Re: [refpolicy] pam_selinux(gdm-password:session): Security Context justin:staff_r:insmod_t:s0 Assigned

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2011-09-23 at 19:12 -0400, Eric Paris wrote:
> On Sat, 2011-09-24 at 00:38 +0200, Guido Trentalancia wrote:
> > Hello Eric.
> > 
> > On Fri, 2011-09-23 at 17:17 -0400, Eric Paris wrote:
> > > On Fri, 2011-09-23 at 23:12 +0200, Guido Trentalancia wrote:
> > > 
> > > > You seem to suggest that load_policy -i (and not the kernel) should make
> > > > sure that init has transitioned to its designated context...
> > > 
> > > Can't speak for Justin's system.  
> > 
> > That's for sure. But it seems to me that he already stated that it just
> > loaded plain refpolicy from git on a plain F15 system. Since we are on
> > the list he might even confirm once again...
> > 
> > > But that's not what I said.  I said
> > > it's /sbin/init's problem to make sure it did the right thing and to
> > > handle errors correctly if it failed.  If Justin has his box enforcing
> > > and can boot without loading a policy that's a bug and needs to be
> > > filed.
> > 
> > He has loaded the policy.
> > 
> > The point is that when init does not transition to init_t nothing
> > happens and the system keeps running with all processes in kernel_t or
> > insmod_t.
> > 
> > It surely use to happen with upstream components and policy back at the
> > beginning of this year (I did test that and reported it to the refpolicy
> > mailing list).
> > 
> > Apparently it also happens with Fedora 15 according to what Justin
> > reported on here when he started this thread...
> > 
> > Earlier on Daniel Walsh said Fedora and RHEL would crash in such case
> > (init has not transitioned properly to init_t).
> 
> Ahhh, different than I was talking sorry.  In upstream systemd git the
> code in question looks like so:
> 
>                /* Transition to the new context */
>                r = label_get_create_label_from_exe(SYSTEMD_BINARY_PATH, &label);
>                if (r < 0 || label == NULL) {
>                        log_open();
>                        log_error("Failed to compute init label, ignoring.");
>                } else {
>                        r = setcon(label);
> 
>                        log_open();
>                        if (r < 0)
>                                log_error("Failed to transition into init label '%s', ignoring.", label);
> 
>                        label_free(label);
>                }
> 
> sds, what do you think, should we make these?  We do know the requisite
> enforce state in this function...

These should be fatal errors if enforcing.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux