-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 03/23/2016 08:09 PM, Dominick Grift wrote: > On 03/23/2016 08:08 PM, Stephen Smalley wrote: >> On 03/23/2016 02:37 PM, Dominick Grift wrote: >>> On 03/23/2016 07:32 PM, Dominick Grift wrote: >>>> On 03/23/2016 06:58 PM, Dominick Grift wrote: <snip> >>>>> This seems to be the code: >>> >>>>>> /* we have to check that this user is allowed to go into >>>>>> the range they have specified ... role is tied to an >>>>>> seuser, so that'll be checked at setexeccon time */ if >>>>>> (mls_enabled && !mls_range_allowed(pamh, defaultcon, >>>>>> newcon, debug)) { pam_syslog(pamh, LOG_NOTICE, "Security >>>>>> context %s is not allowed for %s", defaultcon, newcon); >>> >>>>>> goto fail_set; >>> >>> >>> >>>> This seems related: >>> >>>>> class = string_to_security_class("context"); if (!class) { >>>>> pam_syslog(pamh, LOG_ERR, "Failed to translate security >>>>> class context. %m"); return 0; } >>> >>>> since: >>> >>>> pam_selinux(sshd:session): Failed to translate security class >>>> context. Invalid argument >>> >>>> What is a "security class context"? >>> >>>> Is it choking on the periods in my identifiers? >>> >>> >>> oh sh.. now i get it. It is choking on the "context" security >>> class. >>> >>> Yes i dont have that "user space" access vector because that >>> seems to be no longer used. >>> >>> isnt the context security class a "setransd" thing? if so then >>> i do not believe that setransd still uses that. So this should >>> probably be adjusted then to not rely on that user space >>> access vector? > >> I still see it in use in mcstrans >> policycoreutils/mcstrans/src/mcscolor.c: security_class_t >> context_class = string_to_security_class("context"); > >> Whether or not it ought to be used by pam_selinux is a different >> question... > > > Until recently i used mcstransd on one of my systems, and it never > perfomed any checks , that is why i removed that access vector from > my policy. > > added the access vector back in but that seems to not make any differenc e. - -- Key fingerprint = 5F4D 3CDB D3F8 3652 FBD8 02D5 3B6C 5F1D 2C7B 6B02 https://sks-keyservers.net/pks/lookup?op=get&search=0x3B6C5F1D2C7B6B02 Dominick Grift -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCAAGBQJW8vFeAAoJECV0jlU3+Udp/usMAJDYGv2ASDNGxguiHzpewouk AiljmBEouR24DzPH7np9kEphvDFfKHoGnWP2F2C9Fkf8M9aVdZtnKwmSRYEqGD0W ku0w6V++zio2ua+RL2mbUYsPidDOXQL4uA9wJZjczYgIZbcSQqf1kE0NQ6fy9nqh APLqf3UtXTUS0qHijXMJPLFCJe1AzLpQJ+QouMsFJl1W0yCAfjiV3idp83v9pB0d YmJwLN9lY/jxVyDmvELOZwDpqjHl2Yh3xbRHNblXZjY4wzuUGgQzmKqBoAjy92tj h9uOtdc9xOmkcV9nuiDh7uBbWfy94PB9MFaGBzF31cXzD2Cf21VR8G/K909IlHtQ SBeai/q4G8yRyfYfynV/9VsaXA9wObKFUdrGUPtVRTKOqy1wRA61gvpnxDxa4DRe S/rOTWVloV4L4L6Xq11YOdo6rJ1ptSSgIRO+/hg7lCTJlZ5HhckNwqNGih9mCK0a MFWwmfXyITSIV1gEgyg871KgBdp/IlQqpc+9/62FxQ== =hXMR -----END PGP SIGNATURE----- _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.