Re: Question about newrole

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Aug 5, 2008 at 8:10 AM, Dennis Wronka <linuxweb@xxxxxxx> wrote:
>
> -------- Original-Nachricht --------
>> Datum: Tue, 5 Aug 2008 08:04:34 -0700
>> Von: "Justin Mattock" <justinmattock@xxxxxxxxx>
>> An: "Stephen Smalley" <sds@xxxxxxxxxxxxx>
>> CC: "Dennis Wronka" <linuxweb@xxxxxxx>, "Xavier Toth" <txtoth@xxxxxxxxx>, "SELinux Mailing List" <selinux@xxxxxxxxxxxxx>
>> Betreff: Re: Question about newrole
>
>> On Tue, Aug 5, 2008 at 7:48 AM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
>> >
>> > On Tue, 2008-08-05 at 22:32 +0800, Dennis Wronka wrote:
>> >> Thanks.
>> >> That seems to help quite a bit.
>> >> I now get some messages. For example it seems that newrole wants to
>> >> read /etc/shadow directly.
>> >> Will check those messages and play around with the policy.
>> >
>> > The way it works is that pam_unix attempts to open /etc/shadow directly
>> > for reading, and if it fails, it falls back to running unix_chkpwd to
>> > perform the password check.  SELinux policy prohibits most programs from
>> > directly reading /etc/shadow, including even ones that run as root, and
>> > forces them to go through unix_chkpwd instead, in order to limit the set
>> > of processes that have full read access to the shadow password file.
>> >
>> > The logic to try to open /etc/shadow and fall back to unix_chkpwd
>> > already existed before SELinux in order to support non-root processes
>> > re-authenticating the current user.  What changed with SELinux was that
>> > it could also happen for root processes.
>> >
>> > The current policy dontaudit's the attempt to directly read /etc/shadow
>> > to avoid noise.  When you did semodule -DB, you turned on that auditing.
>> > But those denials are what is expected, and allowing them will mean
>> > giving newrole direct read access to /etc/shadow (although that will
>> > only work if running as root, of course, as otherwise it has to use a
>> > suid helper like unix_chkpwd anyway).
>> >
>> > Does newrole work for you as a non-root user?
>> >
>> > --
>> > Stephen Smalley
>> > National Security Agency
>> >
>> >
>> > --
>> > This message was distributed to subscribers of the selinux mailing list.
>> > If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx
>> with
>> > the words "unsubscribe selinux" without quotes as the message.
>> >
>>
>> I usually just type passwd in a terminal
>> and update the database. then choose you're role
>> and do the same for that role if need be.
>> but depending on what you have, this might be a different case.
>> hope this helps.
>> regards;
>>
>> --
>> Justin P. Mattock
>
> What I actually want to use newrole for is not resetting passwords. I was thinking to introduce MLS to the next release and thus require the user to transition to secadm_r if he wants to switch from enforcing to permissive.
> --
> GMX startet ShortView.de. Hier findest Du Leute mit Deinen Interessen!
> Jetzt dabei sein: http://www.shortview.de/wasistshortview.php?mc=sv_ext_mf@gmx
>

O.k.
I thaught you were getting
a permisions denied when entering newrole -r *
I receive this normally on a fresh install, then
after updating the database, everything is good.
regards;

-- 
Justin P. Mattock

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux