On Tue, Sep 12, 2017 at 02:55:38PM -0400, Paul Moore wrote: > On Tue, Sep 12, 2017 at 1:36 PM, Dominick Grift <dac.override@xxxxxxxxx> wrote: > > On Tue, Sep 12, 2017 at 12:01:35PM -0400, Stephen Smalley wrote: > >> On Sep 12, 2017 7:01 AM, "Dominick Grift" <dac.override@xxxxxxxxx> wrote: > >> > >> I have extended socket class polcap enabled but i am still seeing "socket" > >> class events and i was wondering whether that is to be expected? > >> > >> avc: denied { create } for pid=10484 comm="nethogs" scontext=wheel.id: > >> sysadm.role:nethogs.subj:s0 tcontext=wheel.id:sysadm.role:nethogs.subj:s0 > >> tclass=socket permissive=0 > >> > >> This seems to be common to processes that also create (and map! [1]) > >> "packet_socket" sockets (tcpdump/nethogs) > >> > >> [1] avc: denied { map } for pid=10525 comm="nethogs" > >> path="socket:[56040]" dev="sockfs" ino=56040 > >> scontext=wheel.id:sysadm.role:nethogs.subj:s0 > >> tcontext=wheel.id:sysadm.role:nethogs.subj:s0 tclass=packet_socket > >> permissive=0 > >> > >> > >> No, that is not expected. Can you enable sys call audit and get those > >> records? > > > > type=PROCTITLE msg=audit(09/12/2017 19:35:54.063:4458) : proctitle=nethogs enp8s0 > > type=SYSCALL msg=audit(09/12/2017 19:35:54.063:4458) : arch=x86_64 syscall=socket success=yes exit=5 a0=local a1=SOCK_RAW a2=ip a3=0xb4 items=0 ppid=3251 pid=8963 auid=kcinimod uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=pts5 ses=1 comm=nethogs exe=/usr/sbin/nethogs subj=wheel.id:sysadm.role:nethogs.subj:s0 key=(null) > > type=AVC msg=audit(09/12/2017 19:35:54.063:4458) : avc: denied { create } for pid=8963 comm=nethogs scontext=wheel.id:sysadm.role:nethogs.subj:s0 tcontext=wheel.id:sysadm.role:nethogs.subj:s0 tclass=socket permissive=1 > > Ah ha, AF_UNIX/SOCK_RAW, that's the problem. Luis Ressel fixed this > (see the commit below) and it should make it up to Linus during the > current merge window (eventually, maybe, hopefully). > > If you run Fedora Rawhide, you can try one of recent kernel builds in > the COPR repo below, it should have the fix. > > * https://copr.fedorainfracloud.org/coprs/pcmoore/kernel-secnext Thanks i will probably try this out in a virtual machine tomorrow (kind of relieved now with a "stable" 4.13 on my bare bones after quite a turbulent 4.12 and 4.13) > > commit 2a764b529ae57bed61da2c90ff132b9fec97f80b > Author: Luis Ressel <aranea@xxxxxxxx> > Date: Tue Jul 25 15:13:41 2017 -0400 > > selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets > > For PF_UNIX, SOCK_RAW is synonymous with SOCK_DGRAM (cf. > net/unix/af_unix.c). This is a tad obscure, but libpcap uses it. > > Signed-off-by: Luis Ressel <aranea@xxxxxxxx> > Acked-by: Stephen Smalley <sds@xxxxxxxxxxxxx> > Signed-off-by: Paul Moore <paul@xxxxxxxxxxxxxx> > > -- > paul moore > www.paul-moore.com > -- Key fingerprint = 5F4D 3CDB D3F8 3652 FBD8 02D5 3B6C 5F1D 2C7B 6B02 https://sks-keyservers.net/pks/lookup?op=get&search=0x3B6C5F1D2C7B6B02 Dominick Grift
Attachment:
signature.asc
Description: PGP signature