Re: [PATCH] misc services patches

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thursday, 21 January 2021 1:53:44 AM AEDT Dominick Grift wrote:
> >  /usr/sbin/suexec					--	
gen_context(system_u:object_r:httpd_suexec_exec_
> >  t,s0)
> >  /usr/sbin/wigwam					--	
gen_context(system_u:object_r:httpd_exec_t,s0)> 
> > +/usr/sbin/php7..-fpm					--	
gen_context(system_u:object_r:httpd_exec_t,s0
> > )
> 
> that seems fragile. would probably have used "/usr/sbin/php.*-fpm"

OK, I'll change that.

> > +interface(`apache_delete_squirrelmail_spool',`
> > +	gen_require(`
> > +		type squirrelmail_spool_t;
> > +	')
> > +
> > +	allow $1 squirrelmail_spool_t:dir rw_dir_perms;
> > +	allow $1 squirrelmail_spool_t:file delete_file_perms;
> 
> delete_files_pattern($1, squirrelmail_spool_t, squirrelmail_spool_t)

OK.
 
> >  tunable_policy(`httpd_enable_homedirs',`
> > 
> > -	userdom_search_user_home_dirs(httpd_t)
> > +	userdom_list_user_home_content(httpd_t)
> 
> this is not how it was designed. If you want that functionality then set
> httpd_read_user_content boolean to true instead

OK, I'll delete that patch and do it a better way next time I see a case for 
it.

> >  allow cupsd_t self:process { getpgid setpgid setsched signal_perms };
> >  allow cupsd_t self:fifo_file rw_fifo_file_perms;
> >  allow cupsd_t self:unix_stream_socket { accept connectto listen };
> >  allow cupsd_t self:netlink_selinux_socket create_socket_perms;
> > 
> > +allow cupsd_t self:netlink_kobject_uevent_socket { bind create
> > 
> >  getattr read setopt };
> 
> create_socket_perms, use the permission sets and patterns where appropriate

ok

> > Index: refpolicy-2.20210120/policy/modules/services/l2tp.te
> > ===================================================================
> > --- refpolicy-2.20210120.orig/policy/modules/services/l2tp.te
> > +++ refpolicy-2.20210120/policy/modules/services/l2tp.te
> > @@ -35,6 +35,7 @@ allow l2tpd_t self:socket create_socket_
> > 
> >  allow l2tpd_t self:tcp_socket { accept listen };
> >  allow l2tpd_t self:unix_dgram_socket sendto;
> >  allow l2tpd_t self:unix_stream_socket { accept listen };
> > 
> > +allow l2tpd_t self:pppox_socket create;
> 
> create_socket_perms probably eventually

Maybe, but for the moment I think it's best to leave them like that.  I had it 
working fully only needing those accesses.

> > @@ -59,7 +59,7 @@ interface(`mysql_signal',`
> > 
> >  		type mysqld_t;
> >  	
> >  	')
> > 
> > -	allow $1 mysqld_t:process signal;
> > +	allow $1 mysqld_t:process { signull signal };
> 
> create a new mysql_signull()
> 
> by generalizing interfaces and putting them out of context youre
> shutting down doors for fine grained access control.

OK, I'll drop that patch and add a mysql_signull() next time I see the need 
for it (probably a week or two).

> >  optional_policy(`
> > 
> > +	dbus_send_system_bus(smbd_t)
> > +	dbus_system_bus_client(smbd_t)
> 
> dbus_send_system_bus(smbd_t) is redundant (already implied with
> dbus_system_bus_client(smbd_t)

ok

> > Index: refpolicy-2.20210120/policy/modules/services/squid.te
> > ===================================================================
> > --- refpolicy-2.20210120.orig/policy/modules/services/squid.te
> > +++ refpolicy-2.20210120/policy/modules/services/squid.te
> > @@ -71,6 +71,7 @@ allow squid_t self:msg { send receive };
> > 
> >  allow squid_t self:unix_dgram_socket sendto;
> >  allow squid_t self:unix_stream_socket { accept connectto listen };
> >  allow squid_t self:tcp_socket { accept listen };
> > 
> > +allow squid_t self:netlink_netfilter_socket
> > all_netlink_netfilter_socket_perms;
> 
> probably just create_socket_perms?

OK.

> > Index: refpolicy-2.20210120/policy/modules/services/ssh.te
> > ===================================================================
> > --- refpolicy-2.20210120.orig/policy/modules/services/ssh.te
> > +++ refpolicy-2.20210120/policy/modules/services/ssh.te
> > @@ -268,6 +268,7 @@ ifdef(`init_systemd',`
> > 
> >  	init_dbus_chat(sshd_t)
> >  	systemd_dbus_chat_logind(sshd_t)
> >  	init_rw_stream_sockets(sshd_t)
> > 
> > +	systemd_read_logind_sessions_files(sshd_t)
> 
> This should probably be addressed on the lower authlogin level instead

auth_login_pgm_domain()?

In another patch I have systemd_connect_machined(sshd_t) which I guess should 
go in the same one too.


Thanks for all the suggestions.  I'll send an updated version shortly.

-- 
My Main Blog         http://etbe.coker.com.au/
My Documents Blog    http://doc.coker.com.au/






[Index of Archives]     [AMD Graphics]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux