Re: Clamd - again...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/23/2010 12:20 PM, Arthur Dent wrote:
> On Mon, 2010-08-23 at 10:56 +0200, Dominick Grift wrote:
>> On 08/23/2010 10:47 AM, Arthur Dent wrote:
>>> On Mon, 2010-08-23 at 10:42 +0200, Dominick Grift wrote:
>>>> On 08/23/2010 10:40 AM, Arthur Dent wrote:
>>>>> On Mon, 2010-08-23 at 10:29 +0200, Dominick Grift wrote:
>>>>>> On 08/23/2010 10:09 AM, Arthur Dent wrote:
>>>>>>> On Sun, 2010-08-22 at 22:44 +0100, Arthur Dent wrote:
>>>>>>>> On Sun, 2010-08-22 at 23:07 +0200, Dominick Grift wrote:
>>>>>>>>> On 08/22/2010 08:24 PM, Arthur Dent wrote:
>>>>>>>> ----
>>>>>>> time->Mon Aug 23 08:57:07 2010
>>>>>>> type=SYSCALL msg=audit(1282550227.058:42734): arch=40000003 syscall=102 success=no exit=-13 a0=3 a1=bf800420 a2=3 a3=1 items=0 ppid=23912 pid=23920 auid=4294967295 uid=0 gid=12 euid=0 suid=0 fsuid=0 egid=12 sgid=12 fsgid=12 tty=(none) ses=4294967295 comm="clamdscan" exe="/usr/local/bin/clamdscan" subj=system_u:system_r:procmail_t:s0 key=(null)
>>>>>>> type=AVC msg=audit(1282550227.058:42734): avc:  denied  { search } for  pid=23920 comm="clamdscan" name="clamd" dev=sda6 ino=269280 scontext=system_u:system_r:procmail_t:s0 tcontext=system_u:object_r:clamd_var_run_t:s0 tclass=dir
>>>>>>
>>>>>> This is still an issue:
>>>>>>
>>>>>> some process running in the procmail_t domain is running
>>>>>> /usr/bin/clamdscan (ls -alZ /usr/bin/clamdscan to verify its context),
>>>>>> but it is not domain transitioning to the clamscan_t domain.
>>>>>
>>>>> # which clamdscan
>>>>> /usr/local/bin/clamdscan
>>>>>
>>>>> # ls -laZ /usr/local/bin/clamdscan 
>>>>> -rwxr-xr-x. root root system_u:object_r:bin_t:s0       /usr/local/bin/clamdscan
>>>>>
>>>>> Now, in actual fact, procmail does not call clamdscan directly (it can't
>>>>> deal with emails), it calls a program called clamassassin which in turn
>>>>> calls clamdscan.
>>>>>
>>>>> # ls -laZ /usr/local/bin/clamassassin 
>>>>> -r-xr-xr-x. root root system_u:object_r:bin_t:s0       /usr/local/bin/clamassassin
>>>>>
>>>>
>>>> Why are these files located there and not /usr/bin where they are
>>>> expected to be? The files are mislabelled.
>>>
>>> In both cases I compiled from source and accepted the defaults
>>> in ./configure.
>>>
>>> I guess I could try to recompile them in /usr/bin if it is a problem -
>>> but I'm no expert...
>>
>> The problem there is; who knows what other locations owned by these apps
>> differ from the expected locations.
>>
>> Why are you not using redhat supplied packages?
> 
> Well I started compiling clam from source about 3 or 4 years ago. I got
> frustrated with the fact that (at that time - I don't know if it's
> better now) it would take sometimes 3-4 weeks after a new release of
> clam before the redhat package became available. In the meantime I would
> have to put up with daily warnings in syslog.
> 
> Also, I am often unable to upgrade to the latest Fedora package until it
> is already at end of life (viz - I have only just upgraded to F13 from
> F11) and the clam packages would often not be available at all...
>>
>> As for clamdscan; for now you could try the following to see if it would
>> work if this file is labelled correctly:
>>
>> chcon -t clamscan_exec_t /usr/local/bin/clamdscan
>>
>> See if that makes things work for you
> 
> Well I am still getting permission denied...
> 
> Latest messages:
> 
> ----
> time->Mon Aug 23 11:09:06 2010
> type=SYSCALL msg=audit(1282558146.211:43246): arch=40000003 syscall=11
> success=yes exit=0 a0=15559d0 a1=bf9c9f7c a2=303840 a3=41904 items=0
> ppid=24933 pid=24934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0
> egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="procmail"
> exe="/usr/bin/procmail" subj=system_u:system_r:procmail_t:s0 key=(null)
> type=AVC msg=audit(1282558146.211:43246): avc:  denied  { noatsecure }
> for  pid=24934 comm="procmail" scontext=system_u:system_r:sendmail_t:s0
> tcontext=system_u:system_r:procmail_t:s0 tclass=process
> type=AVC msg=audit(1282558146.211:43246): avc:  denied  { siginh } for
> pid=24934 comm="procmail" scontext=system_u:system_r:sendmail_t:s0
> tcontext=system_u:system_r:procmail_t:s0 tclass=process
> type=AVC msg=audit(1282558146.211:43246): avc:  denied  { rlimitinh }
> for  pid=24934 comm="procmail" scontext=system_u:system_r:sendmail_t:s0
> tcontext=system_u:system_r:procmail_t:s0 tclass=process
> ----
> time->Mon Aug 23 11:12:05 2010
> type=SYSCALL msg=audit(1282558325.997:43259): arch=40000003 syscall=11
> success=yes exit=0 a0=15559d0 a1=bf9c9f7c a2=303840 a3=41904 items=0
> ppid=24953 pid=24954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0
> egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="procmail"
> exe="/usr/bin/procmail" subj=system_u:system_r:procmail_t:s0 key=(null)
> type=AVC msg=audit(1282558325.997:43259): avc:  denied  { noatsecure }
> for  pid=24954 comm="procmail" scontext=system_u:system_r:sendmail_t:s0
> tcontext=system_u:system_r:procmail_t:s0 tclass=process
> type=AVC msg=audit(1282558325.997:43259): avc:  denied  { siginh } for
> pid=24954 comm="procmail" scontext=system_u:system_r:sendmail_t:s0
> tcontext=system_u:system_r:procmail_t:s0 tclass=process
> type=AVC msg=audit(1282558325.997:43259): avc:  denied  { rlimitinh }
> for  pid=24954 comm="procmail" scontext=system_u:system_r:sendmail_t:s0
> tcontext=system_u:system_r:procmail_t:s0 tclass=process
> ----
> time->Mon Aug 23 11:12:06 2010
> type=SYSCALL msg=audit(1282558326.163:43260): arch=40000003 syscall=11
> success=yes exit=0 a0=9d75660 a1=9d75538 a2=9d715b8 a3=9d75538 items=0
> ppid=24956 pid=24960 auid=4294967295 uid=0 gid=12 euid=0 suid=0 fsuid=0
> egid=12 sgid=12 fsgid=12 tty=(none) ses=4294967295 comm="clamdscan"
> exe="/usr/local/bin/clamdscan" subj=system_u:system_r:clamscan_t:s0
> key=(null)
> type=AVC msg=audit(1282558326.163:43260): avc:  denied  { noatsecure }
> for  pid=24960 comm="clamdscan" scontext=system_u:system_r:procmail_t:s0
> tcontext=system_u:system_r:clamscan_t:s0 tclass=process
> type=AVC msg=audit(1282558326.163:43260): avc:  denied  { siginh } for
> pid=24960 comm="clamdscan" scontext=system_u:system_r:procmail_t:s0
> tcontext=system_u:system_r:clamscan_t:s0 tclass=process
> type=AVC msg=audit(1282558326.163:43260): avc:  denied  { rlimitinh }
> for  pid=24960 comm="clamdscan" scontext=system_u:system_r:procmail_t:s0
> tcontext=system_u:system_r:clamscan_t:s0 tclass=process
> type=AVC msg=audit(1282558326.163:43260): avc:  denied  { read } for
> pid=24960 comm="clamdscan" path="/var/spool/mqueue/dfo7NAC5wD024952"
> dev=sda6 ino=14772 scontext=system_u:system_r:clamscan_t:s0
> tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=file
> ----
> time->Mon Aug 23 11:12:06 2010
> type=SYSCALL msg=audit(1282558326.179:43261): arch=40000003 syscall=102
> success=no exit=-13 a0=3 a1=bfcfd440 a2=3 a3=0 items=0 ppid=24956
> pid=24960 auid=4294967295 uid=0 gid=12 euid=0 suid=0 fsuid=0 egid=12
> sgid=12 fsgid=12 tty=(none) ses=4294967295 comm="clamdscan"
> exe="/usr/local/bin/clamdscan" subj=system_u:system_r:clamscan_t:s0
> key=(null)
> type=AVC msg=audit(1282558326.179:43261): avc:  denied  { connectto }
> for  pid=24960 comm="clamdscan" path="/var/run/clamd/clamd.sock"
> scontext=system_u:system_r:clamscan_t:s0
> tcontext=unconfined_u:system_r:initrc_t:s0 tclass=unix_stream_socket
> ----
> time->Mon Aug 23 11:12:06 2010
> type=SYSCALL msg=audit(1282558326.209:43262): arch=40000003 syscall=11
> success=yes exit=0 a0=9d75ab0 a1=9d75380 a2=9d715b8 a3=9d75380 items=0
> ppid=24956 pid=24964 auid=4294967295 uid=0 gid=12 euid=0 suid=0 fsuid=0
> egid=12 sgid=12 fsgid=12 tty=(none) ses=4294967295 comm="clamdscan"
> exe="/usr/local/bin/clamdscan" subj=system_u:system_r:clamscan_t:s0
> key=(null)
> type=AVC msg=audit(1282558326.209:43262): avc:  denied  { noatsecure }
> for  pid=24964 comm="clamdscan" scontext=system_u:system_r:procmail_t:s0
> tcontext=system_u:system_r:clamscan_t:s0 tclass=process
> type=AVC msg=audit(1282558326.209:43262): avc:  denied  { siginh } for
> pid=24964 comm="clamdscan" scontext=system_u:system_r:procmail_t:s0
> tcontext=system_u:system_r:clamscan_t:s0 tclass=process
> type=AVC msg=audit(1282558326.209:43262): avc:  denied  { rlimitinh }
> for  pid=24964 comm="clamdscan" scontext=system_u:system_r:procmail_t:s0
> tcontext=system_u:system_r:clamscan_t:s0 tclass=process
> type=AVC msg=audit(1282558326.209:43262): avc:  denied  { read } for
> pid=24964 comm="clamdscan" path="/var/spool/mqueue/dfo7NAC5wD024952"
> dev=sda6 ino=14772 scontext=system_u:system_r:clamscan_t:s0
> tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=file
> type=AVC msg=audit(1282558326.209:43262): avc:  denied  { write } for
> pid=24964 comm="clamdscan" path="/tmp/clamassassinlog.9knHcazJ44"
> dev=sda6 ino=86007 scontext=system_u:system_r:clamscan_t:s0
> tcontext=system_u:object_r:procmail_tmp_t:s0 tclass=file
> type=AVC msg=audit(1282558326.209:43262): avc:  denied  { read } for
> pid=24964 comm="clamdscan" path="/tmp/clamassassinmsg.fyU9qe9Rn4"
> dev=sda6 ino=67816 scontext=system_u:system_r:clamscan_t:s0
> tcontext=system_u:object_r:procmail_tmp_t:s0 tclass=file

this is due to clamassassin not having its own policy currently. You
could probably allow this with audit2allow but only after the problem
described below is fixed.

> ----
> time->Mon Aug 23 11:12:06 2010
> type=SYSCALL msg=audit(1282558326.213:43263): arch=40000003 syscall=102
> success=no exit=-13 a0=3 a1=bf9e8a30 a2=3 a3=1 items=0 ppid=24956
> pid=24964 auid=4294967295 uid=0 gid=12 euid=0 suid=0 fsuid=0 egid=12
> sgid=12 fsgid=12 tty=(none) ses=4294967295 comm="clamdscan"
> exe="/usr/local/bin/clamdscan" subj=system_u:system_r:clamscan_t:s0
> key=(null)
> type=AVC msg=audit(1282558326.213:43263): avc:  denied  { connectto }
> for  pid=24964 comm="clamdscan" path="/var/run/clamd/clamd.sock"
> scontext=system_u:system_r:clamscan_t:s0
> tcontext=unconfined_u:system_r:initrc_t:s0 tclass=unix_stream_socket

Looks like clamd again/or still runs in the init script domain.
Therefore clamdscan cannot connect to it

ps -auxZ | grep initrc_t

We need to make sure that clamd runs in its own domain.

> ----
> time->Mon Aug 23 11:12:06 2010
> type=SYSCALL msg=audit(1282558326.267:43264): arch=40000003 syscall=11
> success=yes exit=0 a0=9e31dd0 a1=9e334c8 a2=9e33620 a3=9e334c8 items=0
> ppid=24967 pid=24968 auid=4294967295 uid=0 gid=12 euid=0 suid=0 fsuid=0
> egid=12 sgid=12 fsgid=12 tty=(none) ses=4294967295 comm="spamc"
> exe="/usr/bin/spamc" subj=system_u:system_r:spamc_t:s0 key=(null)
> type=AVC msg=audit(1282558326.267:43264): avc:  denied  { noatsecure }
> for  pid=24968 comm="spamc" scontext=system_u:system_r:procmail_t:s0
> tcontext=system_u:system_r:spamc_t:s0 tclass=process
> type=AVC msg=audit(1282558326.267:43264): avc:  denied  { siginh } for
> pid=24968 comm="spamc" scontext=system_u:system_r:procmail_t:s0
> tcontext=system_u:system_r:spamc_t:s0 tclass=process
> type=AVC msg=audit(1282558326.267:43264): avc:  denied  { rlimitinh }
> for  pid=24968 comm="spamc" scontext=system_u:system_r:procmail_t:s0
> tcontext=system_u:system_r:spamc_t:s0 tclass=process
> ----
> time->Mon Aug 23 11:12:06 2010
> type=SYSCALL msg=audit(1282558326.309:43265): arch=40000003 syscall=5
> success=no exit=-13 a0=606a29 a1=80000 a2=1b6 a3=6069c5 items=0
> ppid=20953 pid=20954 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
> sgid=0 fsgid=0 tty=(none) ses=772 comm="spamd" exe="/usr/bin/perl"
> subj=unconfined_u:system_r:spamd_t:s0 key=(null)
> type=AVC msg=audit(1282558326.309:43265): avc:  denied  { read } for
> pid=20954 comm="spamd" name="shadow" dev=sda6 ino=85497
> scontext=unconfined_u:system_r:spamd_t:s0
> tcontext=system_u:object_r:shadow_t:s0 tclass=file
> ----
> time->Mon Aug 23 11:12:09 2010
> type=SYSCALL msg=audit(1282558329.941:43268): arch=40000003 syscall=300
> success=no exit=-13 a0=9 a1=243c883 a2=bf8d6de0 a3=0 items=0 ppid=1
> pid=1228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0
> fsgid=0 tty=(none) ses=4294967295 comm="rpc.mountd"
> exe="/usr/sbin/rpc.mountd" subj=system_u:system_r:nfsd_t:s0 key=(null)
> type=AVC msg=audit(1282558329.941:43268): avc:  denied  { getattr } for
> pid=1228 comm="rpc.mountd" path="/proc/kcore" dev=proc ino=4026531989
> scontext=system_u:system_r:nfsd_t:s0
> tcontext=system_u:object_r:proc_kcore_t:s0 tclass=file
> ----
> time->Mon Aug 23 11:12:09 2010
> type=SYSCALL msg=audit(1282558329.947:43269): arch=40000003 syscall=5
> success=no exit=-13 a0=243b978 a1=8000 a2=0 a3=243b938 items=0 ppid=1
> pid=1228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0
> fsgid=0 tty=(none) ses=4294967295 comm="rpc.mountd"
> exe="/usr/sbin/rpc.mountd" subj=system_u:system_r:nfsd_t:s0 key=(null)
> type=AVC msg=audit(1282558329.947:43269): avc:  denied  { read } for
> pid=1228 comm="rpc.mountd" name="sda8" dev=devtmpfs ino=5613
> scontext=system_u:system_r:nfsd_t:s0
> tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file
> ----
> 
> 
> 
>>>>
>>>>>>
>>>>>> Policy defines that if a process running in the procmail_t domain runs a
>>>>>> file labelled clamscan_exec_t, that procmail_t will domain transition to
>>>>>> clamscan_t domain.
>>>>>>
>>>>>> This did not happen on your config.
>>>>>>
>>>>>> Either your clamdscan executable file is mislabelled or you are missing
>>>>>> a domain transition rule.
>>>>>>
>>>>>> Where is your "clamdscan" executable file located, and what is it labelled?
>>>>>
>>>>> see above.
>>>>>
>>>>>> What does the following return:
>>>>>>
>>>>>> sesearch -SC --allow -s procmail_t -t clamscan_t -c process
>>>>>> sesearch -SC --allow -s procmail_t -t clamscan_exec_t -f file
>>>>>
>>>>> # sesearch -SC --allow -s procmail_t -t clamscan_t -c process
>>>>> Found 1 semantic av rules:
>>>>>    allow procmail_t clamscan_t : process transition ; 
>>>>>
>>>>> # sesearch -SC --allow -s procmail_t -t clamscan_exec_t -f file
>>>>> sesearch: invalid option -- 'f'
>>>>> Usage: sesearch [OPTIONS] RULE_TYPE [RULE_TYPE ...] [EXPESSION]
>>>>> [POLICY ...]
>>>>>
>>>>> 	Try sesearch --help for more help.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> selinux mailing list
>>>>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>>
>>>>
>>>> --
>>>> selinux mailing list
>>>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>>
>>>>
>>>> --
>>>> selinux mailing list
>>>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>
>>
>> --
>> selinux mailing list
>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>
>>
>> --
>> selinux mailing list
>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>> https://admin.fedoraproject.org/mailman/listinfo/selinux


Attachment: signature.asc
Description: OpenPGP digital signature

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux