Re: racoon got dead due to permission lacking

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2008-01-25 at 14:17 -0500, Stephen Smalley wrote:
> On Fri, 2008-01-25 at 14:24 +0900, Kohei KaiGai wrote:
> > When I tested labeled ipsec, racoon got dead with the following messages:
> > (I added some line break for reader's confortable)
> > 
> > | type=AVC msg=audit(1201052881.758:783): avc:  denied  { read }
> > |   for  pid=26854 comm="racoon" name="net" dev=proc ino=4026531867
> > |   scontext=root:system_r:racoon_t:s0
> > |   tcontext=system_u:object_r:proc_t:s0 tclass=dir
> 
> That one is a kernel bug (in 2.6.24).  Should have a fix soon - patch is
> being reviewed.

Fix upstreamed,
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b1aa5301b9f88a4891061650c591fb8fe1c1


> > | type=AVC msg=audit(1201052881.758:784): avc:  denied  { read }
> > |   for  pid=26854 comm="racoon" name="unix" dev=proc ino=4026532018
> > |   scontext=root:system_r:racoon_t:s0
> > |   tcontext=system_u:object_r:proc_t:s0 tclass=file
> > | type=AVC msg=audit(1201052881.758:785): avc:  denied  { node_bind }
> > |   for  pid=26854 comm="racoon" saddr=127.0.0.1 src=500
> > |   scontext=root:system_r:racoon_t:s0
> > |   tcontext=system_u:object_r:lo_node_t:s0 tclass=udp_socket
> > | type=AVC msg=audit(1201052881.759:786): avc:  denied  { node_bind }
> > |   for  pid=26854 comm="racoon" saddr=10.19.71.81 src=500
> > |   scontext=root:system_r:racoon_t:s0
> > |   tcontext=system_u:object_r:node_t:s0 tclass=udp_socket
> > | type=AVC msg=audit(1201052881.759:787): avc:  denied  { node_bind }
> > |   for  pid=26854 comm="racoon" saddr=0000:0000:0000:0000:0000:0000:0000:0001 src=500
> > |   scontext=root:system_r:racoon_t:s0
> > |   tcontext=system_u:object_r:compat_ipv4_node_t:s0 tclass=udp_socket
> > | type=AVC msg=audit(1201052881.759:788): avc:  denied  { node_bind }
> > |   for  pid=26854 comm="racoon" saddr=fe80:0000:0000:0000:0211:09ff:fe34:68e0 src=500
> > |   scontext=root:system_r:racoon_t:s0
> > |   tcontext=system_u:object_r:link_local_node_t:s0 tclass=udp_socket
> > 
> > selinux-policy-3.2.5-15.fc9 and ipsec-tools-0.7-8.fc9 are installed.
> > It seems to me that racoon tries to read /proc/net/unix, and bind adresses
> > on udp socket.
> > 
> > The attached patch grant those permissions, and it killed this matter.
> > Please apply it.
> > 
> > Thanks,
-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux