On 04/14/2017 11:33 AM, Stephen Smalley wrote: > On Fri, 2017-04-14 at 16:57 +0200, Dominick Grift wrote: >> Bear with me please, because i might not fully grasp the issue (i >> received help with diagnosing this issue): >> >> This commit causes issues (and is, i think, a lousy hack): >> e3cab998b48ab293a9962faf9779d70ca339c65d >> >> The commit causes entities to "think" that SELinux is disabled after >> "mount -o remount,ro /sys/fs/selinux >> >> It is "neat" to be able to make processes "think" that selinux is >> disabled on a selinux enabled system but not if it break anything >> >> The above results in the following: >> >> Systemd services that have ProtectKernelTunables=yes set in their >> respective service units, think that SELinux is disabled. >> >> However we have found that some of these services actually rely on >> SELinux to ensure proper labeling. >> >> So we have the option to make people aware that if you set >> ProtectKernelTunables=yes that then the process cannot be SELinux- >> aware properly, or we can just get rid of the commit above and just >> accept that process know that SELinux is enabled. >> >> Actual bug that caused me to look into this: systemd-localed selinux >> awareness is broken due it having ProtectKernelTunables=yes in its >> service unit > If selinuxfs is mounted read-only, then they can't use most of the > selinuxfs interfaces, including even the ability to validate or > canonicalize security contexts. That will break most SELinux-aware > services if we tell them that SELinux is enabled. Are you sure > systemd-localed would actually work if you told it SELinux was enabled > when selinuxfs was mounted read-only? What SELinux interfaces is it > using? > > The other question is whether ProtectKernelTunables ought to be > mounting selinuxfs read-only. SELinux already controls the ability to > use its interfaces, including limiting even root, so it is unclear what > benefit we derive from having systemd add a further restriction on top. > Why is selinuxfs mounted readonly in this case? The reason we want this is so that processes inside of containers do not attempt to do SELinux stuff. http://danwalsh.livejournal.com/73099.html _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.