Re: Clamd - again...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2010-08-23 at 10:29 +0200, Dominick Grift wrote:
> On 08/23/2010 10:09 AM, Arthur Dent wrote:
> > On Sun, 2010-08-22 at 22:44 +0100, Arthur Dent wrote:
> >> On Sun, 2010-08-22 at 23:07 +0200, Dominick Grift wrote:
> >>> On 08/22/2010 08:24 PM, Arthur Dent wrote:
> >> ----
> > time->Mon Aug 23 08:57:07 2010
> > type=SYSCALL msg=audit(1282550227.058:42734): arch=40000003 syscall=102 success=no exit=-13 a0=3 a1=bf800420 a2=3 a3=1 items=0 ppid=23912 pid=23920 auid=4294967295 uid=0 gid=12 euid=0 suid=0 fsuid=0 egid=12 sgid=12 fsgid=12 tty=(none) ses=4294967295 comm="clamdscan" exe="/usr/local/bin/clamdscan" subj=system_u:system_r:procmail_t:s0 key=(null)
> > type=AVC msg=audit(1282550227.058:42734): avc:  denied  { search } for  pid=23920 comm="clamdscan" name="clamd" dev=sda6 ino=269280 scontext=system_u:system_r:procmail_t:s0 tcontext=system_u:object_r:clamd_var_run_t:s0 tclass=dir
> 
> This is still an issue:
> 
> some process running in the procmail_t domain is running
> /usr/bin/clamdscan (ls -alZ /usr/bin/clamdscan to verify its context),
> but it is not domain transitioning to the clamscan_t domain.

# which clamdscan
/usr/local/bin/clamdscan

# ls -laZ /usr/local/bin/clamdscan 
-rwxr-xr-x. root root system_u:object_r:bin_t:s0       /usr/local/bin/clamdscan

Now, in actual fact, procmail does not call clamdscan directly (it can't
deal with emails), it calls a program called clamassassin which in turn
calls clamdscan.

# ls -laZ /usr/local/bin/clamassassin 
-r-xr-xr-x. root root system_u:object_r:bin_t:s0       /usr/local/bin/clamassassin


> 
> Policy defines that if a process running in the procmail_t domain runs a
> file labelled clamscan_exec_t, that procmail_t will domain transition to
> clamscan_t domain.
> 
> This did not happen on your config.
> 
> Either your clamdscan executable file is mislabelled or you are missing
> a domain transition rule.
> 
> Where is your "clamdscan" executable file located, and what is it labelled?

see above.

> What does the following return:
> 
> sesearch -SC --allow -s procmail_t -t clamscan_t -c process
> sesearch -SC --allow -s procmail_t -t clamscan_exec_t -f file

# sesearch -SC --allow -s procmail_t -t clamscan_t -c process
Found 1 semantic av rules:
   allow procmail_t clamscan_t : process transition ; 

# sesearch -SC --allow -s procmail_t -t clamscan_exec_t -f file
sesearch: invalid option -- 'f'
Usage: sesearch [OPTIONS] RULE_TYPE [RULE_TYPE ...] [EXPESSION]
[POLICY ...]

	Try sesearch --help for more help.




Attachment: signature.asc
Description: This is a digitally signed message part

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux