Re: Removing unconfined type

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Dan,

We have removed the unconfined_u user type .We do not see it when we do a
semanage user -l

[root@vos-cm148 home]# semanage user -l

                Labeling   MLS/       MLS/
SELinux User    Prefix     MCS Level  MCS Range
SELinux Roles

admin_u         user       s0         s0-s0:c0.c1023
sysadm_r system_r
git_shell_u     user       s0         s0
git_shell_r
guest_u         user       s0         s0
guest_r
root            user       s0         s0-s0:c0.c1023
sysadm_r system_r
specialuser_u   user       s0         s0
sysadm_r system_r
staff_u         user       s0         s0-s0:c0.c1023
staff_r sysadm_r system_r unconfined_r
sysadm_u        user       s0         s0-s0:c0.c1023
sysadm_r
system_u        user       s0         s0-s0:c0.c1023
system_r unconfined_r
user_u          user       s0         s0                             user_r
xguest_u        user       s0         s0
xguest_r



But some file security contexts still have unconfined_u

drwxr-xr-x. root       root          system_u:object_r:home_root_t:s0 .
dr-xr-xr-x. root       root          system_u:object_r:root_t:s0      ..
drwx------. admin      administrator user_u:object_r:user_home_dir_t:s0
admin
drwxr-x---. ccmservice ccmbase
unconfined_u:object_r:user_home_dir_t:s0 ccmservice
drwx------. drfkeys    drfkeys
unconfined_u:object_r:user_home_dir_t:s0 drfkeys
drwxr-x---. drfuser    platform
unconfined_u:object_r:user_home_dir_t:s0 drfuser
drwxr-xr-x. informix   informix      system_u:object_r:user_home_dir_t:s0
informix
drwx------. pwrecovery platform
unconfined_u:object_r:user_home_dir_t:s0 pwrecovery
drwxr-x---. sftpuser   sftpuser
unconfined_u:object_r:user_home_dir_t:s0 sftpuser
drwxr-x---. tomcat     tomcat        unconfined_u:object_r:tomcat_t:s0
tomcat


What would be the reason for that?


Thanks,
Anamitra

On 1/15/13 9:22 AM, "Daniel J Walsh" <dwalsh@xxxxxxxxxx> wrote:

>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>On 01/15/2013 12:19 PM, Anamitra Dutta Majumdar (anmajumd) wrote:
>> Hi Dan,
>> 
>> Thanks for the prompt response.
>> 
>> The reason I brought this thread alive is because I see a lot of
>>denials 
>> after removing the unconfined type and doing a fixfiles && reboot and
>>as 
>> you indicated They are many resources that have acquired unlabeled_t and
>> hence we see a lot of denials. So based on this I would like to ask when
>> exactly should we have the reboot after executing fixfiles. Should the
>> reboot be immediate after we have removed the unconfined type or can it
>> wait for a later time.
>> 
>> Thanks, Anamitra
>> 
>> On 1/15/13 9:08 AM, "Daniel J Walsh" <dwalsh@xxxxxxxxxx> wrote:
>> 
>> On 01/15/2013 11:48 AM, Anamitra Dutta Majumdar (anmajumd) wrote:
>>>>> Hi Dominick,
>>>>> 
>>>>> Can you help me understand why step 5 is needed.
>>>>> 
>>>>> Thanks, Anamitra
>>>>> 
>>>>> On 10/30/12 1:03 PM, "Dominick Grift" <dominick.grift@xxxxxxxxx>
>>>>> wrote:
>>>>> 
>>>>>> 
>>>>>> 
>>>>>> On Tue, 2012-10-30 at 19:45 +0000, Anamitra Dutta Majumdar
>>>>>> (anmajumd) wrote:
>>>>>>> We are on RHEL6 and we need to remove the unconfined type from
>>>>>>> our targeted Selinux policies so that no process runs in the
>>>>>>> unconfined domain.
>>>>>>> 
>>>>>>> In order to achieve that we have removed the unconfined module
>>>>>>> .Is there anything Else we need to do.
>>>>>>> 
>>>>>>> Thanks, Anamitra
>>>>>> 
>>>>>> You can also disable the unconfineduser module to make it even
>>>>>> more strict
>>>>>> 
>>>>>> but if you do make sure that no users are mapped to unconfined_u
>>>>>> and relabel the file system because selinux will change contexts
>>>>>> that have unconfined_u in them to unlabeled_t is unconfined_u no
>>>>>> longer exists
>>>>>> 
>>>>>> so in theory:
>>>>>> 
>>>>>> 1. setenforce 0 2. change you logging mappings to exclude
>>>>>> unconfined_u 3. purge /tmp and /var/tmp 4. semodule unconfineduser
>>>>>> 5. fixfiles onboot && reboot
>>>>>> 
>>>>>> I think that should take care of it
>>>>>> 
>>>>>> Not though that even then there will be some unconfined domains
>>>>>> left
>>>>>> 
>>>>>> There is no way to get them out without manually editing and
>>>>>> rebuilding the policy
>>>>>> 
>>>>>> But if you disabled the unconfined and unconfineduser modules then
>>>>>> you are running  pretty strict
>>>>>> 
>>>>>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>>>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>>>> 
>>>>>> 
>>>>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>>> 
>>>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>>> 
>> If you have any files that are owned by unconfined_u they will become
>> unlabeled_t and not able to be used by confined domains, which is why
>>the 
>> relabel is required.
>> 
>
>If you have any processes running on your system that are unconfined_t
>then
>they will become unlabled_t and start generating AVC's.  Any confined apps
>that are trying to read unlabeled_u files will start to fail also.
>
>It is probably best to do this at Single User mode/permissive and then
>cleanup
>the disk.
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.4.13 (GNU/Linux)
>Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>
>iEYEARECAAYFAlD1kD8ACgkQrlYvE4MpobMgpwCfdh76bmMo/JeP0sljxv0pGxyo
>UJwAn0kE9Dde3tmy/gQPinhyu/e+JO5P
>=PsFL
>-----END PGP SIGNATURE-----

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux



[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux