Re: error: ssh_selinux_getctxbyname: Failed to get default SELinux security context

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/29/2010 08:23 AM, Daniel J Walsh wrote:
> On 09/29/2010 03:26 AM, imsand@xxxxxxxxx wrote:
>>> On Tue, Sep 28, 2010 at 03:51:11PM +0200, imsand@xxxxxxxxx wrote:
>>>>> On Tue, Sep 28, 2010 at 01:56:13PM +0200, imsand@xxxxxxxxx wrote:
>>>>>>> On 28/09/10 08:24, imsand@xxxxxxxxx wrote:
>>>>>>>> Hello
>>>>>>>>
>>>>>>>> I get the following error when I try to log in through ssh (even
>>>> if
>>>>>>>> selinux is in permissive mode!!!):
>>>>>>>>
>>>>>>>> Sep 28 09:01:32 stvlx05.test.ch sshd[12614]: Accepted
>>>>>>>> keyboard-interactive/pam for mat from 131.102.233.127 port 58912
>>>> ssh2
>>>>>>>> Sep 28 09:01:32 stvlx05.test.admin.ch kernel: [60557.252750]
>>>>>> type=1400
>>>>>>>> audit(1285657292.298:286): avc:  denied  { audit_control } for
>>>>>>>> pid=12614
>>>>>>>> comm="sshd" capability=30  scontext=system_u:system_r:sysadm_t
>>>>>>>> tcontext=system_u:system_r:sysadm_t tclass=capability
>>>>>>>> Sep 28 09:01:32 stvlx05.test.ch sshd[12621]: error:
>>>>>>>> ssh_selinux_getctxbyname: Failed to get default SELinux security
>>>>>> context
>>>>>>>> for mat
>>>>>>>> Sep 28 09:01:32 stvlx05.test.ch sshd[12614]: error:
>>>>>>>> ssh_selinux_getctxbyname: Failed to get default SELinux security
>>>>>> context
>>>>>>>> for mat
>>>>>>>> Sep 28 09:01:32 stvlx05.test.ch sshd[12614]: error:
>>>>>>>> ssh_selinux_setup_pty:
>>>>>>>> security_compute_relabel: Invalid argument
>>>>>>>>
>>>>>>>> I already went through this post:
>>>>>>>> http://www.nsa.gov/research/selinux/list-archive/0910/30906.shtml
>>>> but
>>>>>> I
>>>>>>>> can't figure out the exact problem.
>>>>>>>>
>>>>>>>> Here is what I've done so far:
>>>>>>>> - Downloaded the latest reference policy from tresys:
>>>>>>>> http://oss.tresys.com/files/refpolicy/refpolicy-2.20100524.tar.bz2
>>>>>>>> - Compiled and installed it on my sles 11.1
>>>>>>>> - set selinux into permissive mode: (so far so good.. :))
>>>>>>>> sestatus
>>>>>>>> SELinux status:                 enabled
>>>>>>>> SELinuxfs mount:                /selinux
>>>>>>>> Current mode:                   permissive
>>>>>>>> Mode from config file:          permissive
>>>>>>>> Policy version:                 24
>>>>>>>> Policy from config file:        refpolicy
>>>>>>>> - Add selinux user "mat_u": semanage user -R "staff_r system_r" -P
>>>>>> user
>>>>>>>> -a
>>>>>>>> mat_u
>>>>>>>> - Add linux user " mat": useradd mat
>>>>>>>> - Set password for "mat": passwd mat
>>>>>>>> - User mapping: semanage login -s mat_u -a mat
>>>>>>>> - add security context for "mat_u" by copying staff_u's context
>>>>>> (don't
>>>>>>>> know if that's needed??!): cp
>>>>>>>> /etc/selinux/refpolicy/contexts/user/staff_u
>>>>>>>> /etc/selinux/refpolicy/contexts/user/mat_u
>>>>>>>> - set boolean for sysadm ssh login to true (don't know if thats
>>>>>>>> needed?!):
>>>>>>>> setsebool ssh_sysadm_login on
>>>>>>>>
>>>>>>>> In other posts I've read something about sepermit.conf and
>>>>>>>> namespace.conf
>>>>>>>> but these files don't exist on my system. What about these files?
>>>> Do
>>>>>> I
>>>>>>>> need them?
>>>>>>>> What's wrong on my system?
>>>>>>>> Why it's not possible to login even if selinux is in permissive
>>>> mode?
>>>>>>>> Any suggestions?
>>>>>>>
>>>>>>> I'd start by trying to figure out why sshd isn't running in sshd_t
>>>> (it
>>>>>>> seems to be running in sysadm_t).
>>>>>>>
>>>>>>> Paul.
>>>>>>> --
>>>>>>> selinux mailing list
>>>>>>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>>>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>>>>>
>>>>>>
>>>>>> Yes, sshd is running in sysadm_t:
>>>>>>
>>>>>> # ps axZ | grep sshd
>>>>>> system_u:system_r:sysadm_t       3632 ?        Ss     0:00
>>>>>> /usr/sbin/sshd
>>>>>> -o PidFile=/var/run/sshd.init.pi
>>>>>>
>>>>>> # ls -Z /usr/sbin/sshd
>>>>>> system_u:object_r:sshd_exec_t /usr/sbin/sshd
>>>>>>
>>>>>> Don't know why it's not sshd_t. I didn't modified something. It's a
>>>>>> standard installation of sles11 with the default reference policy
>>>> from
>>>>>> tresys.
>>>>>>
>>>>>> Maybe this code snippet from policy/modules/services/ssh.te is
>>>>>> responsible
>>>>>> for that:
>>>>>> ## <desc>
>>>>>> ## <p>
>>>>>> ## Allow ssh logins as sysadm_r:sysadm_t
>>>>>> ## </p>
>>>>>> ## </desc>
>>>>>> gen_tunable(ssh_sysadm_login, true)
>>>>>>
>>>>>> Any ideas?
>>>>>
>>>>> Do you have boolean init_upstart set to on? if not try setting it to
>>>> on.
>>>>> I do not believe ssh_sysadm_login boolean works currently but i may be
>>>>> mistaken.
>>>
>>> ssh_sysadm_login DOES actually work you just need to specify your role on
>>> login...
>>>
>> I suppose to edit /etc/selinux/refpolicy/src/policy/config/local.users for
>> doing so!? I added "user mat roles { sysadm_r };" rebuild & load the
>> policy. But after login the the context is still "user_u:user_r:user_t".
>> the user should be able to change the role to sysadm_r:
>> ----
>> semanage user -l
>> SELinux User    SELinux Roles
>> mat_u           staff_r sysadm_r
>> ----
>> Doing it explicitly does not work either:
>> ----
>> newrole -r staff_r
>> user_u:staff_r:staff_t is not a valid context
>> ----
>> Don't know why. Restricted by a special policy?
> 
> 
>> --
>> selinux mailing list
>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>> https://admin.fedoraproject.org/mailman/listinfo/selinux
> 
> 
> semanage login -l
> 
- --
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

What does

> selinuxdefcon mat system_u:system_r:sshd_t:s0

show
> selinuxdefcon dwalsh system_u:system_r:sshd_t:s0
staff_u:staff_r:staff_t:s0-s0:c0.c1023
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkyjMKMACgkQrlYvE4MpobPOqwCgqMT76ST/5mCn80zp+DjoSHhM
5m0An1Ebg7xdgnqMmcoFff1Y+T3Hn5dm
=xAsY
-----END PGP SIGNATURE-----
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux