-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 02/21/2012 03:36 PM, Stephen Smalley wrote: > On Tue, 2012-02-14 at 08:57 -0500, Daniel J Walsh wrote: >> On 02/13/2012 06:09 PM, Stephen Smalley wrote: >>> On Mon, Feb 13, 2012 at 1:49 PM, Daniel J Walsh >>> <dwalsh@xxxxxxxxxx> wrote: >>>> I believe this should be DAC_READ_SEARCH. >>>> >>>> I am trying to prevent all SYS_PTRACE from any domain on the >>>> system but certain apps like dbus, consolekit, policykit, >>>> systemd-logger and others like to look /proc/PID/exe to >>>> report the path of the executable they are communicating >>>> with. This causes lots of sys_ptrace access being required >>>> for domains, that I do not believe need it. >>>> >>>> They need DAC_READ_SEARCH because they are trying to read >>>> content that is owned by a different UID. The SYS_PTRACE >>>> stuff was put in to prevent apps from reading process memory >>>> information stored in /proc. >>>> >>>> I think this is a bug in the kernel. >>> >>> SELinux just mirrors the Linux capability checks. >>> CAP_SYS_PTRACE is applied when the normal DAC check on ptrace >>> fails (i.e. different uid). The SELinux MAC check here is the >>> :process ptrace check. That is what you should focus on - >>> SELinux already distinguishes /proc access from ptrace (except >>> for /proc/pid/mem, which is viewed as equivalent). dontaudit >>> :capability sys_ptrace where needed, but not :process ptrace. >> >> But I have to allow all these domains capability sys_ptrace >> then, since these domains legitimately want to either use an >> access check based on the executable of the process or in the >> case of the systemd_jounal, want to log it. >> >> If the CAP check on reading a symbolic link in /proc is >> SYS_PTRACE, that seems bogus. If it was reading /proc/pid/mem or >> any of the other /proc/pid fields that tell you about the memory, >> then I agree those should be SYS_PTRACE. But this is a >> DAC_READ_SEARCH check in my opinion. > > What you are asking for is a change to the Linux DAC logic, not a > change to SELinux. You can certainly investigate that, but that > has to be taken up on lkml, not here. > As much as I dislike it, I am just adding back in the sys_ptrace access. Since the ptrace will still be blocked, it is not as big a deal. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk9EEn8ACgkQrlYvE4MpobMX1wCgtZlSgdv4nEkAajbc7zNWVAF/ Y0IAoOGnFyLaxrsXb6BLWlX63BUemgWu =Ts9D -----END PGP SIGNATURE----- -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.