003e syscall=41 success=yes exit=19 a0=10 > > a1=3 a2=9 > > >> a3=0 items=0 ppid=2032 pid=2039 auid=4294967295 > > uid=48 > > >> gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 > > fsgid=48 > > >> tty=(none) ses=4294967295 comm="httpd" > > exe="/usr/sbin/httpd" > > >> subj=user_u:system_r:httpd_t:s0 key=(null) > > >> > > >>> type=AVC msg=audit(1270181973.950:37): avc: > > >>> > > >> denied { create } for pid=2039 > > comm="httpd" > > >> scontext=user_u:system_r:httpd_t:s0 > > >> tcontext=user_u:system_r:httpd_t:s0 > > >> tclass=netlink_audit_socket > > >> > > >>> type=SYSCALL msg=audit(1270181973.950:38): > > >>> > > >> arch=c000003e syscall=44 success=yes exit=124 > > a0=13 > > >> a1=7fff640fa9c0 a2=7c a3=0 items=0 ppid=2032 > > pid=2039 > > >> auid=4294967295 uid=48 gid=48 euid=48 suid=48 > > fsuid=48 > > >> egid=48 sgid=48 fsgid=48 tty=(none) > > ses=4294967295 > > >> comm="httpd" exe="/usr/sbin/httpd" > > >> subj=user_u:system_r:httpd_t:s0 key=(null) > > >> > > >>> type=AVC msg=audit(1270181973.950:38): avc: > > >>> > > >> denied { nlmsg_relay } for pid=2039 > > comm="httpd" > > >> scontext=user_u:system_r:httpd_t:s0 > > >> tcontext=user_u:system_r:httpd_t:s0 > > >> tclass=netlink_audit_socket > > >> > > >>> type=AVC msg=audit(1270181973.950:38): avc: > > >>> > > >> denied { write } for pid=2039 > > comm="httpd" > > >> scontext=user_u:system_r:httpd_t:s0 > > >> tcontext=user_u:system_r:httpd_t:s0 > > >> tclass=netlink_audit_socket > > >> > > >>> type=SYSCALL msg=audit(1270181973.950:39): > > >>> > > >> arch=c000003e syscall=45 success=yes exit=36 > > a0=13 > > >> a1=7fff640f8690 a2=231c a3=42 items=0 ppid=2032 > > pid=2039 > > >> auid=4294967295 uid=48 gid=48 euid=48 suid=48 > > fsuid=48 > > >> egid=48 sgid=48 fsgid=48 tty=(none) > > ses=4294967295 > > >> comm="httpd" exe="/usr/sbin/httpd" > > >> subj=user_u:system_r:httpd_t:s0 key=(null) > > >> > > >>> type=AVC msg=audit(1270181973.950:39): avc: > > >>> > > >> denied { read } for pid=2039 > > comm="httpd" > > >> scontext=user_u:system_r:httpd_t:s0 > > >> tcontext=user_u:system_r:httpd_t:s0 > > >> tclass=netlink_audit_socket > > >> > > >>> audit2allow suggests simple: > > >>> allow httpd_t self:netlink_audit_socket { > > nlmsg_relay > > >>> > > >> write create read }; > > >> > > >>> Is something missing in the policy or I missed > > some > > >>> > > >> other boolean? > > >> > > >>> > > >>> > > >> No this could be considered a bug. Basically > > pam is > > >> trying to send an > > >> audit message to the audit.log. > > >> > > >> YOu can add this access, it would allow the > > appache > > >> process to attempt > > >> to send audit messages. Since the httpd is > > running as > > >> non root, it > > >> might not have the capabilities necessary to send > > them > > >> > > >> Open a bug report on this, since we probably > > should > > >> dontaudit these > > >> calls if the boolean to allow pam is turned on. > > >> > > > dontaudit wouldn't work, apache denies access in > > enforcing mode. > > > > > > Bug 579105 Submitted > > > > > > Thank you, > > > > > > Sincerely yours, > > > Vadym Chepkov > > > > > > > > > -- > > > selinux mailing list > > > selinux@xxxxxxxxxxxxxxxxxxxxxxx > > > https://admin.fedoraproject.org/mailman/listinfo/selinux > > > > > Vadym, Please open a bug on RHEL5 to add this > > functionality. I will add > > it to RHEL6, now > > Dan, > > I did open BZ 579105 on RHEL5. By the way is RHEL6 can be downloaded > as a beta, perhaps already? I don't see it on RHN, only RHEL5.5-beta RHEL 5.5 went "gold" last week. I have two servers already running it. Paul. -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/selinux