Re: sshd error: Failed to get default security context

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Oct 19, 2009 at 10:13 AM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
On Mon, 2009-10-19 at 09:49 -0700, Larry Ross wrote:
> On Mon, Oct 19, 2009 at 6:53 AM, Stephen Smalley <sds@xxxxxxxxxxxxx>
> wrote:
>
>         On Sat, 2009-10-17 at 11:17 -0700, Larry Ross wrote:
>         >
>         >
>         > On Sat, Oct 17, 2009 at 4:39 AM, Daniel J Walsh
>         <dwalsh@xxxxxxxxxx>
>         > wrote:
>         >
>         >         On 10/16/2009 08:15 PM, Larry Ross wrote:
>         >         > I have created a custom selinux user for the
>         strict policy
>         >         on RHEL5.3 who's
>         >         > purpose is to connect via ssh and scp files off
>         the
>         >         machine.  When that user
>         >         > tries to login via ssh, I see the following
>         messages
>         >         in /var/log/secure:
>         >         >
>         >         > In enforcing:
>         >         > Oct 16 07:49:40 localhost sshd[20461]: Accepted
>         password for
>         >         scpuser
>         >         > from 192.168.1.1 port 64680 ssh2
>         >         > Oct 16 07:49:40 localhost sshd[20461]: error:
>         Failed to get
>         >         default security
>         >         > context for scpuser.
>         >         > Oct 16 07:49:40 localhost sshd[20461]: fatal:
>         SELinux
>         >         failure. Aborting
>         >         > connection.
>         >         >
>         >         > In permissive:
>         >         > Oct 16 07:55:59 localhost sshd[23302]: Accepted
>         password for
>         >         scpuser from
>         >         > 192.168.1.1 port 56254 ssh2
>         >         > Oct 16 07:55:59 localhost sshd[23302]: error:
>         Failed to get
>         >         default security
>         >         > context for scpuser.
>         >         > Oct 16 07:55:59 localhost sshd[23302]: error:
>         SELinux
>         >         failure. Continuing in
>         >         > permissive mode.
>         >         >
>         >         > Could someone explain what these messages mean?
>         >         >
>         >         > I believe that I have a default context defined in
>         the
>         >         "default context"
>         >         > file that should work. I believe I have an
>         executable
>         >         context available for
>         >         > this user (using rbash rather than bash).
>         >         >
>         >         > How is sshd making this decision?  It looks like
>         it is
>         >         calling setexeccon,
>         >         > but I'm not sure how that makes its decision.
>          Where should
>         >         I look for clues
>         >         > as to how to fix it?
>         >         >
>         >         >    Thank you,
>         >         >    Larry
>         >         >
>         >
>         >         Did you add an entry to default_types?
>         >
>         > I did.  And in default_contexts and in users/scpuser.  None
>         of
>         > them fixed the issue.
>         > Could someone explain to me if these files are still used
>         and what
>         > they are used for?  And if there are other files that might
>         need to be
>         > modified as well?
>
>
>         Not up to date, but possibly still useful:
>         http://www.nsa.gov/research/_files/selinux/papers/policy2/x724.shtml
>         http://oss.tresys.com/projects/refpolicy/wiki/RoleCreation
>
> Stephen,
>   Thank you for these links, I hadn't found them in my searching and
> they seem to contain the information I need (and it looks like they
> are for the most part still accurate).
>
>   The missing piece is the MLS/MCS portion of the context, that seems
> to be included in the files that came with RHEL5, is that used as any
> part of the context decision?  Is it used when setting the new
> context?

Not anymore, no - that is a legacy of the original MLS logic and
predates the use of the seusers configuration.  The MLS/MCS portion gets
set from the user's entry in the seusers configuration these days,
although it has to be within the authorized range for the corresponding
SELinux user in the policy of course.  LSPP configuration also has a
setup where sshd will try to preserve the level of the client when using
labeled networking, but that has to be enabled.
 
Stephen,
  Thank you for your reply.  That was helpful.
  One question, what do you mean when you say "seusers configuration"?  Is that the files in <policy type>/contexts/users or the information maintained by semanage or something else?
 
  Thanks,
  Larry
 

--
Stephen Smalley
National Security Agency



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux