Re: iotop policy development advice

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> > > 
> > Me thinks you need auth_use_nsswitch()  Looks like your code is calling
> > getpw()  Which is causing some of these access.  auth_use_nsswitch will make
> > you handle all forms of authorization.
> 
> yes, but
> 
> It doesnt need any authentication though, and also many other hallmarks
> of nsswitch are not there for example reading network config or do dns
> resolving, or creating tcp/udp sockets

I believe it's for resolving the UID/GID to usernames/group names in the
display. Either way, I have taken your advice, and replaced the passwd /
sssd parts with this and it works correctly. 

> 
> not sure why it needs to create netlink route sockets ( i am assuming
> that in some scenario it might need to read the routing table, but
> against my own advise i made assumptions
> 
> this actually a really simple app, the only thing that i wonder about
> are the details about the net_admin and netlink_route_socket. I thought
> it might have been for iscsi scenarios but thats just assumption

Again, this may have been one of my mistakes. I have removed that line
and it still worked. To eliminate this, I went through and check that
each line of the policy now when removed causes a denial, which it does.
Here is the "minimised" policy.

-- 
Sincerely,

William Brown

http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0xEFC416D781A8099A

policy_module(iotop, 1.0.0)

########################################
#
# Declarations
#
attribute_role iotop_roles;
roleattribute system_r iotop_roles;

type iotop_t;
type iotop_exec_t;
application_domain(iotop_t, iotop_exec_t)

role iotop_roles types iotop_t;

#permissive iotop_t;

########################################
#
# iotop local policy
#

allow iotop_t self:capability net_admin;
allow iotop_t self:netlink_socket r_netlink_socket_perms;

kernel_read_system_state(iotop_t)
dev_read_urand(iotop_t)
domain_getsched_all_domains(iotop_t)
domain_read_all_domains_state(iotop_t)

auth_use_nsswitch(iotop_t)
corecmd_exec_bin(iotop_t)
miscfiles_read_localization(iotop_t)
userdom_use_user_terminals(iotop_t)


Attachment: signature.asc
Description: This is a digitally signed message part

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux