Creating a custom policy looks easier than generating new user
type. Compiled above .te file and now mysql connects from guest_u
domain! didn't expect it to be this simple :D
One more question, what's the usage of 'optional_policy' in above
te file?
--
----
Cheers,
Lakshmipathi.G
FOSS Programmer.
www.giis.co.in
On Tue, Feb 5, 2013 at 8:09 PM, Daniel J Walsh <dwalsh@xxxxxxxxxx> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I agree and it would probably be worth investigating what to remove fromOn 02/05/2013 09:06 AM, Dominick Grift wrote:
> A. On Tue, 2013-02-05 at 08:31 -0500, Daniel J Walsh wrote:
>> On 02/05/2013 08:27 AM, Daniel J Walsh wrote:
>>> On 02/04/2013 09:53 PM, Lakshmipathi.G wrote:
>>>> Hi - I have a restricted account with guest_u.How to provide mysql
>>>> access to guest_u without breaking other services?
>>>
>>>> I tried "setsebool -P allow_user_mysql_connect 1"
>>>
>>>> Still it says - ERROR 2002 (HY000): Can't connect to local MySQL
>>>> server through socket '/var/lib/mysql/mysql.sock' (13)
>>>
>>>
>>>> Thanks for help.
>>>
>>>
>>>
>>>> -- ---- Cheers, Lakshmipathi.G FOSS Programmer. www.giis.co.in
>>>> <http://www.giis.co.in>
>>>
>>>
>>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>
>>> I would add a custom policy module
>>>
>>> policy_module(myguest, 1.0)
>>>
>>> gen_require(` type guest_t; ')
>>>
>>> mysql_stream_connect(guest_t) -- selinux mailing list
>>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>
>>
>> I guess Dominic beat me to it. Currently the allow_user booleans do not
>> effect
>>
>> guest_u or xguest_u, because I want them as locked down as possible.
>
> The question is where to put the threshold
>
> I recently revisited creating a restricted ssh login user from scratch:
>
> https://84.245.5.136/wordpress/create-a-restricted-openssh-login-user-with-selinux/
>
> some stats:
>
> Me (source): sesearch -ASCT -s myrole_t | grep Found Found 59 semantic av
> rules: Found 4 semantic te rules:
>
> Fedora (source): sesearch -ASCT -s guest_t | grep Found Found 620 semantic
> av rules: Found 38 semantic te rules: Found 82 named file transition
> filename_trans:
>
> me (target): sesearch -ASCT -t myrole_t | grep Found Found 30 semantic av
> rules:
>
> Fedora (target): sesearch -ASCT -t guest_t | grep Found Found 909 semantic
> av rules:
>
> Granted, my policy is probably too locked down as is in many ways. But it
> is easier to extend a policy than it is to remove rules from a policy imho
>
>> The way to adjust their policy is through custom policy rules, or you
>> could generate a new user type using sepolicy generate
>> (selinux-polgengui) guest_mysql_u. -- selinux mailing list
>> selinux@xxxxxxxxxxxxxxxxxxxxxxx
>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>
>
> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx
> https://admin.fedoraproject.org/mailman/listinfo/selinux
>
guest_u.
iEYEARECAAYFAlERGawACgkQrlYvE4MpobN3fgCgirGIWP3MimyHNA/fJY7bWE+g
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
7yoAn168hK0eWJRo3wssN9sPf2lw41bp
=dncE
-----END PGP SIGNATURE-----
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux
-- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/selinux