Re: Context settings after ssh login

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On 10/19/2010 08:47 AM, imsand@xxxxxxxxx wrote:
>>> On 10/19/2010 07:42 AM, imsand@xxxxxxxxx wrote:
>>>>> On 10/07/2010 09:11 AM, Daniel J Walsh wrote:
>>>>>
>>>>>> -----BEGIN PGP SIGNED MESSAGE-----
>>>>>> Hash: SHA1
>>>>>>
>>>>>> On 10/07/2010 10:40 AM, Chad Sellers wrote:
>>>>>>
>>>>>>> On 10/6/10 3:29 AM, "imsand@xxxxxxxxx"<imsand@xxxxxxxxx>    wrote:
>>>>>>>
>>>>>>>
>>>>>>>>> On 10/05/2010 11:43 PM, imsand@xxxxxxxxx wrote:
>>>>>>>>>
>>>>>>>>>>> On 10/05/2010 06:38 AM, imsand@xxxxxxxxx wrote:
>>>>>>>>>>>
>>>>>>>>>>>>> On 10/04/2010 11:30 PM, imsand@xxxxxxxxx wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>>> On 10/04/2010 01:03 AM, imsand@xxxxxxxxx wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Hello
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> I'm working on SUSE SLES11SP1 and encounter the following
>>>>>>>>>>>>>>>> problem.
>>>>>>>>>>>>>>>> Setting the context of the User after ssh login doesn't
>>>>>>>>>>>>>>>> work
>>>>>>>>>>>>>>>> if
>>>>>>>>>>>>>>>> the
>>>>>>>>>>>>>>>> SELinux Username and the Linux Username aren't identical.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> --------------
>>>>>>>>>>>>>>>> Here is an example (SElinux User=mat_u, Linux User=mat_u):
>>>>>>>>>>>>>>>> Oct  4 09:41:54 testsrv.example sshd[15829]: Accepted
>>>>>>>>>>>>>>>> keyboard-interactive/pam for mat_u from 131.102.233.125
>>>>>>>>>>>>>>>> port
>>>>>>>>>>>>>>>> 54714
>>>>>>>>>>>>>>>> ssh2
>>>>>>>>>>>>>>>> Oct  4 09:41:54 testsrv.example sshd[15829]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> Open Session
>>>>>>>>>>>>>>>> Oct  4 09:41:54 testsrv.example sshd[15829]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> Open Session
>>>>>>>>>>>>>>>> Oct  4 09:41:54 testsrv.example sshd[15829]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> Username= mat_u SELinux User = user_u Level= (null)
>>>>>>>>>>>>>>>> Oct  4 09:41:54 testsrv.example sshd[15829]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> set mat_u security context to user_u:user_r:user_t
>>>>>>>>>>>>>>>> Oct  4 09:41:54 testsrv.example sshd[15829]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> set mat_u key creation context to user_u:user_r:user_t
>>>>>>>>>>>>>>>> ---
>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~>        id
>>>>>>>>>>>>>>>> uid=6575(mat_u) gid=100(users)
>>>>>>>>>>>>>>>> groups=16(dialout),33(video),100(users)
>>>>>>>>>>>>>>>> context=mat_u:staff_r:staff_t
>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~>        newrole -r sysadm_r
>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~>        id
>>>>>>>>>>>>>>>> uid=6575(mat_u) gid=100(users)
>>>>>>>>>>>>>>>> groups=16(dialout),33(video),100(users)
>>>>>>>>>>>>>>>> context=mat_u:sysadm_r:sysadm_t
>>>>>>>>>>>>>>>> --------------------
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> So, this is okey. The user's context after login is
>>>>>>>>>>>>>>>> "mat_u:staff_r:staff_t"
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> But, if the Linux User is different from the SELinux User,
>>>>>>>>>>>>>>>> the
>>>>>>>>>>>>>>>> default
>>>>>>>>>>>>>>>> user's will be chosen instead.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Here is the example (SELinux User=mat_u, Linux User=mat):
>>>>>>>>>>>>>>>> ---------------------
>>>>>>>>>>>>>>>> Oct  4 09:46:22 testsrv.example sshd[16185]: Accepted
>>>>>>>>>>>>>>>> keyboard-interactive/pam for mat from 131.102.233.125 port
>>>>>>>>>>>>>>>> 54726
>>>>>>>>>>>>>>>> ssh2
>>>>>>>>>>>>>>>> Oct  4 09:46:22 testsrv.example sshd[16185]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> Open Session
>>>>>>>>>>>>>>>> Oct  4 09:46:22 testsrv.example sshd[16185]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> Open Session
>>>>>>>>>>>>>>>> Oct  4 09:46:22 testsrv.example sshd[16185]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> Username= mat SELinux User = mat_u Level= (null)
>>>>>>>>>>>>>>>> Oct  4 09:46:22 testsrv.example sshd[16185]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> set mat security context to mat_u:staff_r:staff_t
>>>>>>>>>>>>>>>> Oct  4 09:46:22 testsrv.example sshd[16185]:
>>>>>>>>>>>>>>>> pam_selinux(sshd:session):
>>>>>>>>>>>>>>>> set mat key creation context to mat_u:staff_r:staff_t
>>>>>>>>>>>>>>>> ---
>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~>        id
>>>>>>>>>>>>>>>> uid=6575(mat) gid=100(users)
>>>>>>>>>>>>>>>> groups=16(dialout),33(video),100(users)
>>>>>>>>>>>>>>>> context=user_u:user_r:user_t
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~>        newrole -r sysadm_r
>>>>>>>>>>>>>>>> user_u:sysadm_r:sysadm_t is not a valid context
>>>>>>>>>>>>>>>> ---------------------
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> As you can see, the pam_selinux module recognizes that the
>>>>>>>>>>>>>>>> new
>>>>>>>>>>>>>>>> context
>>>>>>>>>>>>>>>> should be "mat_u:staff_r:staff_t", but for some reason the
>>>>>>>>>>>>>>>> real
>>>>>>>>>>>>>>>> context
>>>>>>>>>>>>>>>> is
>>>>>>>>>>>>>>>> user_u:user_r:user_t. Changing the context with newrole
>>>>>>>>>>>>>>>> doesn't
>>>>>>>>>>>>>>>> work
>>>>>>>>>>>>>>>> either...
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> The user mappings should be okey:
>>>>>>>>>>>>>>>> ------
>>>>>>>>>>>>>>>> semanage user -l | grep mat
>>>>>>>>>>>>>>>> mat_u           staff_r sysadm_r
>>>>>>>>>>>>>>>> testsrv.example:~ # semanage login -l | grep mat
>>>>>>>>>>>>>>>> mat
>>>>>>>>>>>>>>>> -------
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Any idea out there? Do I miss something?
>>>>>>>>>>>>>>>> kind regards
>>>>>>>>>>>>>>>> Matthias
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>> This message was distributed to subscribers of the selinux
>>>>>>>>>>>>>>>> mailing
>>>>>>>>>>>>>>>> list.
>>>>>>>>>>>>>>>> If you no longer wish to subscribe, send mail to
>>>>>>>>>>>>>>>> majordomo@xxxxxxxxxxxxx
>>>>>>>>>>>>>>>> with
>>>>>>>>>>>>>>>> the words "unsubscribe selinux" without quotes as the
>>>>>>>>>>>>>>>> message.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> you can specify the context in
>>>>>>>>>>>>>>> /etc/selinux/policy/contexts/users/whatroleyouused
>>>>>>>>>>>>>>> (under sshd) I normally set user_r:user_t:s0
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Justin P. Mattock
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>> This message was distributed to subscribers of the selinux
>>>>>>>>>>>>>>> mailing
>>>>>>>>>>>>>>> list.
>>>>>>>>>>>>>>> If you no longer wish to subscribe, send mail to
>>>>>>>>>>>>>>> majordomo@xxxxxxxxxxxxx
>>>>>>>>>>>>>>> with
>>>>>>>>>>>>>>> the words "unsubscribe selinux" without quotes as the
>>>>>>>>>>>>>>> message.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>> The file looks like:
>>>>>>>>>>>>>> cat /etc/selinux/refpolicy/contexts/users/mat_u
>>>>>>>>>>>>>> system_r:local_login_t  staff_r:staff_t sysadm_r:sysadm_t
>>>>>>>>>>>>>> system_r:remote_login_t  staff_r:staff_t
>>>>>>>>>>>>>> system_r:sshd_t   staff_r:staff_t sysadm_r:sysadm_t
>>>>>>>>>>>>>> system_r:crond_t  staff_r:cronjob_t
>>>>>>>>>>>>>> system_r:xdm_t   staff_r:staff_t
>>>>>>>>>>>>>> staff_r:staff_su_t  staff_r:staff_t
>>>>>>>>>>>>>> staff_r:staff_sudo_t  staff_r:staff_t
>>>>>>>>>>>>>> sysadm_r:sysadm_su_t  sysadm_r:sysadm_t
>>>>>>>>>>>>>> sysadm_r:sysadm_sudo_t  sysadm_r:sysadm_t
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> So, theoretical this should be okey, isn't it?
>>>>>>>>>>>>>> And as you can see in the log from above (set mat key
>>>>>>>>>>>>>> creation
>>>>>>>>>>>>>> context
>>>>>>>>>>>>>> to
>>>>>>>>>>>>>> mat_u:staff_r:staff_t) it "tries" to switch to staff but for
>>>>>>>>>>>>>> some
>>>>>>>>>>>>>> reason
>>>>>>>>>>>>>> it doesn't work..
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>> if your sshd'ing and the context is staff_r:staff_t then it's
>>>>>>>>>>>>> correct,
>>>>>>>>>>>>> I
>>>>>>>>>>>>> usually change this to user_r:user_t just cause I'm paranoid.
>>>>>>>>>>>>> Also there is some options that you can set in /etc/pam.d to
>>>>>>>>>>>>> do
>>>>>>>>>>>>> other
>>>>>>>>>>>>> checks etc..
>>>>>>>>>>>>>
>>>>>>>>>>>>> Justin P. Mattock
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>> no it's not and that't the problem:)
>>>>>>>>>>>> If I sshd'ing with mat_u it's always "user_r:user_t" even
>>>>>>>>>>>> "staff_r:staff_t" is specified (see above). But it's correct
>>>>>>>>>>>> if
>>>>>>>>>>>> the
>>>>>>>>>>>> selinux and linux users are named equaly (mat in the example).
>>>>>>>>>>>> It seems that something with the context settings and
>>>>>>>>>>>> usermapping
>>>>>>>>>>>> isn't
>>>>>>>>>>>> correct. Do you see the problem?
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Somewhere in the policy it is set to default to user_r for
>>>>>>>>>>> sshd,
>>>>>>>>>>> I
>>>>>>>>>>> dont
>>>>>>>>>>> think there is a boolean(but could be wrong)for that feature.
>>>>>>>>>>> maybe
>>>>>>>>>>> it's
>>>>>>>>>>> reading the default_contexts file which is set to use
>>>>>>>>>>> user_r:user_t
>>>>>>>>>>> instead of reading mat_u for sshd(staff_r:staff_t)
>>>>>>>>>>>
>>>>>>>>>>> Justin P. Mattock
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>> Unfortunately I can't see a rule doing this. The curious thing
>>>>>>>>>> is,
>>>>>>>>>> that
>>>>>>>>>> it
>>>>>>>>>> works if the selinux user and the linux user are equivalent
>>>>>>>>>> (both
>>>>>>>>>> mat_u).
>>>>>>>>>> But it does NOT work if it is mat (linux user) and mapped to
>>>>>>>>>> mat_u
>>>>>>>>>> (selinux user).
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> hmm.. something seems configured wrong, what OS are you using? do
>>>>>>>>> you
>>>>>>>>> have semanage login/user -l set up correctly?
>>>>>>>>>
>>>>>>>>> over here I build the policy from git, normally edit policy/users
>>>>>>>>> (add)
>>>>>>>>> gen_user(name,system_u, sysadm_r staff_r user_r, s0, s0 -
>>>>>>>>> mls_systemhigh, mcs_allcats)
>>>>>>>>>
>>>>>>>>> then after the policy is built and installed/loaded I do
>>>>>>>>> semanage login -a -s name name (create name in contexts/users)
>>>>>>>>> (or skip the above and just use semanage -a -s user_u name)
>>>>>>>>>
>>>>>>>>> seems sshd works with the given context I specify(user_r) then if
>>>>>>>>> I
>>>>>>>>> want
>>>>>>>>> to add more options I adjust /etc/pam.d/*
>>>>>>>>>
>>>>>>>>> Justin P. Mattock
>>>>>>>>>
>>>>>>>>>
>>>>>>>> Thanks for your reply.
>>>>>>>> I'm using SLES 11 SP1. It wouldn't be the first bug regarding
>>>>>>>> SELinux
>>>>>>>> on
>>>>>>>> this distro... ;)
>>>>>>>> Here is what I've done so far.
>>>>>>>> - Downloaded the latest reference policy from tresys
>>>>>>>> - Compiled and installed it on my sles 11.1
>>>>>>>> - Add selinux user mat_u: "semanage user -R "staff_r system_r" -P
>>>>>>>> user
>>>>>>>> -a
>>>>>>>> mat_u"
>>>>>>>> - Add linux user mat: "useradd mat"
>>>>>>>> - Set password for mat: "passwd mat"
>>>>>>>> - User mapping: "semanage login -s mat_u -a mat"
>>>>>>>> - add security context for mat_u by copying staff_u's context
>>>>>>>> "cp /etc/selinux/refpolicy/contexts/user/staff_u
>>>>>>>> /etc/selinux/refpolicy/contexts/user/mat_u"
>>>>>>>> - set boolean for sysadm ssh login to true: "setsebool -P
>>>>>>>> ssh_sysadm_login
>>>>>>>> on"
>>>>>>>>
>>>>>>>> Do you know good debug options for tracing where it stucks?
>>>>>>>>
>>>>>>>>
>>>>>>> When debugging login-type programs figuring out the context to
>>>>>>> transition
>>>>>>> to, there are a couple of simple useful utilities in
>>>>>>> libselinux/utils.
>>>>>>> These
>>>>>>> are getconlist and getdefaultcon. Most distros won't install these
>>>>>>> (as
>>>>>>> they're just debugging tools), but you can build them yourself out
>>>>>>> of
>>>>>>> the
>>>>>>> tree.
>>>>>>>
>>>>>>> getconlist will print out the contexts returned by
>>>>>>> get_ordered_context_list(), which are all the reachable contexts.
>>>>>>> This
>>>>>>> could
>>>>>>> tell you if the problem is that the context you're trying to
>>>>>>> transition
>>>>>>> to
>>>>>>> is for some reason unreachable.
>>>>>>>
>>>>>>> getdefaultcon can tell you (in verbose mode) the default seuser and
>>>>>>> level
>>>>>>> returned by getseuserbyname() and the default context returned by
>>>>>>> get_default_context_with_rolelevel()/get_default_context_with_level().
>>>>>>> If
>>>>>>> the seuser is wrong, then you know something's going wrong in
>>>>>>> getseuserbyname().
>>>>>>>
>>>>>>> I hope that helps.
>>>>>>>
>>>>>>> Thanks,
>>>>>>> Chad Sellers
>>>>>>>
>>>>>>>
>>>>>>> --
>>>>>>> This message was distributed to subscribers of the selinux mailing
>>>>>>> list.
>>>>>>> If you no longer wish to subscribe, send mail to
>>>>>>> majordomo@xxxxxxxxxxxxx with
>>>>>>> the words "unsubscribe selinux" without quotes as the message.
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>> We ship them in fedora as selinuxconlist and selinuxdefcon
>>>>>> -----BEGIN PGP SIGNATURE-----
>>>>>> Version: GnuPG v1.4.10 (GNU/Linux)
>>>>>> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
>>>>>>
>>>>>> iEYEARECAAYFAkyt8UkACgkQrlYvE4MpobPw+wCfa8sf3A8+xhnMmdz2z3/vuJOM
>>>>>> TYsAn1s18NmE9caf5MpCt312RO2Wh/BI
>>>>>> =N+E/
>>>>>> -----END PGP SIGNATURE-----
>>>>>>
>>>>>>
>>>>>
>>>>> o.k. I just loaded up OpenSUSE11.4, and loaded the policy(this is
>>>>> from
>>>>> git keep in mind, not what suse offers).
>>>>> after getting everything setup I was able to ssh into the machine
>>>>> with
>>>>> my iphone, and issue id -Z.. the context I set is user_r:user_t which
>>>>> the iphone showed(name:user_r:staff_t:s0) so everything is good with
>>>>> this version.(not sure with 11.1, but I know 11.2 works fine, as well
>>>>> as
>>>>> 11.4).
>>>>>
>>>>> Justin P. Mattock
>>>>>
>>>>> --
>>>>> This message was distributed to subscribers of the selinux mailing
>>>>> list.
>>>>> If you no longer wish to subscribe, send mail to
>>>>> majordomo@xxxxxxxxxxxxx
>>>>> with
>>>>> the words "unsubscribe selinux" without quotes as the message.
>>>>>
>>>>>
>>>> Thank you for your answers.
>>>> I've reinstalled the sles11.1 with the newest opensuse selinux
>>>> libraries
>>>> (http://download.opensuse.org/repositories/security:/SELinux/openSUSE_Factory/x86_64/),
>>>> but it still struggles with the ssh login. Local login is working now!
>>>> There must be a problem with pam_selinux. Here's the output of the
>>>> debug
>>>> log:
>>>> Oct 19 16:40:50 testmachine.local sshd[7550]:
>>>> pam_selinux(sshd:session):
>>>> Open Session
>>>> Oct 19 16:40:50 testmachine.local sshd[7550]:
>>>> pam_selinux(sshd:session):
>>>> Username= mat SELinux User = mat_u Level= (null)
>>>> Oct 19 16:40:50 testmachine.local sshd[7550]:
>>>> pam_selinux(sshd:session):
>>>> set mat security context to mat_u:staff_r:insmod_t
>>>> Oct 19 16:40:50 testmachine.local sshd[7550]:
>>>> pam_selinux(sshd:session):
>>>> set mat key creation context to mat_u:staff_r:insmod_t
>>>> Oct 19 16:40:50 testmachine.local sshd[7557]: pam_unix2(sshd:setcred):
>>>> pam_sm_setcred() called
>>>> Oct 19 16:40:50 testmachine.local sshd[7557]: pam_unix2(sshd:setcred):
>>>> username=[mat]
>>>> Oct 19 16:40:50 testmachine.local sshd[7557]: pam_unix2(sshd:setcred):
>>>> pam_sm_setcred: PAM_SUCCESS
>>>> Oct 19 16:40:50 testmachine.local sshd[7557]: fatal:
>>>> ssh_selinux_getctxbyname: Failed to get default SELinux security
>>>> context
>>>> for mat (in enforcing mode)
>>>> Oct 19 16:40:50 testmachine.local sshd[7550]:
>>>> pam_selinux(sshd:session):
>>>> Close Session
>>>>
>>>> @justin: which policy did you installed from git? url? I tried
>>>> refpolicy
>>>> from tresys.
>>>>
>>>>
>>>>
>>>>
>>>
>>>
>>> from what I remember insmod_t is a context I always received, due to
>>> unlabeled filesystem
>>> i.e. I also use LFS, and will tar ball the whole system, and copy it
>>> over to the new machine,
>>> then receive the insmod_t until I relabel, then all is good, but in
>>> your
>>> case it shouldn't be going to that.
>>>
>>>
>>> as for the policy(sounds like the same one)..:
>>>
>>> git clone http://oss.tresys.com/git/refpolicy.git
>>>
>>> in regards to sles11 im wondering if it's close to opensuse 11.1, if so
>>> I can
>>> load that one up on my machine to see whats happening(right now I'm
>>> kind
>>> of floating
>>> from one distro to the next(I have the "try that out distro itch"..))
>>>
>>> Justin P. Mattock
>>>
>>>
>>
>> I don't think that opensuse 11.1 and sles 11.1 are close enough!?
>> I found out that if the selinux user and the linux user are equal (both
>> mat_u), the ssh login works as well.
>>
>> indeed insmod was gone after "make relabel", but now I can't start the
>> system in enforcing mode anymore, because a couple of denies =>
>> most of them are related to dbus and rpc-statd:
>> ----
>> avc:  denied  { search } for  pid=2320 comm="dbus-daemon" nam
>> e="dbus" dev=dm-7 ino=40172 scontext=system_u:system_r:sysadm_dbusd_t
>> tcontext=system_u:object_r:system_dbusd_var_run_t tclass=dir
>> ----
>> ----
>> avc:  denied  { read } for  pid=3127 comm="rpc.statd" path="p
>> ipe:[9740]" dev=pipefs ino=9740 scontext=system_u:system_r:mount_t
>> tcontext=system_u:system_r:mount_t tclass=fifo_file
>> ----
>> are you familiar with that? are there some booleans to set or do I have
>> to
>> adjust the policy?
>>
>>
>>
>>
>


> from what I remember opensuse 11.2 had issues starting due too
> /etc/selinux/config having the wrong permissions(should be -rw-r--r--.)
the permissions were already correct on my system.

> has issues with /etc/initscript causing SELinux to not transition(thread
> here)..:
> http://oss.tresys.com/pipermail/refpolicy/2010-February/002012.html
>
> for some reason sysvinit craps out with:
> if (access(INITSCRIPT, R_OK) == 0 && runlevel != 'S') {
>
> I played around with sysvinit, but my code skills only took me so far:
> http://www.spinics.net/lists/selinux/msg08983.html
>
> two solutions to this is too mv /etc/initscript{,-bak} or
> setsebool -P init_upstart on
> this way you transistion properly and you wont receive a dbus error(if
> this is whats happening with sles11.1)
You're right. after setting init_upstart=1 I don't receive a dbus error
anymore.

>
> thirdly login context gets the wrong role.. simple fix is on this
> report:
> https://bugzilla.novell.com/show_bug.cgi?id=582366
>
> here are the bug reports that got fixed so opensuse 11.2 is able to get
> up and running in full enforcement mode.
>
> https://bugzilla.novell.com/show_bug.cgi?id=581505
> https://bugzilla.novell.com/show_bug.cgi?id=582399
> https://bugzilla.novell.com/show_bug.cgi?id=582404
>
> hopefully these are similar to what you're hitting...this way you can
> get up and running properly...
>
I was gone through all reports but so far I have an other problem
preventing me from logging in (in enforcing mode).
"Permissions on the password database may be too restrictive." => I'm sure
that the password is correct.

This could be related to pam stuff (like described in aboves bugs), but
first of all I would like to get rid of some other problems:
type=AVC msg=audit(1287563356.696:342): avc:  denied  { module_request }
for  pid=3839 comm="sshd" scontext=system_u:system_r:sshd_t
tcontext=system_u:system_r:kernel_t tclass=system
type=AVC msg=audit(1287563356.848:343): avc:  denied  { search } for 
pid=3839 comm="sshd" name="root" dev=dm-2 ino=7828
scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:default_t
tclass=dir
type=AVC msg=audit(1287563360.848:344): avc:  denied  { module_request }
for  pid=3839 comm="sshd" scontext=system_u:system_r:sshd_t
tcontext=system_u:system_r:kernel_t tclass=system
type=AVC msg=audit(1287563360.904:345): avc:  denied  { search } for 
pid=3848 comm="sshd" name="root" dev=dm-2 ino=7828
scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:default_t
tclass=dir
type=AVC msg=audit(1287563361.056:346): avc:  denied  { search } for 
pid=3849 comm="xauth" name="root" dev=dm-2 ino=7828
scontext=root:staff_r:xauth_t tcontext=system_u:object_r:default_t
tclass=dir
type=AVC msg=audit(1287563361.056:347): avc:  denied  { write } for 
pid=3849 comm="xauth" name="root" dev=dm-2 ino=7828
scontext=root:staff_r:xauth_t tcontext=system_u:object_r:default_t
tclass=dir

Do you see what the problem could be?


And there is another issue which prevents syslogd from starting:

Oct 20 09:21:20 testmachine.local syslog-ng[3103]: Error opening file for
 writing; filename='/dev/tty10', error='Permission denied (13)'
Oct 20 09:21:20 testmachine.local syslog-ng[3103]: Error opening file for
 writing; filename='/dev/xconsole', error='Permission denied (13)'

Any ideas?

Thanks a lot in advance


> Justin P. Mattock
>
>



--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux