Klaus Weidner wrote:
On Mon, Dec 18, 2006 at 06:52:47PM -0600, Loulwa Salem wrote:
Hi,
I am writing a testcase that uses netcat (nc) as part of my cipso testing. I ran into a slight problem when in Enforcing mode. user_r, sysadm_r, or secadm_r can't execute nc ... below are the AVC records I was seeing and the policy I used to fix it.

type=AVC msg=audit(1166479344.923:3782): avc: denied { name_bind } for pid=31873 comm="nc" src=3333 scontext=root:secadm_r:secadm_t:s0-s15:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket


More precisely, users can execute nc, but don't have permission to
actually use TCP ports. This breaks all networking by user apps that
don't have specific policy. This needs to be fixed...

-Klaus

Written up in policy we have

# Allow users to run TCP servers (bind to ports and accept connection from
# the same domain and outside users) disabling this forces FTP passive mode
   # and may change other protocols
   tunable_policy(`user_tcp_server',`
       corenet_tcp_bind_all_nodes($1_t)
       corenet_tcp_bind_generic_port($1_t)
   ')

So setting this boolean should fix the problem.

setsebool -P user_tcp_server=1

Do we want this set as default for MLS?

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to