Re: [Non-DoD Source] An selinux issue

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



justina colmena wrote:
> On Wednesday, March 7, 2018 2:26:14 PM AKST m.roth@xxxxxxxxx wrote:
>> Stephen Smalley wrote:
>>
>> > On 03/07/2018 03:18 PM, m.roth@xxxxxxxxx wrote:
>> >
>> >> CentUS 7.4
>> >> ...
>> >> From sealert:
>> >> SELinux is preventing /usr/sbin/sshd from read access on the file
>> >> /etc/ssh/moduli.
>> >> Except:
>> >> ls -laFZ /etc/ssh/moduli
>> >> -rw-r--r--. root root system:object_r:etc_t:s0
>> /etc/ssh/moduli
>> > ...
>> > NB: You have "system" rather than "system_u" above, unless that's a
>> typo.
>> > Which would be an invalid user identity, and thus an invalid security
>> > context, and therefore mapped to the unlabeled context at runtime.
>
> CentUS or CentOS? "system" or "system_u"? Am I to be amused?

Sorry, typo. We're currently overwhelmed, due to an environmental
incident, and I'm exhausted.
>
> This is frustrating. This sort of thing is typical of a hacked system, and
> for us ordinary users, there is no sane SELinux policy development taking
> place. A lot of these security labels can easily, freely, and
arbitrarily be
> changed by ordinary users with the "chcon" command, there is a lot of
covert
> resistance to locking things down any further or fixing persistent security
> problems, and SELinux has never really moved beyond the philosophy of
>
> # touch /.autorelabel && reboot
>
Which requires rebooting the system, and for a filesystem of any real
size, means waiting for-bloody-ever.

I think it gets system if you copy it without copying the selinux label....

       mark
_______________________________________________
selinux mailing list -- selinux@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to selinux-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux