Re: [PATCH] New interface to dontaudit access to cert_t

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 2019-02-17 at 16:34 +0000, Sugar, David wrote:
> 
> On 2/16/19 2:40 PM, Chris PeBenito wrote:
> > On 2/14/19 8:56 AM, Sugar, David wrote:
> > > 
> > > On 2/13/19 6:42 PM, Chris PeBenito wrote:
> > > > On 2/12/19 8:05 AM, Sugar, David wrote:
> > > > > I'm seeing a bunch of denials for various processes (some
> > > > > refpolicy
> > > > > domains, some my own application domains) attempting to
> > > > > access
> > > > > /etc/pki.  They seem to be working OK even with the denial. 
> > > > > Adding
> > > > > interface to dontaudit this stuff and calling the interface.
> > > > > 
> > > > > type=AVC msg=audit(1549932300.668:266): avc:  denied  {
> > > > > search } for
> > > > > pid=7077 comm="X" name="pki" dev="dm-1" ino=138
> > > > > scontext=system_u:system_r:xserver_t:s0-s0:c0.c1023
> > > > > tcontext=system_u:object_r:cert_t:s0 tclass=dir permissive=0
> > > > > type=AVC msg=audit(1549932306.553:430): avc:  denied  {
> > > > > search } for
> > > > > pid=7345 comm="clamd" name="pki" dev="dm-1" ino=138
> > > > > scontext=system_u:system_r:clamd_t:s0:c1
> > > > > tcontext=system_u:object_r:cert_t:s0 tclass=dir permissive=0
> > > > 
> > > > My guess is there is some common library between them (maybe
> > > > glibc)
> > > > which is triggering this.  It seems like this might potentially
> > > > cover up
> > > > legitimate access.  It's just hard to tell by just dir
> > > > searches.
> > > > 
> > > 
> > > Digging into this I have found a few things, and please note that
> > > I am
> > > not seeing this denial in permissive.
> > > 
> > > Looking at strace for clamd I see an attempt to open the (non-
> > > existent)
> > > file /etc/pki/tls/legacy-settings.  I think this would explain
> > > the
> > > denial on dir search.
> > > 
> > > If I create that file (even empty) labeled cert_t I see denials
> > > (in
> > > permissive) for clamd_t cert_t:file { getattr open read }.
> > > 
> > > audit2allow suggests the boolean 'authlogin_nsswitch_use_ldap'
> > > should
> > > resolve the issue (for clamd_t).  This makes sense as clamd uses
> > > the
> > > interface auth_use_nsswitch(clamd_t).
> > > 
> > > So, assuming that I don't want to enable
> > > 'authlogin_nsswitch_use_ldap'
> > > is there a way to quiet this denial?
> > 
> > The dontaudit could go in the else block for that tunable.
> > 
> That works for me.  In this case though, should I leave the interface
> as 
> proposed before or would it be more preferable to don't audit access
> to 
> cert_t files along with directories?

The latter is preferable.

-- 
Chris PeBenito





[Index of Archives]     [AMD Graphics]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux