Re: Silly audit2allows

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Bill Chimiak wrote:
> Three things:
> 1. If one does the audit2allow ...
> 	checkmodule -M -m -o mynewmodule.mod mynewmodule.te
> 	semodule_package -o mynewmodule.pp -m mynewmodule.mod
> 	semodule -i mynewmodule.pp
> 
> How does one undo that if mynewmodule.te is a stupid policy?
> Doesn't the semodule make that part of the policy on every boot?
> 
> 2. As a selinux wannabee and an selinux enthusiast, I want more of
> my coworkers to use selinux.  They are highly resistant and usually
> have selinux=0 or enforce=0 on their boot commands.
> Having a list of dumb audit2allow rules would be most helpful so 
> I could explain to them how to use selinux without it being too cumbersome.
> I know, a lot depends on the situation, but some should make one nervous,
> 
> For example, if one saw the following:
> 	allow unconfined_t root_t:file { read write append create};
> one should be very nervous (I would think).  
> 
> There are other suggestions that I think you all see that might 
> make you all chuckle.  I would like a list of chucklers so I do not
> accidentally become a comedian.
> 
> 3. Are any of these potentially dangerous (my apologies if this is a stupid 
> request)?
> allow automount_t unlabeled_t:dir search;
automount trying to mount a file system that SELinux Policy/Kernel does
not understand.  Potentially dangerous
> allow fsdaemon_t urandom_device_t:chr_file read;
fsdaemon reading /dev/urandom - Not dangerous
> allow groupadd_t devpts_t:chr_file { read write };
groupadd read/write of a generice pty. Not dangerous, since what
groupadd can do is far more dangerous.
> allow httpd_t default_t:dir search;
http is trying to read a directory that has the default label.  Probably
need to label it httpd_sys_content_t
> allow insmod_t src_t:dir search;
modutils command searching /src.  Highly unusual.  Might be executing
the command while sitting in /src directory.  Seems apps like to getcwd
when starting up.
> allow irqbalance_t user_home_t:dir search;
irqbalance is trying to search home directories.  Not something I like
to allow, since my homedirectories contain important information like
passwords and credit card data.  Might be the same reason as insmod_t
wants to search /src

> allow ldconfig_t var_t:dir write;
Probably a labeling problem.
> allow pam_console_t file_t:dir read;
Unlabeled file, potentially major labeling problem on your system.  This
means you have a file that was created on a machine that was running
without SELinux.  Should relabel.
> allow semanage_t devpts_t:chr_file { read write };
> allow setfiles_t devpts_t:chr_file { read write };
> allow useradd_t devpts_t:chr_file { read write };
All three of these are trying to read/write pty that has generic label.
 Nothing to worry about since these domains can do much more interesting
damage.
> 
> 
> Thank you for your time and effort.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkfDINgACgkQrlYvE4MpobMCvwCeIBCVp3h6UtvLj0xiXKgZrLFj
DfQAoJmTJRZvDGmZBpGHmEMbRaJ5tjep
=Rzwe
-----END PGP SIGNATURE-----

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux