Re: selinux Digest, Vol 120, Issue 14

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am 20.02.2014 um 23:23 schrieb selinux-request@xxxxxxxxxxxxxxxxxxxxxxx:

> Send selinux mailing list submissions to
> 	selinux@xxxxxxxxxxxxxxxxxxxxxxx
> 
> To subscribe or unsubscribe via the World Wide Web, visit
> 	https://admin.fedoraproject.org/mailman/listinfo/selinux
> or, via email, send a message with subject or body 'help' to
> 	selinux-request@xxxxxxxxxxxxxxxxxxxxxxx
> 
> You can reach the person managing the list at
> 	selinux-owner@xxxxxxxxxxxxxxxxxxxxxxx
> 
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of selinux digest..."
> 
> 
> Today's Topics:
> 
>   1. Re: Correct way to use booleans (Daniel J Walsh)
>   2. RE: Correct way to use booleans (Jayson Hurst)
>   3. Re: Correct way to use booleans (Daniel J Walsh)
>   4. RE: Correct way to use booleans (Jayson Hurst)
>   5. Re: Correct way to use booleans (Daniel J Walsh)
>   6. Re: semanage error when upgrading to RHEL 6.5 (Daniel J Walsh)
>   7. Re: semanage error when upgrading to RHEL 6.5 (Andy Ruch)
>   8. Re: semanage error when upgrading to RHEL 6.5 (Daniel J Walsh)
>   9. Re: semanage error when upgrading to RHEL 6.5 (Andy Ruch)
>  10. Re: semanage error when upgrading to RHEL 6.5 (Daniel J Walsh)
> 
> 
> ----------------------------------------------------------------------
> 
> Message: 1
> Date: Thu, 20 Feb 2014 08:03:44 -0500
> From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
> To: Jayson Hurst <swazup@xxxxxxxxxxx>,
> 	"selinux@xxxxxxxxxxxxxxxxxxxxxxx" <selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: Re: Correct way to use booleans
> Message-ID: <5305FD30.1050504@xxxxxxxxxx>
> Content-Type: text/plain; charset=UTF-8
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 02/19/2014 08:20 PM, Jayson Hurst wrote:
>> Audit2Allow is suggesting that a boolean be turned on.
>> 
>> #!!!! This avc can be allowed using the boolean 'allow_ypbind'
>> 
>> allow vasd_t ldap_port_t:tcp_socket name_bind;
>> 
>> setsebool -P allow_ypbind 1
>> 
>> Should this boolean be enabled via my domains policy, or is this something
>> the system administrator should turn on if they know they will be using
>> NIS?
>> 
> Only the system admin should turn this on in an NIS environment.  This is an
> incredibly permissive boolean.  Allows all processes to use any network port.
> 
>> The same question can be asked for other things like http and samba. #!!!!
>> This avc can be allowed using one of the these booleans: #
>> samba_export_all_ro, samba_export_all_rw
>> 
>> allow smbd_t tmp_t:file getattr;
> There really should not be tmp_t files on a system.  Any idea how this file
> got created?  smbd_t in permissive mode?
> 
>> #!!!! This avc can be allowed using one of the these booleans: #
>> samba_create_home_dirs, samba_export_all_rw
>> 
>> allow smbd_t user_home_dir_t:dir { write create add_name };
>> 
>> setsebool -P samba_export_all_rw 1
>> 
>> 
>> 
>> 
>> 
>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>> 
> If a user is exporting the home dirs it would be better to use
> samba_enable_home_dirs
> 
> But if he is sharing the entire system then use samba_export_all_rw
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
> 
> iEYEARECAAYFAlMF/TAACgkQrlYvE4MpobMN+gCg08PlPOaB43Nz9roPpjJ2y4vP
> bDwAnRm8tguT3laMqY1sz3T0eaKUzcnI
> =Wvgh
> -----END PGP SIGNATURE-----
> 
> 
> ------------------------------
> 
> Message: 2
> Date: Thu, 20 Feb 2014 09:30:40 -0700
> From: Jayson Hurst <swazup@xxxxxxxxxxx>
> To: Daniel J Walsh <dwalsh@xxxxxxxxxx>,
> 	"selinux@xxxxxxxxxxxxxxxxxxxxxxx"	<selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: RE: Correct way to use booleans
> Message-ID: <BLU172-W115B3FEB4027CC4152DD06D59A0@xxxxxxx>
> Content-Type: text/plain; charset="iso-8859-1"
> 
> So it sounds like booleans are meant to be set by the admin if they need that sort of thing on.  In the case of samba if the admin wanted to share out user directories they would need to turn on a boolean that would allow them to do so like samba_enable_home_dirs.
> 
> I see a few different files in /tmp that are labelled as tmp_t, but the ones I care about are the krb5cc_X files.  If I use kinit to generate the krb5cc file it is labelled as user_tmp_t but if I login through ssh,local_login, gdm, etc... they get created as tmp_t.  Seeing that my daemon is responsible for kerberos login I can only guess that it is generating them incorrectly.  In my SELinux module should I have a transition for files created in tmp to have them created as user_tmp_t or is there a better way?
> 
>> Date: Thu, 20 Feb 2014 08:03:44 -0500
>> From: dwalsh@xxxxxxxxxx
>> To: swazup@xxxxxxxxxxx; selinux@xxxxxxxxxxxxxxxxxxxxxxx
>> Subject: Re: Correct way to use booleans
>> 
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>> 
>> On 02/19/2014 08:20 PM, Jayson Hurst wrote:
>>> Audit2Allow is suggesting that a boolean be turned on.
>>> 
>>> #!!!! This avc can be allowed using the boolean 'allow_ypbind'
>>> 
>>> allow vasd_t ldap_port_t:tcp_socket name_bind;
>>> 
>>> setsebool -P allow_ypbind 1
>>> 
>>> Should this boolean be enabled via my domains policy, or is this something
>>> the system administrator should turn on if they know they will be using
>>> NIS?
>>> 
>> Only the system admin should turn this on in an NIS environment.  This is an
>> incredibly permissive boolean.  Allows all processes to use any network port.
>> 
>>> The same question can be asked for other things like http and samba. #!!!!
>>> This avc can be allowed using one of the these booleans: #
>>> samba_export_all_ro, samba_export_all_rw
>>> 
>>> allow smbd_t tmp_t:file getattr;
>> There really should not be tmp_t files on a system.  Any idea how this file
>> got created?  smbd_t in permissive mode?
>> 
>>> #!!!! This avc can be allowed using one of the these booleans: #
>>> samba_create_home_dirs, samba_export_all_rw
>>> 
>>> allow smbd_t user_home_dir_t:dir { write create add_name };
>>> 
>>> setsebool -P samba_export_all_rw 1
>>> 
>>> 
>>> 
>>> 
>>> 
>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>> 
>> If a user is exporting the home dirs it would be better to use
>> samba_enable_home_dirs
>> 
>> But if he is sharing the entire system then use samba_export_all_rw
>> 
>> 
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1
>> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>> 
>> iEYEARECAAYFAlMF/TAACgkQrlYvE4MpobMN+gCg08PlPOaB43Nz9roPpjJ2y4vP
>> bDwAnRm8tguT3laMqY1sz3T0eaKUzcnI
>> =Wvgh
>> -----END PGP SIGNATURE-----
>  		 	   		  
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <http://lists.fedoraproject.org/pipermail/selinux/attachments/20140220/10b0d7d4/attachment-0001.html>
> 
> ------------------------------
> 
> Message: 3
> Date: Thu, 20 Feb 2014 12:48:53 -0500
> From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
> To: Jayson Hurst <swazup@xxxxxxxxxxx>,
> 	"selinux@xxxxxxxxxxxxxxxxxxxxxxx" <selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: Re: Correct way to use booleans
> Message-ID: <53064005.8030104@xxxxxxxxxx>
> Content-Type: text/plain; charset=UTF-8
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 02/20/2014 11:30 AM, Jayson Hurst wrote:
>> So it sounds like booleans are meant to be set by the admin if they need
>> that sort of thing on.  In the case of samba if the admin wanted to share
>> out user directories they would need to turn on a boolean that would allow
>> them to do so like samba_enable_home_dirs.
>> 
>> I see a few different files in /tmp that are labelled as tmp_t, but the
>> ones I care about are the krb5cc_X files.  If I use kinit to generate the
>> krb5cc file it is labelled as user_tmp_t but if I login through
>> ssh,local_login, gdm, etc... they get created as tmp_t.  Seeing that my
>> daemon is responsible for kerberos login I can only guess that it is
>> generating them incorrectly.  In my SELinux module should I have a
>> transition for files created in tmp to have them created as user_tmp_t or
>> is there a better way?
>> 
> Well are you in permissive mode?  Are you using standard Fedora packages or
> something different?  Login/sshd should be creating these files as user_tmp_t.
> 
> 
>>> Date: Thu, 20 Feb 2014 08:03:44 -0500 From: dwalsh@xxxxxxxxxx To:
>>> swazup@xxxxxxxxxxx; selinux@xxxxxxxxxxxxxxxxxxxxxxx Subject: Re: Correct
>>> way to use booleans
>>> 
>> On 02/19/2014 08:20 PM, Jayson Hurst wrote:
>>> Audit2Allow is suggesting that a boolean be turned on.
>> 
>>> #!!!! This avc can be allowed using the boolean 'allow_ypbind'
>> 
>>> allow vasd_t ldap_port_t:tcp_socket name_bind;
>> 
>>> setsebool -P allow_ypbind 1
>> 
>>> Should this boolean be enabled via my domains policy, or is this
>>> something the system administrator should turn on if they know they will
>>> be using NIS?
>> 
>> Only the system admin should turn this on in an NIS environment. This is
>> an incredibly permissive boolean. Allows all processes to use any network
>> port.
>> 
>>> The same question can be asked for other things like http and samba.
>>> #!!!! This avc can be allowed using one of the these booleans: # 
>>> samba_export_all_ro, samba_export_all_rw
>> 
>>> allow smbd_t tmp_t:file getattr;
>> There really should not be tmp_t files on a system. Any idea how this file 
>> got created? smbd_t in permissive mode?
>> 
>>> #!!!! This avc can be allowed using one of the these booleans: # 
>>> samba_create_home_dirs, samba_export_all_rw
>> 
>>> allow smbd_t user_home_dir_t:dir { write create add_name };
>> 
>>> setsebool -P samba_export_all_rw 1
>> 
>> 
>> 
>> 
>> 
>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>> 
>> If a user is exporting the home dirs it would be better to use 
>> samba_enable_home_dirs
>> 
>> But if he is sharing the entire system then use samba_export_all_rw
>> 
>> 
>> 
>> 
>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
> 
> iEYEARECAAYFAlMGQAUACgkQrlYvE4MpobMiuwCePDvZd/9kwNGYDfsjoZHgi1F/
> pHoAn05t4SFE75eS8GEDKBWuuRLG5BWf
> =jZN7
> -----END PGP SIGNATURE-----
> 
> 
> ------------------------------
> 
> Message: 4
> Date: Thu, 20 Feb 2014 11:41:54 -0700
> From: Jayson Hurst <swazup@xxxxxxxxxxx>
> To: Daniel J Walsh <dwalsh@xxxxxxxxxx>,
> 	"selinux@xxxxxxxxxxxxxxxxxxxxxxx"	<selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: RE: Correct way to use booleans
> Message-ID: <BLU172-W90D379149DB09E4F50F05D59A0@xxxxxxx>
> Content-Type: text/plain; charset="iso-8859-1"
> 
> I am running in permissive mode, my module is in permissive mode.
> 
> I am actually running on RHEL 6.0.
> 
> So in this scenario even though my daemon is authenticating the user it is not responsible for context that the krb5cc_xxx file gets created as?
> 
>> Date: Thu, 20 Feb 2014 12:48:53 -0500
>> From: dwalsh@xxxxxxxxxx
>> To: swazup@xxxxxxxxxxx; selinux@xxxxxxxxxxxxxxxxxxxxxxx
>> Subject: Re: Correct way to use booleans
>> 
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>> 
>> On 02/20/2014 11:30 AM, Jayson Hurst wrote:
>>> So it sounds like booleans are meant to be set by the admin if they need
>>> that sort of thing on.  In the case of samba if the admin wanted to share
>>> out user directories they would need to turn on a boolean that would allow
>>> them to do so like samba_enable_home_dirs.
>>> 
>>> I see a few different files in /tmp that are labelled as tmp_t, but the
>>> ones I care about are the krb5cc_X files.  If I use kinit to generate the
>>> krb5cc file it is labelled as user_tmp_t but if I login through
>>> ssh,local_login, gdm, etc... they get created as tmp_t.  Seeing that my
>>> daemon is responsible for kerberos login I can only guess that it is
>>> generating them incorrectly.  In my SELinux module should I have a
>>> transition for files created in tmp to have them created as user_tmp_t or
>>> is there a better way?
>>> 
>> Well are you in permissive mode?  Are you using standard Fedora packages or
>> something different?  Login/sshd should be creating these files as user_tmp_t.
>> 
>> 
>>>> Date: Thu, 20 Feb 2014 08:03:44 -0500 From: dwalsh@xxxxxxxxxx To:
>>>> swazup@xxxxxxxxxxx; selinux@xxxxxxxxxxxxxxxxxxxxxxx Subject: Re: Correct
>>>> way to use booleans
>>>> 
>>> On 02/19/2014 08:20 PM, Jayson Hurst wrote:
>>>> Audit2Allow is suggesting that a boolean be turned on.
>>> 
>>>> #!!!! This avc can be allowed using the boolean 'allow_ypbind'
>>> 
>>>> allow vasd_t ldap_port_t:tcp_socket name_bind;
>>> 
>>>> setsebool -P allow_ypbind 1
>>> 
>>>> Should this boolean be enabled via my domains policy, or is this
>>>> something the system administrator should turn on if they know they will
>>>> be using NIS?
>>> 
>>> Only the system admin should turn this on in an NIS environment. This is
>>> an incredibly permissive boolean. Allows all processes to use any network
>>> port.
>>> 
>>>> The same question can be asked for other things like http and samba.
>>>> #!!!! This avc can be allowed using one of the these booleans: # 
>>>> samba_export_all_ro, samba_export_all_rw
>>> 
>>>> allow smbd_t tmp_t:file getattr;
>>> There really should not be tmp_t files on a system. Any idea how this file 
>>> got created? smbd_t in permissive mode?
>>> 
>>>> #!!!! This avc can be allowed using one of the these booleans: # 
>>>> samba_create_home_dirs, samba_export_all_rw
>>> 
>>>> allow smbd_t user_home_dir_t:dir { write create add_name };
>>> 
>>>> setsebool -P samba_export_all_rw 1
>>> 
>>> 
>>> 
>>> 
>>> 
>>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>> 
>>> If a user is exporting the home dirs it would be better to use 
>>> samba_enable_home_dirs
>>> 
>>> But if he is sharing the entire system then use samba_export_all_rw
>>> 
>>> 
>>> 
>>> 
>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>> 
>> 
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1
>> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>> 
>> iEYEARECAAYFAlMGQAUACgkQrlYvE4MpobMiuwCePDvZd/9kwNGYDfsjoZHgi1F/
>> pHoAn05t4SFE75eS8GEDKBWuuRLG5BWf
>> =jZN7
>> -----END PGP SIGNATURE-----
>  		 	   		  
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <http://lists.fedoraproject.org/pipermail/selinux/attachments/20140220/903fdbd0/attachment-0001.html>
> 
> ------------------------------
> 
> Message: 5
> Date: Thu, 20 Feb 2014 14:21:55 -0500
> From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
> To: Jayson Hurst <swazup@xxxxxxxxxxx>,
> 	"selinux@xxxxxxxxxxxxxxxxxxxxxxx" <selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: Re: Correct way to use booleans
> Message-ID: <530655D3.1060606@xxxxxxxxxx>
> Content-Type: text/plain; charset=UTF-8
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 02/20/2014 01:41 PM, Jayson Hurst wrote:
>> I am running in permissive mode, my module is in permissive mode.
>> 
>> I am actually running on RHEL 6.0.
>> 
>> So in this scenario even though my daemon is authenticating the user it is
>> not responsible for context that the krb5cc_xxx file gets created as?
>> 
> 
> The login daemons should be creating this file with the correct context.
> user_tmp_t.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
> 
> iEYEARECAAYFAlMGVdMACgkQrlYvE4MpobPm+QCfX1s69csbRU8xfg8m796N+9Si
> cZYAmgP8bmo4vV+ug10x8tlxKSr6rTqI
> =2zvU
> -----END PGP SIGNATURE-----
> 
> 
> ------------------------------
> 
> Message: 6
> Date: Thu, 20 Feb 2014 15:38:00 -0500
> From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
> To: Andy Ruch <adruch2002@xxxxxxxxx>,	Fedora SELinux
> 	<selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: Re: semanage error when upgrading to RHEL 6.5
> Message-ID: <530667A8.7090201@xxxxxxxxxx>
> Content-Type: text/plain; charset=UTF-8
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 02/19/2014 11:56 AM, Andy Ruch wrote:
>> Hello,
>> 
>> I have a policy that was originally written for RHEL 6.2. I’m now trying
>> to upgrade to RHEL 6.5 and I’m having problems with semanage. I can install
>> a fresh RHEL 6.5 system with the targeted policy and everything works fine.
>> I then uninstall the targeted policy and install my policy and I can’t link
>> the linux user and selinux user.
>> 
>>>> semanage user –a -R sysadm_r -R staff_r -r s0-s0:c0.c1023 testuser_u 
>>>> useradd -G wheel testuser semanage login -a -r s0-s0:c0.c1023 -s
>>>> testuser_u testuser
>> libsemanage.dbase_llist_query: could not query record value 
>> /usr/sbin/semanage: Could not query user for testuser
>> 
>> 
>> I have the RHEL 6.5 source code for libsemanage and the targeted policy but
>> so far I haven't been able to find differences that would affect this
>> problem. Could someone please point me in the right direction as far as
>> what semanage is expecting?  What would prevent libsemanage from querying
>> for the user?
>> 
>> Thanks, Andy
>> 
>> 
>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>> 
> What does semanage login -l and semanage user -l show?
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
> 
> iEYEARECAAYFAlMGZ6gACgkQrlYvE4MpobPPDACfZf1lDin/LicVoZbykbsMS2rX
> OuoAoIIa11SrGGVgJiFblx4aCFjPWF9o
> =iiCj
> -----END PGP SIGNATURE-----
> 
> 
> ------------------------------
> 
> Message: 7
> Date: Thu, 20 Feb 2014 12:46:36 -0800 (PST)
> From: Andy Ruch <adruch2002@xxxxxxxxx>
> To: Daniel J Walsh <dwalsh@xxxxxxxxxx>,	Fedora SELinux
> 	<selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: Re: semanage error when upgrading to RHEL 6.5
> Message-ID:
> 	<1392929196.64207.YahooMailNeo@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
> Content-Type: text/plain; charset=utf-8
> 
> 
> 
> 
> 
> On Thursday, February 20, 2014 1:38 PM, Daniel J Walsh <dwalsh@xxxxxxxxxx> wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>> 
>> 
>> On 02/19/2014 11:56 AM, Andy Ruch wrote:
>>> Hello,
>>> 
>>> I have a policy that was originally written for RHEL 6.2. I’m now trying
>>> to upgrade to RHEL 6.5 and I’m having problems with semanage. I can install
>>> a fresh RHEL 6.5 system with the targeted policy and everything works fine.
>>> I then uninstall the targeted policy and install my policy and I can’t link
>>> the linux user and selinux user.
>>> 
>>>>> semanage user –a -R sysadm_r -R staff_r -r s0-s0:c0.c1023 testuser_u 
>>>>> useradd -G wheel testuser semanage login -a -r s0-s0:c0.c1023 -s
>>>>> testuser_u testuser
>>> libsemanage.dbase_llist_query: could not query record value 
>>> /usr/sbin/semanage: Could not query user for testuser
>>> 
>>> 
>>> I have the RHEL 6.5 source code for libsemanage and the targeted policy but
>>> so far I haven't been able to find differences that would affect this
>>> problem. Could someone please point me in the right direction as far as
>>> what semanage is expecting?  What would prevent libsemanage from querying
>>> for the user?
>>> 
>>> Thanks, Andy
>>> 
>>> 
>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>> 
>> What does semanage login -l and semanage user -l show?
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1
>> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>> 
>> iEYEARECAAYFAlMGZ6gACgkQrlYvE4MpobPPDACfZf1lDin/LicVoZbykbsMS2rX
>> OuoAoIIa11SrGGVgJiFblx4aCFjPWF9o
>> =iiCj
>> -----END PGP SIGNATURE-----
>> 
> 
> semanage user -l shows:
> 
> 
>                 Labeling   MLS/       MLS/                          
> SELinux User    Prefix     MCS Level  MCS Range                      SELinux Roles
> 
> root            user       s0         s0-s0:c0.c1023                 system_r
> system_u        user       s0         s0-s0:c0.c1023                 system_r
> testuser_u      user       s0         s0-s0:c0.c1023                 staff_r sysadm_r
> user_u          user       s0         s0                             user_r
> 
> 
> 
> semanage login -l shows:
> 
> 
> Login Name                SELinux User              MLS/MCS Range            
> 
> root                      root                      s0-s0:c0.c1023           
> system_u                  system_u                  s0-s0:c0.c1023           
> 
> 
> ------------------------------
> 
> Message: 8
> Date: Thu, 20 Feb 2014 16:36:23 -0500
> From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
> To: Andy Ruch <adruch2002@xxxxxxxxx>,	Fedora SELinux
> 	<selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: Re: semanage error when upgrading to RHEL 6.5
> Message-ID: <53067557.5050108@xxxxxxxxxx>
> Content-Type: text/plain; charset=UTF-8
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 02/20/2014 03:46 PM, Andy Ruch wrote:
>> 
>> 
>> 
>> 
>> On Thursday, February 20, 2014 1:38 PM, Daniel J Walsh <dwalsh@xxxxxxxxxx>
>> wrote:
>> 
>> -----BEGIN PGP SIGNED MESSAGE-----
>>> Hash: SHA1
>>> 
>>> 
>>> On 02/19/2014 11:56 AM, Andy Ruch wrote:
>>>> Hello,
>>>> 
>>>> I have a policy that was originally written for RHEL 6.2. I’m now
>>>> trying to upgrade to RHEL 6.5 and I’m having problems with semanage. I
>>>> can install a fresh RHEL 6.5 system with the targeted policy and
>>>> everything works fine. I then uninstall the targeted policy and install
>>>> my policy and I can’t link the linux user and selinux user.
>>>> 
>>>>>> semanage user –a -R sysadm_r -R staff_r -r s0-s0:c0.c1023
>>>>>> testuser_u useradd -G wheel testuser semanage login -a -r
>>>>>> s0-s0:c0.c1023 -s testuser_u testuser
>>>> libsemanage.dbase_llist_query: could not query record value 
>>>> /usr/sbin/semanage: Could not query user for testuser
>>>> 
>>>> 
>>>> I have the RHEL 6.5 source code for libsemanage and the targeted policy
>>>> but so far I haven't been able to find differences that would affect
>>>> this problem. Could someone please point me in the right direction as
>>>> far as what semanage is expecting?  What would prevent libsemanage from
>>>> querying for the user?
>>>> 
>>>> Thanks, Andy
>>>> 
>>>> 
>>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>> 
>>> What does semanage login -l and semanage user -l show? -----BEGIN PGP
>>> SIGNATURE----- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird -
>>> http://www.enigmail.net/
>>> 
>>> iEYEARECAAYFAlMGZ6gACgkQrlYvE4MpobPPDACfZf1lDin/LicVoZbykbsMS2rX 
>>> OuoAoIIa11SrGGVgJiFblx4aCFjPWF9o =iiCj -----END PGP SIGNATURE-----
>>> 
>> 
>> semanage user -l shows:
>> 
>> 
>> Labeling   MLS/       MLS/ SELinux User    Prefix     MCS Level  MCS Range
>> SELinux Roles
>> 
>> root            user       s0         s0-s0:c0.c1023
>> system_r system_u        user       s0         s0-s0:c0.c1023
>> system_r testuser_u      user       s0         s0-s0:c0.c1023
>> staff_r sysadm_r user_u          user       s0         s0
>> user_r
>> 
>> 
>> 
>> semanage login -l shows:
>> 
>> 
>> Login Name                SELinux User              MLS/MCS Range
>> 
>> 
>> root                      root                      s0-s0:c0.c1023
>> system_u                  system_u                  s0-s0:c0.c1023
>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>> 
>> 
> And the testuser exists in /etc/passwd?
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
> 
> iEYEARECAAYFAlMGdVYACgkQrlYvE4MpobPSyQCgkQxSuJh2rUYvkDcNjCo2aeai
> DugAniPjTv6IbODBn+ADnsIPdpf1M55a
> =TUJs
> -----END PGP SIGNATURE-----
> 
> 
> ------------------------------
> 
> Message: 9
> Date: Thu, 20 Feb 2014 13:44:30 -0800 (PST)
> From: Andy Ruch <adruch2002@xxxxxxxxx>
> To: Daniel J Walsh <dwalsh@xxxxxxxxxx>,	Fedora SELinux
> 	<selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: Re: semanage error when upgrading to RHEL 6.5
> Message-ID:
> 	<1392932670.69206.YahooMailNeo@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
> Content-Type: text/plain; charset=utf-8
> 
> 
> 
> 
> 
> 
>> On Thursday, February 20, 2014 2:36 PM, Daniel J Walsh <dwalsh@xxxxxxxxxx> wrote:
>>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>> 
>> On 02/20/2014 03:46 PM, Andy Ruch wrote:
>>> 
>>> 
>>> 
>>> 
>>> On Thursday, February 20, 2014 1:38 PM, Daniel J Walsh 
>> <dwalsh@xxxxxxxxxx>
>>> wrote:
>>> 
>>> -----BEGIN PGP SIGNED MESSAGE-----
>>>> Hash: SHA1
>>>> 
>>>> 
>>>> On 02/19/2014 11:56 AM, Andy Ruch wrote:
>>>>> Hello,
>>>>> 
>>>>> I have a policy that was originally written for RHEL 6.2. I’m now
>>>>> trying to upgrade to RHEL 6.5 and I’m having problems with 
>> semanage. I
>>>>> can install a fresh RHEL 6.5 system with the targeted policy and
>>>>> everything works fine. I then uninstall the targeted policy and 
>> install
>>>>> my policy and I can’t link the linux user and selinux user.
>>>>> 
>>>>>>> semanage user –a -R sysadm_r -R staff_r -r s0-s0:c0.c1023
>>>>>>> testuser_u useradd -G wheel testuser semanage login -a -r
>>>>>>> s0-s0:c0.c1023 -s testuser_u testuser
>>>>> libsemanage.dbase_llist_query: could not query record value 
>>>>> /usr/sbin/semanage: Could not query user for testuser
>>>>> 
>>>>> 
>>>>> I have the RHEL 6.5 source code for libsemanage and the targeted 
>> policy
>>>>> but so far I haven't been able to find differences that would 
>> affect
>>>>> this problem. Could someone please point me in the right direction 
>> as
>>>>> far as what semanage is expecting?  What would prevent libsemanage 
>> from
>>>>> querying for the user?
>>>>> 
>>>>> Thanks, Andy
>>>>> 
>>>>> 
>>>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>>> 
>>>> What does semanage login -l and semanage user -l show? -----BEGIN PGP
>>>> SIGNATURE----- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird 
>> -
>>>> http://www.enigmail.net/
>>>> 
>>>> iEYEARECAAYFAlMGZ6gACgkQrlYvE4MpobPPDACfZf1lDin/LicVoZbykbsMS2rX 
>>>> OuoAoIIa11SrGGVgJiFblx4aCFjPWF9o =iiCj -----END PGP SIGNATURE-----
>>>> 
>>> 
>>> semanage user -l shows:
>>> 
>>> 
>>> Labeling   MLS/       MLS/ SELinux User    Prefix     MCS Level  MCS Range
>>> SELinux Roles
>>> 
>>> root            user       s0         s0-s0:c0.c1023
>>> system_r system_u        user       s0         s0-s0:c0.c1023
>>> system_r testuser_u      user       s0         s0-s0:c0.c1023
>>> staff_r sysadm_r user_u          user       s0         s0
>>> user_r
>>> 
>>> 
>>> 
>>> semanage login -l shows:
>>> 
>>> 
>>> Login Name                SELinux User              MLS/MCS Range
>>> 
>>> 
>>> root                      root                      s0-s0:c0.c1023
>>>   system_u                  system_u                  s0-s0:c0.c1023
>>>   -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>> 
>>> 
>> And the testuser exists in /etc/passwd?
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1
>> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>> 
>> iEYEARECAAYFAlMGdVYACgkQrlYvE4MpobPSyQCgkQxSuJh2rUYvkDcNjCo2aeai
>> DugAniPjTv6IbODBn+ADnsIPdpf1M55a
>> =TUJs
>> 
>> -----END PGP SIGNATURE-----
>> 
> 
> 
> Yes. The commands "semanage user -a" and "useradd" appear to work fine. It's the "semanage login -a" that has trouble.
> 
> 
> ------------------------------
> 
> Message: 10
> Date: Thu, 20 Feb 2014 17:23:49 -0500
> From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
> To: Andy Ruch <adruch2002@xxxxxxxxx>,	Fedora SELinux
> 	<selinux@xxxxxxxxxxxxxxxxxxxxxxx>
> Subject: Re: semanage error when upgrading to RHEL 6.5
> Message-ID: <53068075.6080400@xxxxxxxxxx>
> Content-Type: text/plain; charset=UTF-8
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 02/20/2014 04:44 PM, Andy Ruch wrote:
>> 
>> 
>> 
>> 
>> 
>>> On Thursday, February 20, 2014 2:36 PM, Daniel J Walsh
>>> <dwalsh@xxxxxxxxxx> wrote:
>>>> -----BEGIN PGP SIGNED MESSAGE-----
>>> Hash: SHA1
>>> 
>>> On 02/20/2014 03:46 PM, Andy Ruch wrote:
>>>> 
>>>> 
>>>> 
>>>> 
>>>> On Thursday, February 20, 2014 1:38 PM, Daniel J Walsh
>>> <dwalsh@xxxxxxxxxx>
>>>> wrote:
>>>> 
>>>> -----BEGIN PGP SIGNED MESSAGE-----
>>>>> Hash: SHA1
>>>>> 
>>>>> 
>>>>> On 02/19/2014 11:56 AM, Andy Ruch wrote:
>>>>>> Hello,
>>>>>> 
>>>>>> I have a policy that was originally written for RHEL 6.2. I’m now 
>>>>>> trying to upgrade to RHEL 6.5 and I’m having problems with
>>> semanage. I
>>>>>> can install a fresh RHEL 6.5 system with the targeted policy and 
>>>>>> everything works fine. I then uninstall the targeted policy and
>>> install
>>>>>> my policy and I can’t link the linux user and selinux user.
>>>>>> 
>>>>>>>> semanage user –a -R sysadm_r -R staff_r -r s0-s0:c0.c1023 
>>>>>>>> testuser_u useradd -G wheel testuser semanage login -a -r 
>>>>>>>> s0-s0:c0.c1023 -s testuser_u testuser
>>>>>> libsemanage.dbase_llist_query: could not query record value 
>>>>>> /usr/sbin/semanage: Could not query user for testuser
>>>>>> 
>>>>>> 
>>>>>> I have the RHEL 6.5 source code for libsemanage and the targeted
>>> policy
>>>>>> but so far I haven't been able to find differences that would
>>> affect
>>>>>> this problem. Could someone please point me in the right direction
>>>>>> 
>>> as
>>>>>> far as what semanage is expecting?  What would prevent libsemanage
>>>>>> 
>>> from
>>>>>> querying for the user?
>>>>>> 
>>>>>> Thanks, Andy
>>>>>> 
>>>>>> 
>>>>>> -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>>>> 
>>>>> What does semanage login -l and semanage user -l show? -----BEGIN
>>>>> PGP SIGNATURE----- Version: GnuPG v1 Comment: Using GnuPG with
>>>>> Thunderbird
>>> -
>>>>> http://www.enigmail.net/
>>>>> 
>>>>> iEYEARECAAYFAlMGZ6gACgkQrlYvE4MpobPPDACfZf1lDin/LicVoZbykbsMS2rX 
>>>>> OuoAoIIa11SrGGVgJiFblx4aCFjPWF9o =iiCj -----END PGP SIGNATURE-----
>>>>> 
>>>> 
>>>> semanage user -l shows:
>>>> 
>>>> 
>>>> Labeling   MLS/       MLS/ SELinux User    Prefix     MCS Level  MCS
>>>> Range SELinux Roles
>>>> 
>>>> root            user       s0         s0-s0:c0.c1023 system_r system_u
>>>> user       s0         s0-s0:c0.c1023 system_r testuser_u      user
>>>> s0         s0-s0:c0.c1023 staff_r sysadm_r user_u          user
>>>> s0         s0 user_r
>>>> 
>>>> 
>>>> 
>>>> semanage login -l shows:
>>>> 
>>>> 
>>>> Login Name                SELinux User              MLS/MCS Range
>>>> 
>>>> 
>>>> root                      root                      s0-s0:c0.c1023 
>>>> system_u                  system_u                  s0-s0:c0.c1023 --
>>>> selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx 
>>>> https://admin.fedoraproject.org/mailman/listinfo/selinux
>>>> 
>>>> 
>>> And the testuser exists in /etc/passwd? -----BEGIN PGP SIGNATURE----- 
>>> Version: GnuPG v1 Comment: Using GnuPG with Thunderbird -
>>> http://www.enigmail.net/
>>> 
>>> iEYEARECAAYFAlMGdVYACgkQrlYvE4MpobPSyQCgkQxSuJh2rUYvkDcNjCo2aeai 
>>> DugAniPjTv6IbODBn+ADnsIPdpf1M55a =TUJs
>>> 
>>> -----END PGP SIGNATURE-----
>>> 
>> 
>> 
>> Yes. The commands "semanage user -a" and "useradd" appear to work fine.
>> It's the "semanage login -a" that has trouble.
>> 
> And this is with the stock policycoreutils or a rebuilt one?
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
> 
> iEYEARECAAYFAlMGgHUACgkQrlYvE4MpobOltACgqKw0AFB/7VRzT08hJRTh5A2v
> i1EAn1oG1gBOGN9R3npTRx7aMdR0fV5H
> =gXXZ
> -----END PGP SIGNATURE-----
> 
> 
> ------------------------------
> 
> --
> selinux mailing list
> selinux@xxxxxxxxxxxxxxxxxxxxxxx
> https://admin.fedoraproject.org/mailman/listinfo/selinux
> 
> End of selinux Digest, Vol 120, Issue 14
> ****************************************

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux





[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux