> On 10/20/2010 01:42 AM, imsand@xxxxxxxxx wrote: >>> On 10/19/2010 08:47 AM, imsand@xxxxxxxxx wrote: >>>>> On 10/19/2010 07:42 AM, imsand@xxxxxxxxx wrote: >>>>>>> On 10/07/2010 09:11 AM, Daniel J Walsh wrote: >>>>>>> >>>>>>>> -----BEGIN PGP SIGNED MESSAGE----- >>>>>>>> Hash: SHA1 >>>>>>>> >>>>>>>> On 10/07/2010 10:40 AM, Chad Sellers wrote: >>>>>>>> >>>>>>>>> On 10/6/10 3:29 AM, "imsand@xxxxxxxxx"<imsand@xxxxxxxxx> >>>>>>>>> wrote: >>>>>>>>> >>>>>>>>> >>>>>>>>>>> On 10/05/2010 11:43 PM, imsand@xxxxxxxxx wrote: >>>>>>>>>>> >>>>>>>>>>>>> On 10/05/2010 06:38 AM, imsand@xxxxxxxxx wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>>> On 10/04/2010 11:30 PM, imsand@xxxxxxxxx wrote: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> On 10/04/2010 01:03 AM, imsand@xxxxxxxxx wrote: >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Hello >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> I'm working on SUSE SLES11SP1 and encounter the >>>>>>>>>>>>>>>>>> following >>>>>>>>>>>>>>>>>> problem. >>>>>>>>>>>>>>>>>> Setting the context of the User after ssh login doesn't >>>>>>>>>>>>>>>>>> work >>>>>>>>>>>>>>>>>> if >>>>>>>>>>>>>>>>>> the >>>>>>>>>>>>>>>>>> SELinux Username and the Linux Username aren't >>>>>>>>>>>>>>>>>> identical. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> -------------- >>>>>>>>>>>>>>>>>> Here is an example (SElinux User=mat_u, Linux >>>>>>>>>>>>>>>>>> User=mat_u): >>>>>>>>>>>>>>>>>> Oct 4 09:41:54 testsrv.example sshd[15829]: Accepted >>>>>>>>>>>>>>>>>> keyboard-interactive/pam for mat_u from 131.102.233.125 >>>>>>>>>>>>>>>>>> port >>>>>>>>>>>>>>>>>> 54714 >>>>>>>>>>>>>>>>>> ssh2 >>>>>>>>>>>>>>>>>> Oct 4 09:41:54 testsrv.example sshd[15829]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> Open Session >>>>>>>>>>>>>>>>>> Oct 4 09:41:54 testsrv.example sshd[15829]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> Open Session >>>>>>>>>>>>>>>>>> Oct 4 09:41:54 testsrv.example sshd[15829]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> Username= mat_u SELinux User = user_u Level= (null) >>>>>>>>>>>>>>>>>> Oct 4 09:41:54 testsrv.example sshd[15829]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> set mat_u security context to user_u:user_r:user_t >>>>>>>>>>>>>>>>>> Oct 4 09:41:54 testsrv.example sshd[15829]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> set mat_u key creation context to user_u:user_r:user_t >>>>>>>>>>>>>>>>>> --- >>>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~> id >>>>>>>>>>>>>>>>>> uid=6575(mat_u) gid=100(users) >>>>>>>>>>>>>>>>>> groups=16(dialout),33(video),100(users) >>>>>>>>>>>>>>>>>> context=mat_u:staff_r:staff_t >>>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~> newrole -r sysadm_r >>>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~> id >>>>>>>>>>>>>>>>>> uid=6575(mat_u) gid=100(users) >>>>>>>>>>>>>>>>>> groups=16(dialout),33(video),100(users) >>>>>>>>>>>>>>>>>> context=mat_u:sysadm_r:sysadm_t >>>>>>>>>>>>>>>>>> -------------------- >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> So, this is okey. The user's context after login is >>>>>>>>>>>>>>>>>> "mat_u:staff_r:staff_t" >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> But, if the Linux User is different from the SELinux >>>>>>>>>>>>>>>>>> User, >>>>>>>>>>>>>>>>>> the >>>>>>>>>>>>>>>>>> default >>>>>>>>>>>>>>>>>> user's will be chosen instead. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Here is the example (SELinux User=mat_u, Linux >>>>>>>>>>>>>>>>>> User=mat): >>>>>>>>>>>>>>>>>> --------------------- >>>>>>>>>>>>>>>>>> Oct 4 09:46:22 testsrv.example sshd[16185]: Accepted >>>>>>>>>>>>>>>>>> keyboard-interactive/pam for mat from 131.102.233.125 >>>>>>>>>>>>>>>>>> port >>>>>>>>>>>>>>>>>> 54726 >>>>>>>>>>>>>>>>>> ssh2 >>>>>>>>>>>>>>>>>> Oct 4 09:46:22 testsrv.example sshd[16185]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> Open Session >>>>>>>>>>>>>>>>>> Oct 4 09:46:22 testsrv.example sshd[16185]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> Open Session >>>>>>>>>>>>>>>>>> Oct 4 09:46:22 testsrv.example sshd[16185]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> Username= mat SELinux User = mat_u Level= (null) >>>>>>>>>>>>>>>>>> Oct 4 09:46:22 testsrv.example sshd[16185]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> set mat security context to mat_u:staff_r:staff_t >>>>>>>>>>>>>>>>>> Oct 4 09:46:22 testsrv.example sshd[16185]: >>>>>>>>>>>>>>>>>> pam_selinux(sshd:session): >>>>>>>>>>>>>>>>>> set mat key creation context to mat_u:staff_r:staff_t >>>>>>>>>>>>>>>>>> --- >>>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~> id >>>>>>>>>>>>>>>>>> uid=6575(mat) gid=100(users) >>>>>>>>>>>>>>>>>> groups=16(dialout),33(video),100(users) >>>>>>>>>>>>>>>>>> context=user_u:user_r:user_t >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> mat_u@xxxxxxxxxxxxxxx:~> newrole -r sysadm_r >>>>>>>>>>>>>>>>>> user_u:sysadm_r:sysadm_t is not a valid context >>>>>>>>>>>>>>>>>> --------------------- >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> As you can see, the pam_selinux module recognizes that >>>>>>>>>>>>>>>>>> the >>>>>>>>>>>>>>>>>> new >>>>>>>>>>>>>>>>>> context >>>>>>>>>>>>>>>>>> should be "mat_u:staff_r:staff_t", but for some reason >>>>>>>>>>>>>>>>>> the >>>>>>>>>>>>>>>>>> real >>>>>>>>>>>>>>>>>> context >>>>>>>>>>>>>>>>>> is >>>>>>>>>>>>>>>>>> user_u:user_r:user_t. Changing the context with newrole >>>>>>>>>>>>>>>>>> doesn't >>>>>>>>>>>>>>>>>> work >>>>>>>>>>>>>>>>>> either... >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> The user mappings should be okey: >>>>>>>>>>>>>>>>>> ------ >>>>>>>>>>>>>>>>>> semanage user -l | grep mat >>>>>>>>>>>>>>>>>> mat_u staff_r sysadm_r >>>>>>>>>>>>>>>>>> testsrv.example:~ # semanage login -l | grep mat >>>>>>>>>>>>>>>>>> mat >>>>>>>>>>>>>>>>>> ------- >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Any idea out there? Do I miss something? >>>>>>>>>>>>>>>>>> kind regards >>>>>>>>>>>>>>>>>> Matthias >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>> This message was distributed to subscribers of the >>>>>>>>>>>>>>>>>> selinux >>>>>>>>>>>>>>>>>> mailing >>>>>>>>>>>>>>>>>> list. >>>>>>>>>>>>>>>>>> If you no longer wish to subscribe, send mail to >>>>>>>>>>>>>>>>>> majordomo@xxxxxxxxxxxxx >>>>>>>>>>>>>>>>>> with >>>>>>>>>>>>>>>>>> the words "unsubscribe selinux" without quotes as the >>>>>>>>>>>>>>>>>> message. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> you can specify the context in >>>>>>>>>>>>>>>>> /etc/selinux/policy/contexts/users/whatroleyouused >>>>>>>>>>>>>>>>> (under sshd) I normally set user_r:user_t:s0 >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Justin P. Mattock >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>> This message was distributed to subscribers of the >>>>>>>>>>>>>>>>> selinux >>>>>>>>>>>>>>>>> mailing >>>>>>>>>>>>>>>>> list. >>>>>>>>>>>>>>>>> If you no longer wish to subscribe, send mail to >>>>>>>>>>>>>>>>> majordomo@xxxxxxxxxxxxx >>>>>>>>>>>>>>>>> with >>>>>>>>>>>>>>>>> the words "unsubscribe selinux" without quotes as the >>>>>>>>>>>>>>>>> message. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> The file looks like: >>>>>>>>>>>>>>>> cat /etc/selinux/refpolicy/contexts/users/mat_u >>>>>>>>>>>>>>>> system_r:local_login_t staff_r:staff_t sysadm_r:sysadm_t >>>>>>>>>>>>>>>> system_r:remote_login_t staff_r:staff_t >>>>>>>>>>>>>>>> system_r:sshd_t staff_r:staff_t sysadm_r:sysadm_t >>>>>>>>>>>>>>>> system_r:crond_t staff_r:cronjob_t >>>>>>>>>>>>>>>> system_r:xdm_t staff_r:staff_t >>>>>>>>>>>>>>>> staff_r:staff_su_t staff_r:staff_t >>>>>>>>>>>>>>>> staff_r:staff_sudo_t staff_r:staff_t >>>>>>>>>>>>>>>> sysadm_r:sysadm_su_t sysadm_r:sysadm_t >>>>>>>>>>>>>>>> sysadm_r:sysadm_sudo_t sysadm_r:sysadm_t >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> So, theoretical this should be okey, isn't it? >>>>>>>>>>>>>>>> And as you can see in the log from above (set mat key >>>>>>>>>>>>>>>> creation >>>>>>>>>>>>>>>> context >>>>>>>>>>>>>>>> to >>>>>>>>>>>>>>>> mat_u:staff_r:staff_t) it "tries" to switch to staff but >>>>>>>>>>>>>>>> for >>>>>>>>>>>>>>>> some >>>>>>>>>>>>>>>> reason >>>>>>>>>>>>>>>> it doesn't work.. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>> if your sshd'ing and the context is staff_r:staff_t then >>>>>>>>>>>>>>> it's >>>>>>>>>>>>>>> correct, >>>>>>>>>>>>>>> I >>>>>>>>>>>>>>> usually change this to user_r:user_t just cause I'm >>>>>>>>>>>>>>> paranoid. >>>>>>>>>>>>>>> Also there is some options that you can set in /etc/pam.d >>>>>>>>>>>>>>> to >>>>>>>>>>>>>>> do >>>>>>>>>>>>>>> other >>>>>>>>>>>>>>> checks etc.. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Justin P. Mattock >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>> no it's not and that't the problem:) >>>>>>>>>>>>>> If I sshd'ing with mat_u it's always "user_r:user_t" even >>>>>>>>>>>>>> "staff_r:staff_t" is specified (see above). But it's correct >>>>>>>>>>>>>> if >>>>>>>>>>>>>> the >>>>>>>>>>>>>> selinux and linux users are named equaly (mat in the >>>>>>>>>>>>>> example). >>>>>>>>>>>>>> It seems that something with the context settings and >>>>>>>>>>>>>> usermapping >>>>>>>>>>>>>> isn't >>>>>>>>>>>>>> correct. Do you see the problem? >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> Somewhere in the policy it is set to default to user_r for >>>>>>>>>>>>> sshd, >>>>>>>>>>>>> I >>>>>>>>>>>>> dont >>>>>>>>>>>>> think there is a boolean(but could be wrong)for that feature. >>>>>>>>>>>>> maybe >>>>>>>>>>>>> it's >>>>>>>>>>>>> reading the default_contexts file which is set to use >>>>>>>>>>>>> user_r:user_t >>>>>>>>>>>>> instead of reading mat_u for sshd(staff_r:staff_t) >>>>>>>>>>>>> >>>>>>>>>>>>> Justin P. Mattock >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>> Unfortunately I can't see a rule doing this. The curious thing >>>>>>>>>>>> is, >>>>>>>>>>>> that >>>>>>>>>>>> it >>>>>>>>>>>> works if the selinux user and the linux user are equivalent >>>>>>>>>>>> (both >>>>>>>>>>>> mat_u). >>>>>>>>>>>> But it does NOT work if it is mat (linux user) and mapped to >>>>>>>>>>>> mat_u >>>>>>>>>>>> (selinux user). >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> hmm.. something seems configured wrong, what OS are you using? >>>>>>>>>>> do >>>>>>>>>>> you >>>>>>>>>>> have semanage login/user -l set up correctly? >>>>>>>>>>> >>>>>>>>>>> over here I build the policy from git, normally edit >>>>>>>>>>> policy/users >>>>>>>>>>> (add) >>>>>>>>>>> gen_user(name,system_u, sysadm_r staff_r user_r, s0, s0 - >>>>>>>>>>> mls_systemhigh, mcs_allcats) >>>>>>>>>>> >>>>>>>>>>> then after the policy is built and installed/loaded I do >>>>>>>>>>> semanage login -a -s name name (create name in contexts/users) >>>>>>>>>>> (or skip the above and just use semanage -a -s user_u name) >>>>>>>>>>> >>>>>>>>>>> seems sshd works with the given context I specify(user_r) then >>>>>>>>>>> if >>>>>>>>>>> I >>>>>>>>>>> want >>>>>>>>>>> to add more options I adjust /etc/pam.d/* >>>>>>>>>>> >>>>>>>>>>> Justin P. Mattock >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>> Thanks for your reply. >>>>>>>>>> I'm using SLES 11 SP1. It wouldn't be the first bug regarding >>>>>>>>>> SELinux >>>>>>>>>> on >>>>>>>>>> this distro... ;) >>>>>>>>>> Here is what I've done so far. >>>>>>>>>> - Downloaded the latest reference policy from tresys >>>>>>>>>> - Compiled and installed it on my sles 11.1 >>>>>>>>>> - Add selinux user mat_u: "semanage user -R "staff_r system_r" >>>>>>>>>> -P >>>>>>>>>> user >>>>>>>>>> -a >>>>>>>>>> mat_u" >>>>>>>>>> - Add linux user mat: "useradd mat" >>>>>>>>>> - Set password for mat: "passwd mat" >>>>>>>>>> - User mapping: "semanage login -s mat_u -a mat" >>>>>>>>>> - add security context for mat_u by copying staff_u's context >>>>>>>>>> "cp /etc/selinux/refpolicy/contexts/user/staff_u >>>>>>>>>> /etc/selinux/refpolicy/contexts/user/mat_u" >>>>>>>>>> - set boolean for sysadm ssh login to true: "setsebool -P >>>>>>>>>> ssh_sysadm_login >>>>>>>>>> on" >>>>>>>>>> >>>>>>>>>> Do you know good debug options for tracing where it stucks? >>>>>>>>>> >>>>>>>>>> >>>>>>>>> When debugging login-type programs figuring out the context to >>>>>>>>> transition >>>>>>>>> to, there are a couple of simple useful utilities in >>>>>>>>> libselinux/utils. >>>>>>>>> These >>>>>>>>> are getconlist and getdefaultcon. Most distros won't install >>>>>>>>> these >>>>>>>>> (as >>>>>>>>> they're just debugging tools), but you can build them yourself >>>>>>>>> out >>>>>>>>> of >>>>>>>>> the >>>>>>>>> tree. >>>>>>>>> >>>>>>>>> getconlist will print out the contexts returned by >>>>>>>>> get_ordered_context_list(), which are all the reachable contexts. >>>>>>>>> This >>>>>>>>> could >>>>>>>>> tell you if the problem is that the context you're trying to >>>>>>>>> transition >>>>>>>>> to >>>>>>>>> is for some reason unreachable. >>>>>>>>> >>>>>>>>> getdefaultcon can tell you (in verbose mode) the default seuser >>>>>>>>> and >>>>>>>>> level >>>>>>>>> returned by getseuserbyname() and the default context returned by >>>>>>>>> get_default_context_with_rolelevel()/get_default_context_with_level(). >>>>>>>>> If >>>>>>>>> the seuser is wrong, then you know something's going wrong in >>>>>>>>> getseuserbyname(). >>>>>>>>> >>>>>>>>> I hope that helps. >>>>>>>>> >>>>>>>>> Thanks, >>>>>>>>> Chad Sellers >>>>>>>>> >>>>>>>>> >>>>>>>>> -- >>>>>>>>> This message was distributed to subscribers of the selinux >>>>>>>>> mailing >>>>>>>>> list. >>>>>>>>> If you no longer wish to subscribe, send mail to >>>>>>>>> majordomo@xxxxxxxxxxxxx with >>>>>>>>> the words "unsubscribe selinux" without quotes as the message. >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>> We ship them in fedora as selinuxconlist and selinuxdefcon >>>>>>>> -----BEGIN PGP SIGNATURE----- >>>>>>>> Version: GnuPG v1.4.10 (GNU/Linux) >>>>>>>> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ >>>>>>>> >>>>>>>> iEYEARECAAYFAkyt8UkACgkQrlYvE4MpobPw+wCfa8sf3A8+xhnMmdz2z3/vuJOM >>>>>>>> TYsAn1s18NmE9caf5MpCt312RO2Wh/BI >>>>>>>> =N+E/ >>>>>>>> -----END PGP SIGNATURE----- >>>>>>>> >>>>>>>> >>>>>>> >>>>>>> o.k. I just loaded up OpenSUSE11.4, and loaded the policy(this is >>>>>>> from >>>>>>> git keep in mind, not what suse offers). >>>>>>> after getting everything setup I was able to ssh into the machine >>>>>>> with >>>>>>> my iphone, and issue id -Z.. the context I set is user_r:user_t >>>>>>> which >>>>>>> the iphone showed(name:user_r:staff_t:s0) so everything is good >>>>>>> with >>>>>>> this version.(not sure with 11.1, but I know 11.2 works fine, as >>>>>>> well >>>>>>> as >>>>>>> 11.4). >>>>>>> >>>>>>> Justin P. Mattock >>>>>>> >>>>>>> -- >>>>>>> This message was distributed to subscribers of the selinux mailing >>>>>>> list. >>>>>>> If you no longer wish to subscribe, send mail to >>>>>>> majordomo@xxxxxxxxxxxxx >>>>>>> with >>>>>>> the words "unsubscribe selinux" without quotes as the message. >>>>>>> >>>>>>> >>>>>> Thank you for your answers. >>>>>> I've reinstalled the sles11.1 with the newest opensuse selinux >>>>>> libraries >>>>>> (http://download.opensuse.org/repositories/security:/SELinux/openSUSE_Factory/x86_64/), >>>>>> but it still struggles with the ssh login. Local login is working >>>>>> now! >>>>>> There must be a problem with pam_selinux. Here's the output of the >>>>>> debug >>>>>> log: >>>>>> Oct 19 16:40:50 testmachine.local sshd[7550]: >>>>>> pam_selinux(sshd:session): >>>>>> Open Session >>>>>> Oct 19 16:40:50 testmachine.local sshd[7550]: >>>>>> pam_selinux(sshd:session): >>>>>> Username= mat SELinux User = mat_u Level= (null) >>>>>> Oct 19 16:40:50 testmachine.local sshd[7550]: >>>>>> pam_selinux(sshd:session): >>>>>> set mat security context to mat_u:staff_r:insmod_t >>>>>> Oct 19 16:40:50 testmachine.local sshd[7550]: >>>>>> pam_selinux(sshd:session): >>>>>> set mat key creation context to mat_u:staff_r:insmod_t >>>>>> Oct 19 16:40:50 testmachine.local sshd[7557]: >>>>>> pam_unix2(sshd:setcred): >>>>>> pam_sm_setcred() called >>>>>> Oct 19 16:40:50 testmachine.local sshd[7557]: >>>>>> pam_unix2(sshd:setcred): >>>>>> username=[mat] >>>>>> Oct 19 16:40:50 testmachine.local sshd[7557]: >>>>>> pam_unix2(sshd:setcred): >>>>>> pam_sm_setcred: PAM_SUCCESS >>>>>> Oct 19 16:40:50 testmachine.local sshd[7557]: fatal: >>>>>> ssh_selinux_getctxbyname: Failed to get default SELinux security >>>>>> context >>>>>> for mat (in enforcing mode) >>>>>> Oct 19 16:40:50 testmachine.local sshd[7550]: >>>>>> pam_selinux(sshd:session): >>>>>> Close Session >>>>>> >>>>>> @justin: which policy did you installed from git? url? I tried >>>>>> refpolicy >>>>>> from tresys. >>>>>> >>>>>> >>>>>> >>>>>> >>>>> >>>>> >>>>> from what I remember insmod_t is a context I always received, due to >>>>> unlabeled filesystem >>>>> i.e. I also use LFS, and will tar ball the whole system, and copy it >>>>> over to the new machine, >>>>> then receive the insmod_t until I relabel, then all is good, but in >>>>> your >>>>> case it shouldn't be going to that. >>>>> >>>>> >>>>> as for the policy(sounds like the same one)..: >>>>> >>>>> git clone http://oss.tresys.com/git/refpolicy.git >>>>> >>>>> in regards to sles11 im wondering if it's close to opensuse 11.1, if >>>>> so >>>>> I can >>>>> load that one up on my machine to see whats happening(right now I'm >>>>> kind >>>>> of floating >>>>> from one distro to the next(I have the "try that out distro itch"..)) >>>>> >>>>> Justin P. Mattock >>>>> >>>>> >>>> >>>> I don't think that opensuse 11.1 and sles 11.1 are close enough!? >>>> I found out that if the selinux user and the linux user are equal >>>> (both >>>> mat_u), the ssh login works as well. >>>> >>>> indeed insmod was gone after "make relabel", but now I can't start the >>>> system in enforcing mode anymore, because a couple of denies => >>>> most of them are related to dbus and rpc-statd: >>>> ---- >>>> avc: denied { search } for pid=2320 comm="dbus-daemon" nam >>>> e="dbus" dev=dm-7 ino=40172 scontext=system_u:system_r:sysadm_dbusd_t >>>> tcontext=system_u:object_r:system_dbusd_var_run_t tclass=dir >>>> ---- >>>> ---- >>>> avc: denied { read } for pid=3127 comm="rpc.statd" path="p >>>> ipe:[9740]" dev=pipefs ino=9740 scontext=system_u:system_r:mount_t >>>> tcontext=system_u:system_r:mount_t tclass=fifo_file >>>> ---- >>>> are you familiar with that? are there some booleans to set or do I >>>> have >>>> to >>>> adjust the policy? >>>> >>>> >>>> >>>> >>> >> >> >>> from what I remember opensuse 11.2 had issues starting due too >>> /etc/selinux/config having the wrong permissions(should be -rw-r--r--.) >> the permissions were already correct on my system. >> > > cool... opensuse 11.2 was wrong(should be fixed now), causing SELinux to > always look for targeted > >>> has issues with /etc/initscript causing SELinux to not >>> transition(thread >>> here)..: >>> http://oss.tresys.com/pipermail/refpolicy/2010-February/002012.html >>> >>> for some reason sysvinit craps out with: >>> if (access(INITSCRIPT, R_OK) == 0&& runlevel != 'S') { >>> >>> I played around with sysvinit, but my code skills only took me so far: >>> http://www.spinics.net/lists/selinux/msg08983.html >>> >>> two solutions to this is too mv /etc/initscript{,-bak} or >>> setsebool -P init_upstart on >>> this way you transistion properly and you wont receive a dbus error(if >>> this is whats happening with sles11.1) >> You're right. after setting init_upstart=1 I don't receive a dbus error >> anymore. >> > > the biggest issue is sles11.1 doesn't even use upstart.. this is caused by > /etc/initscript (just having that file present, causes things to go out > of whack) > >>> >>> thirdly login context gets the wrong role.. simple fix is on this >>> report: >>> https://bugzilla.novell.com/show_bug.cgi?id=582366 >>> >>> here are the bug reports that got fixed so opensuse 11.2 is able to get >>> up and running in full enforcement mode. >>> >>> https://bugzilla.novell.com/show_bug.cgi?id=581505 >>> https://bugzilla.novell.com/show_bug.cgi?id=582399 >>> https://bugzilla.novell.com/show_bug.cgi?id=582404 >>> >>> hopefully these are similar to what you're hitting...this way you can >>> get up and running properly... >>> >> I was gone through all reports but so far I have an other problem >> preventing me from logging in (in enforcing mode). >> "Permissions on the password database may be too restrictive." => I'm >> sure >> that the password is correct. >> > > cool... you might need to make enableaudit or semodule -DB to show more > avc's being denied > >> This could be related to pam stuff (like described in aboves bugs), but >> first of all I would like to get rid of some other problems: >> type=AVC msg=audit(1287563356.696:342): avc: denied { module_request } >> for pid=3839 comm="sshd" scontext=system_u:system_r:sshd_t >> tcontext=system_u:system_r:kernel_t tclass=system >> type=AVC msg=audit(1287563356.848:343): avc: denied { search } for >> pid=3839 comm="sshd" name="root" dev=dm-2 ino=7828 >> scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:default_t >> tclass=dir >> type=AVC msg=audit(1287563360.848:344): avc: denied { module_request } >> for pid=3839 comm="sshd" scontext=system_u:system_r:sshd_t >> tcontext=system_u:system_r:kernel_t tclass=system >> type=AVC msg=audit(1287563360.904:345): avc: denied { search } for >> pid=3848 comm="sshd" name="root" dev=dm-2 ino=7828 >> scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:default_t >> tclass=dir >> type=AVC msg=audit(1287563361.056:346): avc: denied { search } for >> pid=3849 comm="xauth" name="root" dev=dm-2 ino=7828 >> scontext=root:staff_r:xauth_t tcontext=system_u:object_r:default_t >> tclass=dir >> type=AVC msg=audit(1287563361.056:347): avc: denied { write } for >> pid=3849 comm="xauth" name="root" dev=dm-2 ino=7828 >> scontext=root:staff_r:xauth_t tcontext=system_u:object_r:default_t >> tclass=dir >> >> Do you see what the problem could be? >> > > copy/pasting and using audit2allow -i file gets me nothing(format must > be messd up or something), anyways dan is saying something about root in > there name="root" so looking into what he had suggested is what probably > needs to be done.. > over here ls -lZ /root shows > system_u:object_r:default_t:s0 > > > >> >> And there is another issue which prevents syslogd from starting: >> >> Oct 20 09:21:20 testmachine.local syslog-ng[3103]: Error opening file >> for >> writing; filename='/dev/tty10', error='Permission denied (13)' >> Oct 20 09:21:20 testmachine.local syslog-ng[3103]: Error opening file >> for >> writing; filename='/dev/xconsole', error='Permission denied (13)' >> >> Any ideas? >> > > thats a new one to me.. my guess is the file labels are wrong, > i.e. ubuntu had an issue a few yrs ago, to where /var/log/* > need to have restorecond -R /var done every-time at startup in order for > the system to load into enforcement mode(with selinux-policy-default) > but is fixed now. > > Justin P. Mattock > > -- > This message was distributed to subscribers of the selinux mailing list. > If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx > with > the words "unsubscribe selinux" without quotes as the message. > okey, here are some more infos regarding the login process: ---- type=AVC msg=audit(1287584199.835:407448): avc: denied { read } for pid=3850 comm="sshd" name="shadow" dev=dm-2 ino=48107 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:shadow_t tclass=file type=AVC msg=audit(1287584199.835:407449): avc: denied { open } for pid=3850 comm="sshd" name="shadow" dev=dm-2 ino=48107 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:shadow_t tclass=file type=AVC msg=audit(1287584199.835:407450): avc: denied { getattr } for pid=3850 comm="sshd" path="/etc/shadow" d ev=dm-2 ino=48107 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:shadow_t tclass=file ---- seems that sshd isn't able to access /etc/shadow. shouldn't that be allowed by default?? The /root context looks like this: --- drwx------+ 6 root root system_u:object_r:default_t 4096 2010-10-20 16:23 root --- --- drwx------+ 6 root root system_u:object_r:default_t 4096 2010-10-20 16:23 . drwxr-xr-x+ 24 root root system_u:object_r:root_t 4096 2010-10-20 16:14 .. -rw-------+ 1 root root system_u:object_r:default_t 7133 2010-10-20 16:13 .bash_history drwxr-xr-x+ 2 root root system_u:object_r:default_t 4096 2010-05-05 16:04 bin -rw-r--r--+ 1 root root system_u:object_r:default_t 40014 2010-10-07 09:38 cobbler_autoyast.xml -rw-r--r--+ 1 root root system_u:object_r:default_t 1332 2005-11-23 17:06 .exrc -rw-r-----+ 1 root root system_u:object_r:default_t 4 2010-10-07 10:15 .forward drwx------+ 2 root root system_u:object_r:default_t 4096 2010-10-07 10:44 .gnupg drwxr-xr-x+ 5 root root system_u:object_r:default_t 4096 2010-10-07 09:20 inst-sys drwxr-xr-x+ 2 root root system_u:object_r:default_t 4096 2010-10-07 09:36 .kbd -rw-------+ 1 root root root:object_r:default_t 43 2010-10-20 16:23 .lesshst -rw-------+ 1 root root root:object_r:default_t 5520 2010-10-20 16:02 .viminfo -rw-------+ 1 root root root:object_r:default_t 106 2010-10-20 16:19 .Xauthority --- that's all right, isn't it? -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.