Re: Embedded SELinux: SELinux via NFS with different policies on client and server

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Stephen,

thanks a lot again. It worked like a charm.
Even the labeling from the host using setfiles and the alternate root
path worked well.

Now the fun starts (generating policies ;-)

Kind regards,

Ralf


Am 24.08.2016 um 14:54 schrieb Ralf Spenneberg:
> Am 24.08.2016 um 14:48 schrieb Stephen Smalley:
>> On 08/24/2016 08:14 AM, Ralf Spenneberg wrote:
>>> Hi
>>>
>>> we are working on SELinux in the embedded area. For development we are
>>> using a nfsroot based approach. We successfully setup the nfs server
>>> supporting security labels and are able to boot from the share using
>>> nfsroot. We would like to label the files from the server so the relabel
>>> process on the client may be omitted.
>>> The embedded device requires a different policy that the nfs-server.  We
>>> are basing our policy on the refpolicy-2.20151208 and only compile the
>>> required modules.
>>>
>>> When setting any label on the server the client always displays
>>> unlabeled_t. The same happens if we set the label on the client. The
>>> server displays unlabeled_t. Is there a way that both might agree on the
>>> same label?
>>> By the way: The server is x86_64 (kernel 4.5.7) while the client is
>>> armv7l 32bit (3.12.10).
>>>
>>> But since the labels are stored in text this should not pose any
>>> problems, does it?
>>
>> Correct.  You said that they require a different policy.  Is one running
>> a MLS-enabled (MCS or MLS) policy, while the other is not?  Or is the
>> user/role/type you are using in the label defined in both policies?
>>
>> Look at your dmesg output on both the client and server for messages
>> from SELinux, e.g.
>> SELinux: inode=... on dev=... was found to have an invalid context=...
>> This indicates you may need to relabel the inode or the filesystem in
>> question.
>>
> Well, somehow the kernel messages might indicate this:
> 
> On the server:
> ]$ ls -lZ /test/
> insgesamt 56
> -rw-------. 1 root root system_u:object_r:unlabeled_t:s0 55138 24. Aug
> 13:35 audit.log
> -rw-r--r--. 1 root root system_u:object_r:bin_t:s0           0 23. Aug
> 10:45 test
> -rw-r--r--. 1 root root system_u:object_r:bin_t:s0           0 24. Aug
> 13:39 test2
> 
> On the client:
> / # mount.nfs4  10.42.0.33:/ /test
> SELinux: initialized (dev 0:20, type nfs4), uses native labeling
> / # ls -lZ /test
> nfs_setsecurity() system_u:object_r:bin_t:s0 27
> security_inode_notifysecctx() -22
> nfs_setsecurity() system_u:object_r:bin_t:s0 27
> security_inode_notifysecctx() -22
> -rw-------    1     55138 Aug 24  2016 system_u:object_r:unlabeled_t
> audit.log
> -rw-r--r--    1         0 Aug 23  2016 system_u:object_r:unlabeled_t    test
> -rw-r--r--    1         0 Aug 24  2016 system_u:object_r:unlabeled_t
> test2
> 
> So I am getting the nfs_setsecurity messages referring to the
> security_inode_notifysecctx.
> 
> Looking at the output of the client apparently no MLS is used (missing :s0)
> I will look into it and get back to you asap. Thanks a lot for the pointer.
> 
> Kind regards,
> 
> Ralf
> 

-- 
OpenSource Training Ralf Spenneberg     http://www.os-t.de
Am Bahnhof 3-5                          48565 Steinfurt         Germany
Fon: +49(0)2552 638 755                 Fax: +49(0)2552 638 757

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux