Re: SELinux and Shorewall with IPSets (FC14)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>> I am annoyed because I do not want to be dealing with issues which were
>> 'resolved' nearly a year ago just to resurface again when I try to upgrade.
>>     
>
> Yes, but this may just be an isolated incident. We are still only human
> plus some things changed in the way policy is maintained (moved to git/
> new maintainer)
>   
I still don't understand how is it possible for this to happen provided 
there are (presumably) at least basic QA procedures in place, but, most 
importantly, it is not the first time Fedora (in general) pulls this 
particular 'rabbit' out of the hat - tweaks something without giving it 
a second thought and then all hell breaks loose.

>> Anyway, I backed out of this upgrade because as it turns out there are
>> also quite a few issues with compiling the kernel as well, so I may as
>> well just wait until FC15 comes around - I do not normally follow even
>> number Fedora upgrades, but do not know what possessed me over the xmas
>> period to go for this upgrade...
>>     
>
> SeLinux related issues? can you be more specific?
>   
No, it is not related to SELinux at all, but it has a lot to do with the 
non-existence of the QA at Fedora, which should have spotted a lot of 
issues with the kernel build-up, (kernel) module dependencies in 
particular!

I started doing the digging, but gave up at the end as it was a bit too 
much for me to deal with - to say that I am unimpressed with FC14 would 
be an understatement!

As I already pointed out - I normally go for odd revisions (have been 
doing that since FC2), but don't know what possessed me this time to do 
it earlier - I was hoping to get the new version of iptables (which only 
works with the .35 version or above of the kernel), but soon realised 
that there are far too many rough edges and leftovers in that revision, 
so I decided to back out and restore FC13 and I am more content now.

>>> In my view allowing iptables to read all config files is sub-optimal.
>>>
>>> I would probably just allow:
>>>
>>> shorewall_read_config(iptables)
>>>   
>>>       
>> I did that as a temporary measure (added optional_policy statement with
>> shorewall_read_config) to see if it is going to cure the problem - it
>> did, though, as you put it above, it is not ideal.
>>
>>     
>
> shorewall_read_config IS ideal in my view. (unlike what Fedora
> previously may have implemented)
>   
I do not know what was implemented earlier as this was the first thing I 
wanted to check out - where are these 3 av statement matches shown in 
the FC13 revision of the policy. I could not find the source of these 
statements (much to my disappointment!), but the 'optional_policy' on 
shorewall should have been present in iptables.te - there is already a 
different (optional_policy) shorewall statement relating to the var/lib 
read/write permissions (I think), so, adding another one to cover the 
shorewall_etc_t domain wouldn't have done any harm at all.

> I think its probably best to just report this issue to
> bugzilla.redhat.com/f14/selinux-policy so that it can be fixed.
>   
I'll do this when I find the time to submit it, but that isn't going to 
happen tomorrow.
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux