Re: [RFC] Source Policy, CIL, and High Level Languages

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 07/14/2014 01:08 PM, Stephen Smalley wrote:
> On 07/14/2014 12:53 PM, Stephen Smalley wrote:
>> On 07/14/2014 12:48 PM, Stephen Smalley wrote:
>>> On 07/11/2014 01:20 PM, Steve Lawrence wrote:
>>>> On 07/10/2014 02:51 AM, Dominick Grift wrote:
>>>>> On Wed, 2014-07-09 at 15:21 -0400, Steve Lawrence wrote:
>>>>>> In January, we sent an RFC [1] to update userspace to integrate CIL
>>>>>> [2] and source policy. And in April, we sent an updated RFC [3] which
>>>>>> added support for high level languages and a tool to convert policy
>>>>>> package (pp) files to CIL. After getting some good feedback, we have
>>>>>> made some more changes, mostly to maintain ABI compatibility. The
>>>>>> major changes made since the last patchset are:
>>>>>
>>>>> <snip>
>>>>>
>>>>> I just spent a few hours playing with this and i am impressed.
>>>>>
>>>>> Everything i tested just works.
>>>>>
>>>>> What did i test?
>>>>>
>>>>> 1. disabling/enabling existing modules
>>>>> 2. toggling booleans with semanage
>>>>> 3. adding and removing port and file contexts with semanage
>>>>> 4. adding/removing a policy module with semodule, checkmodule,
>>>>> semodule_package
>>>>> 5. adding/removing a (cil) policy module with semodule
>>>>> 6. associating a (new) user with staff_t identity
>>>>>
>>>>> Comments?
>>>>>
>>>>> if i do restorecon -R -v -F /home it resets contexts *every* time (from
>>>>> s0 to s0-s0). No noticable side effects because of this
>>>>>
>>>>
>>>> We recently pushed a fix to CIL that fixes the issue with how CIL
>>>> generates file contexts. It now removes the high level if it is the same
>>>> as the low level.
>>>
>>> So, if I revert my system to stock F20 (yum reinstall checkpolicy*
>>> libsepol* libsemanage* libselinux* policycoreutils*
>>> selinux-policy-targeted) , then re-install from the integration branch
>>> as per your instructions and run the migration script, then attempt to
>>> ssh into the system, sshd says "Unable to get valid context for sds" and
>>> the connection is closed.  dmesg shows:
>>> systemd[1]: SELinux policy denies access.
>>>
>>> Can you merge #next to #integration so we get the more detailed
>>> information on unknown classes/perms?
>>>
>>> I'm guessing a reboot will clear the problem again (since systemd will
>>> then remap the class from name to value at boot against the current
>>> policy).  But ideally this wouldn't be necessary.
>>
>> Hmmm....a reboot did not clear it.  All logins, local or remote,
>> disabled for non-root.
> 
> This seems to be a labeling problem; saw denials on attempts to read
> seusers with semanage_store_t.  But restorecon -Rv /etc/selinux/targeted
> restored it to selinux_config_t.
> 

Ah, interesting. We saw that problem a long time ago, but couldn't
reproduce it and it disappeared. Though I'm still unable to reproduce it
following your steps. I can still login and seusers is labeled
selinux_config_t. I'll keep looking into this.

I've also rebased/pushed #integration onto #next.
_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux