Re: Strange denials

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Not had a detailed look, but the logfile config looks like it opens in
append mode:

In config/cobbler/logging_config.conf:

[handler_FileLogger]
class=FileHandler
level=DEBUG
formatter=formatter
args=('/var/log/cobbler/cobbler.log', 'a')


On Sun, 2020-10-25 at 13:07 -0600, Orion Poplawski wrote:
> Phil -
> 
>    Thanks for the pointer.  It looks like cobbler is doing the
> following 
> check:
> 
> LOG_FILE = "/var/log/cobbler/cobbler.log"
> if os.access(LOG_FILE, os.W_OK):
> 
> and it looks like this access() check triggers the write denial.  I'm
> having difficulty finding a check just for append access.  Any ideas?
> 
> Orion
> 
> On 10/24/20 10:33 PM, 1966phils@xxxxxxxxx wrote:
> > Hi,
> > 
> >  From the policy it looks like cobbler should only be allowed to
> > "append" to the log file and not "write" (overwrite) it:
> > 
> >    allow daemon logfile:file { append getattr ioctl lock };
> > 
> > So the question is, why is cobbler doing something other than
> > appending
> > to its log?
> > 
> > Cheers
> > Phil
> > 
> > On Sat, 2020-10-24 at 21:27 -0600, Orion Poplawski wrote:
> > > I'm seeing the following on my Rawhide VM:
> > > 
> > > type=AVC msg=audit(1603594049.879:534): avc:  denied  { write }
> > > for
> > > pid=1073 comm="cobblerd" name="cobbler.log" dev="dm-0" ino=663024
> > > scontext=system_u:system_r:cobblerd_t:s0
> > > tcontext=system_u:object_r:cobbler_var_log_t:s0 tclass=file
> > > permissive=0
> > > 
> > > 
> > > This makes no sense to me.  sesearch seems to indicate that this
> > > should
> > > be allowed (as you would expect):
> > > 
> > > # sesearch -s cobblerd_t -t cobbler_var_log_t --allow
> > > allow cobblerd_t cobbler_var_log_t:dir { add_name getattr ioctl
> > > lock
> > > open search write };
> > > allow cobblerd_t cobbler_var_log_t:file { create open read
> > > setattr };
> > > allow cobblerd_t file_type:filesystem getattr;
> > > allow daemon logfile:file { append getattr ioctl lock };
> > > allow domain file_type:blk_file map; [ domain_can_mmap_files
> > > ]:True
> > > allow domain file_type:chr_file map; [ domain_can_mmap_files
> > > ]:True
> > > allow domain file_type:file map; [ domain_can_mmap_files ]:True
> > > allow domain file_type:lnk_file map; [ domain_can_mmap_files
> > > ]:True
> > > 
> > > selinux-policy-3.14.7-6.fc34.noarch
> > > 5.10.0-0.rc0.20201021git071a0578b0ce.49.fc34.x86_64
> > > 
> > > What am I missing?
> > > 
> > > _______________________________________________
> > > selinux mailing list -- selinux@xxxxxxxxxxxxxxxxxxxxxxx
> > > To unsubscribe send an email to
> > > selinux-leave@xxxxxxxxxxxxxxxxxxxxxxx
> > > Fedora Code of Conduct:
> > > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > > List Guidelines:
> > > https://fedoraproject.org/wiki/Mailing_list_guidelines
> > > List Archives:
> > > https://lists.fedoraproject.org/archives/list/selinux@xxxxxxxxxxxxxxxxxxxxxxx
> > _______________________________________________
> > selinux mailing list -- selinux@xxxxxxxxxxxxxxxxxxxxxxx
> > To unsubscribe send an email to
> > selinux-leave@xxxxxxxxxxxxxxxxxxxxxxx
> > Fedora Code of Conduct:
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > List Guidelines:
> > https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives:
> > https://lists.fedoraproject.org/archives/list/selinux@xxxxxxxxxxxxxxxxxxxxxxx
> > 
> 
> 

_______________________________________________
selinux mailing list -- selinux@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to selinux-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/selinux@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux