On Tue, 2009-01-06 at 12:58 -0200, Martin Spinassi wrote: > On Tue, 2009-01-06 at 09:13 -0500, Stephen Smalley wrote: > [snip] > > > > > > Audit2allow "recommended" to allow transition from postfix_master_t to > > > port_t and then allow create socket port_t, but I didn't feel it much > > > secure...what do you think? > > > > I'm not sure I quite follow the above, as a transition usually means > > that we are changing from one context to another, and there is no > > transition in the above situation, just an attempt to bind to a given > > port. > > > > The actual verbatim output of audit2allow would likely be more useful. > > Without any semanage entries, I would have expected it to be something > > like: > > module mypostfix 1.0; > > require { > > type postfix_master_t; > > type port_t; > > class tcp_socket name_bind; > > } > > allow postfix_master_t port_t:tcp_socket name_bind; > > > > See for example: > > http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385 > > http://docs.fedoraproject.org/selinux-user-guide/f10/en-US/sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow.html > > > > Correct me if I'm wrong, but allowing this will accept the domain use > any tcp socket, and call me paranoid, but it could allow postfix > something like a reverse telnet or something. Is it right? (I've already > warned you that I'm a complete rookie, so it could be a ridiculous > response). It allows the domain to bind to any port that is not otherwise mapped to a specific type by the policy and thus defaults to port_t. Well-defined ports like telnet (23) are mapped to specific types like telnetd_port_t by policy, and the reserved port range is covered by default mappings to reserved_port_t or hi_reserved_port_t if there is no specific match. As I said, the above policy module is what I would expect it to generate if you were to run it on avc denials generated without any specific semanage port assignment for the 10026 port and thus defaulting to port_t. If you instead define your own port type and map the 10026 port to that type, then the allow rule could be specific to your new port type. -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.