On Thu, 2010-04-15 at 16:08 -0400, Daniel J Walsh wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 04/14/2010 12:37 PM, James Cammarata wrote: > > > > On Wed, 14 Apr 2010 11:16:56 -0500, James Cammarata <jimi@xxxxxxxx> wrote: > >>>> > >>> Does this work in permissive mode? > >> > >> Actually, no, it doesn't, but I think I found the problem. I was > > assuming > >> all I needed at the end of newrole was --, but the man page says to use > > "-- > >> -c", which does seem to be working now. Turning enforcing back on: > >> > >> [test@kvm001 ~]$ sudo /usr/bin/audit.sh echo "hi there" > >> Password: > >> hi there > >> > >> So, that seems to be good, but it's still asking for the password for the > >> selinux user. Is pam_rootok not doing what it's supposed to? > The problem is rootok requires and SELinux priv to work also. So this > will not work unless you add the rootok to your default userdomain. > > allow staff_t self:passwd rootok; > > > > > Something else weird... I added a shebang line to the top of the audit.sh > > script, and now when I run it I don't get prompted for a password, but it > > fails with this message: > > > > [test@kvm001 ~]$ sudo /usr/bin/audit.sh echo hi > > Could not determine enforcing mode. > > > > Once again, there are no AVC's in the audit.log. I did have to add this to > > my custom policy though: > > > > allow staff_sudo_t newrole_exec_t:file { execute execute_no_trans }; > > > > > > Add an id -Z to the top of audit.sh At least part of the problem is that it is staying in staff_sudo_t rather than transitioning back to staff_t. Only the sudo program itself should be running in $1_sudo_t, not the programs it executes. Doesn't it execute sesh as a helper to transition back to the originating domain? -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.