On 07/14/2014 01:08 PM, Stephen Smalley wrote: > On 07/14/2014 12:53 PM, Stephen Smalley wrote: >> On 07/14/2014 12:48 PM, Stephen Smalley wrote: >>> On 07/11/2014 01:20 PM, Steve Lawrence wrote: >>>> On 07/10/2014 02:51 AM, Dominick Grift wrote: >>>>> On Wed, 2014-07-09 at 15:21 -0400, Steve Lawrence wrote: >>>>>> In January, we sent an RFC [1] to update userspace to integrate CIL >>>>>> [2] and source policy. And in April, we sent an updated RFC [3] which >>>>>> added support for high level languages and a tool to convert policy >>>>>> package (pp) files to CIL. After getting some good feedback, we have >>>>>> made some more changes, mostly to maintain ABI compatibility. The >>>>>> major changes made since the last patchset are: >>>>> >>>>> <snip> >>>>> >>>>> I just spent a few hours playing with this and i am impressed. >>>>> >>>>> Everything i tested just works. >>>>> >>>>> What did i test? >>>>> >>>>> 1. disabling/enabling existing modules >>>>> 2. toggling booleans with semanage >>>>> 3. adding and removing port and file contexts with semanage >>>>> 4. adding/removing a policy module with semodule, checkmodule, >>>>> semodule_package >>>>> 5. adding/removing a (cil) policy module with semodule >>>>> 6. associating a (new) user with staff_t identity >>>>> >>>>> Comments? >>>>> >>>>> if i do restorecon -R -v -F /home it resets contexts *every* time (from >>>>> s0 to s0-s0). No noticable side effects because of this >>>>> >>>> >>>> We recently pushed a fix to CIL that fixes the issue with how CIL >>>> generates file contexts. It now removes the high level if it is the same >>>> as the low level. >>> >>> So, if I revert my system to stock F20 (yum reinstall checkpolicy* >>> libsepol* libsemanage* libselinux* policycoreutils* >>> selinux-policy-targeted) , then re-install from the integration branch >>> as per your instructions and run the migration script, then attempt to >>> ssh into the system, sshd says "Unable to get valid context for sds" and >>> the connection is closed. dmesg shows: >>> systemd[1]: SELinux policy denies access. >>> >>> Can you merge #next to #integration so we get the more detailed >>> information on unknown classes/perms? >>> >>> I'm guessing a reboot will clear the problem again (since systemd will >>> then remap the class from name to value at boot against the current >>> policy). But ideally this wouldn't be necessary. >> >> Hmmm....a reboot did not clear it. All logins, local or remote, >> disabled for non-root. > > This seems to be a labeling problem; saw denials on attempts to read > seusers with semanage_store_t. But restorecon -Rv /etc/selinux/targeted > restored it to selinux_config_t. > Ah, interesting. We saw that problem a long time ago, but couldn't reproduce it and it disappeared. Though I'm still unable to reproduce it following your steps. I can still login and seusers is labeled selinux_config_t. I'll keep looking into this. I've also rebased/pushed #integration onto #next. _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.