Re: strange pam_selinux behavior

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 03/23/2016 08:09 PM, Dominick Grift wrote:
> On 03/23/2016 08:08 PM, Stephen Smalley wrote:
>> On 03/23/2016 02:37 PM, Dominick Grift wrote:
>>> On 03/23/2016 07:32 PM, Dominick Grift wrote:
>>>> On 03/23/2016 06:58 PM, Dominick Grift wrote: <snip>
>>>>> This seems to be the code:
>>> 
>>>>>> /* we have to check that this user is allowed to go into 
>>>>>> the range they have specified ... role is tied to an 
>>>>>> seuser, so that'll be checked at setexeccon time */ if 
>>>>>> (mls_enabled && !mls_range_allowed(pamh, defaultcon, 
>>>>>> newcon, debug)) { pam_syslog(pamh, LOG_NOTICE, "Security 
>>>>>> context %s is not allowed for %s", defaultcon, newcon);
>>> 
>>>>>> goto fail_set;
>>> 
>>> 
>>> 
>>>> This seems related:
>>> 
>>>>> class = string_to_security_class("context"); if (!class) {
>>>>>  pam_syslog(pamh, LOG_ERR, "Failed to translate security
>>>>> class context. %m"); return 0; }
>>> 
>>>> since:
>>> 
>>>> pam_selinux(sshd:session): Failed to translate security class
>>>>  context. Invalid argument
>>> 
>>>> What is a "security class context"?
>>> 
>>>> Is it choking on the periods in my identifiers?
>>> 
>>> 
>>> oh sh.. now i get it. It is choking on the "context" security 
>>> class.
>>> 
>>> Yes i dont have that "user space" access vector because that 
>>> seems to be no longer used.
>>> 
>>> isnt the context security class a "setransd" thing? if so then
>>> i do not believe that setransd still uses that. So this should 
>>> probably be adjusted then to not rely on that user space
>>> access vector?
> 
>> I still see it in use in mcstrans 
>> policycoreutils/mcstrans/src/mcscolor.c:	security_class_t 
>> context_class = string_to_security_class("context");
> 
>> Whether or not it ought to be used by pam_selinux is a different 
>> question...
> 
> 
> Until recently i used mcstransd on one of my systems, and it never 
> perfomed any checks , that is why i removed that access vector from
> my policy.
> 
> 

added the access vector back in but that seems to not make any differenc
e.

- -- 
Key fingerprint = 5F4D 3CDB D3F8 3652 FBD8  02D5 3B6C 5F1D 2C7B 6B02
https://sks-keyservers.net/pks/lookup?op=get&search=0x3B6C5F1D2C7B6B02
Dominick Grift
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=hXMR
-----END PGP SIGNATURE-----
_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux