Re: error: ssh_selinux_getctxbyname: Failed to get default SELinux security context

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 09/29/2010 08:23 AM, Daniel J Walsh wrote:
>> On 09/29/2010 03:26 AM, imsand@xxxxxxxxx wrote:
>>>> On Tue, Sep 28, 2010 at 03:51:11PM +0200, imsand@xxxxxxxxx wrote:
>>>>>> On Tue, Sep 28, 2010 at 01:56:13PM +0200, imsand@xxxxxxxxx wrote:
>>>>>>>> On 28/09/10 08:24, imsand@xxxxxxxxx wrote:
>>>>>>>>> Hello
>>>>>>>>>
>>>>>>>>> I get the following error when I try to log in through ssh (even
>>>>> if
>>>>>>>>> selinux is in permissive mode!!!):
>>>>>>>>>
>>>>>>>>> Sep 28 09:01:32 stvlx05.test.ch sshd[12614]: Accepted
>>>>>>>>> keyboard-interactive/pam for mat from 131.102.233.127 port 58912
>>>>> ssh2
>>>>>>>>> Sep 28 09:01:32 stvlx05.test.admin.ch kernel: [60557.252750]
>>>>>>> type=1400
>>>>>>>>> audit(1285657292.298:286): avc:  denied  { audit_control } for
>>>>>>>>> pid=12614
>>>>>>>>> comm="sshd" capability=30  scontext=system_u:system_r:sysadm_t
>>>>>>>>> tcontext=system_u:system_r:sysadm_t tclass=capability
>>>>>>>>> Sep 28 09:01:32 stvlx05.test.ch sshd[12621]: error:
>>>>>>>>> ssh_selinux_getctxbyname: Failed to get default SELinux security
>>>>>>> context
>>>>>>>>> for mat
>>>>>>>>> Sep 28 09:01:32 stvlx05.test.ch sshd[12614]: error:
>>>>>>>>> ssh_selinux_getctxbyname: Failed to get default SELinux security
>>>>>>> context
>>>>>>>>> for mat
>>>>>>>>> Sep 28 09:01:32 stvlx05.test.ch sshd[12614]: error:
>>>>>>>>> ssh_selinux_setup_pty:
>>>>>>>>> security_compute_relabel: Invalid argument
>>>>>>>>>
>>>>>>>>> I already went through this post:
>>>>>>>>> http://www.nsa.gov/research/selinux/list-archive/0910/30906.shtml
>>>>> but
>>>>>>> I
>>>>>>>>> can't figure out the exact problem.
>>>>>>>>>
>>>>>>>>> Here is what I've done so far:
>>>>>>>>> - Downloaded the latest reference policy from tresys:
>>>>>>>>> http://oss.tresys.com/files/refpolicy/refpolicy-2.20100524.tar.bz2
>>>>>>>>> - Compiled and installed it on my sles 11.1
>>>>>>>>> - set selinux into permissive mode: (so far so good.. :))
>>>>>>>>> sestatus
>>>>>>>>> SELinux status:                 enabled
>>>>>>>>> SELinuxfs mount:                /selinux
>>>>>>>>> Current mode:                   permissive
>>>>>>>>> Mode from config file:          permissive
>>>>>>>>> Policy version:                 24
>>>>>>>>> Policy from config file:        refpolicy
>>>>>>>>> - Add selinux user "mat_u": semanage user -R "staff_r system_r"
>>>>>>>>> -P
>>>>>>> user
>>>>>>>>> -a
>>>>>>>>> mat_u
>>>>>>>>> - Add linux user " mat": useradd mat
>>>>>>>>> - Set password for "mat": passwd mat
>>>>>>>>> - User mapping: semanage login -s mat_u -a mat
>>>>>>>>> - add security context for "mat_u" by copying staff_u's context
>>>>>>> (don't
>>>>>>>>> know if that's needed??!): cp
>>>>>>>>> /etc/selinux/refpolicy/contexts/user/staff_u
>>>>>>>>> /etc/selinux/refpolicy/contexts/user/mat_u
>>>>>>>>> - set boolean for sysadm ssh login to true (don't know if thats
>>>>>>>>> needed?!):
>>>>>>>>> setsebool ssh_sysadm_login on
>>>>>>>>>
>>>>>>>>> In other posts I've read something about sepermit.conf and
>>>>>>>>> namespace.conf
>>>>>>>>> but these files don't exist on my system. What about these files?
>>>>> Do
>>>>>>> I
>>>>>>>>> need them?
>>>>>>>>> What's wrong on my system?
>>>>>>>>> Why it's not possible to login even if selinux is in permissive
>>>>> mode?
>>>>>>>>> Any suggestions?
>>>>>>>>
>>>>>>>> I'd start by trying to figure out why sshd isn't running in sshd_t
>>>>> (it
>>>>>>>> seems to be running in sysadm_t).
>>>>>>>>
>>>>>>>> Paul.
>>>>>>>> --
>>>>>>>> selinux mailing list
>>>>>>>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>>>>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>>>>>>
>>>>>>>
>>>>>>> Yes, sshd is running in sysadm_t:
>>>>>>>
>>>>>>> # ps axZ | grep sshd
>>>>>>> system_u:system_r:sysadm_t       3632 ?        Ss     0:00
>>>>>>> /usr/sbin/sshd
>>>>>>> -o PidFile=/var/run/sshd.init.pi
>>>>>>>
>>>>>>> # ls -Z /usr/sbin/sshd
>>>>>>> system_u:object_r:sshd_exec_t /usr/sbin/sshd
>>>>>>>
>>>>>>> Don't know why it's not sshd_t. I didn't modified something. It's a
>>>>>>> standard installation of sles11 with the default reference policy
>>>>> from
>>>>>>> tresys.
>>>>>>>
>>>>>>> Maybe this code snippet from policy/modules/services/ssh.te is
>>>>>>> responsible
>>>>>>> for that:
>>>>>>> ## <desc>
>>>>>>> ## <p>
>>>>>>> ## Allow ssh logins as sysadm_r:sysadm_t
>>>>>>> ## </p>
>>>>>>> ## </desc>
>>>>>>> gen_tunable(ssh_sysadm_login, true)
>>>>>>>
>>>>>>> Any ideas?
>>>>>>
>>>>>> Do you have boolean init_upstart set to on? if not try setting it to
>>>>> on.
>>>>>> I do not believe ssh_sysadm_login boolean works currently but i may
>>>>>> be
>>>>>> mistaken.
>>>>
>>>> ssh_sysadm_login DOES actually work you just need to specify your role
>>>> on
>>>> login...
>>>>
>>> I suppose to edit /etc/selinux/refpolicy/src/policy/config/local.users
>>> for
>>> doing so!? I added "user mat roles { sysadm_r };" rebuild & load the
>>> policy. But after login the the context is still
>>> "user_u:user_r:user_t".
>>> the user should be able to change the role to sysadm_r:
>>> ----
>>> semanage user -l
>>> SELinux User    SELinux Roles
>>> mat_u           staff_r sysadm_r
>>> ----
>>> Doing it explicitly does not work either:
>>> ----
>>> newrole -r staff_r
>>> user_u:staff_r:staff_t is not a valid context
>>> ----
>>> Don't know why. Restricted by a special policy?
>>
>>
>>> --
>>> selinux mailing list
>>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>
>>
>> semanage login -l
>>
> - --
> selinux mailing list
> selinux@xxxxxxxxxxxxxxxxxxxxxxx
> https://admin.fedoraproject.org/mailman/listinfo/selinux
>
> What does
>
>> selinuxdefcon mat system_u:system_r:sshd_t:s0
>
> show
>> selinuxdefcon dwalsh system_u:system_r:sshd_t:s0
> staff_u:staff_r:staff_t:s0-s0:c0.c1023

selinuxdefcon mat system_u:system_r:sshd_t
mat_u:staff_r:staff_t


--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux