On Tue, 2007-03-20 at 18:58 -0500, Linda Knippers wrote:
> Loulwa Salem wrote:
> > Hi all,
> > I am seeing a strange behavior on my system. I am running with the
> > latest and greatest kernel (.69) and packages freshly installed today
> > from Steve's repo on a ppc system in Enforcing mode ofcourse.
> > Note: The ssh_sysadm_login and allow_netlabel booleans are both on.
> >
> > Steps to reproduce the problem:
> > - ssh into system with your admin user as sysadm role
> > ssh -l ealuser/sysadm_r/s0-s15:c0.c1023 localhost
> > - switch to root
> > /bin/su -
> > - execute any netlabel command
> > netlabelctl cipsov4 add pass doi:1 tags:1
> >
> > I am able to log in fine, and I expect the netlabel command to pass
> > however I get a permission denied. I am pasting at the bottom the
> > relevant records I see in the audit log (nothing shows up in
> > /var/log/messages or secure).. any ideas?
> > Joy and Kylie tried this and both saw the same behavior. Keep in mind
> > this used to work just fine before.
>
> When was it last known to work?
>
> > What I find strange is the context it complains about has the role
> > system_r and not sysadm_r. Even in the records created by the ssh
> > authentication, I see the system_r, I'm not sure how that role is
> > finding its way in there. The "id" command however shows the correct
> > sysadm_r.
> > I'm not quite sure what package is the suspect.
> >
> > I think this is a bug, if everyone agrees I'll open a bugzilla for it
>
> I think there's something funky with our ealuser_u definition or the
> policy. You're not getting an AVC deny, you're getting an error that
> the security context isn't valid. What do 'semanage user -l' and
> 'semanage login -l' show?
>
> Can you try the same thing from an account that is associated with
> staff_u?
>
There isn't a special ealuser_u that I know of:
[root/abat_r/[EMAIL PROTECTED] framework]# semanage user -l
Labeling MLS/ MLS/
SELinux User Prefix MCS Level MCS Range
SELinux Roles
abat_u abat SystemLow SystemLow-SystemHigh
abat_r
root sysadm SystemLow SystemLow-SystemHigh
system_r sysadm_r staff_r secadm_r auditadm_r
staff_u staff SystemLow SystemLow-SystemHigh
sysadm_r staff_r secadm_r auditadm_r
sysadm_u sysadm SystemLow SystemLow-SystemHigh
sysadm_r
system_u user SystemLow SystemLow-SystemHigh
system_r
testuser_u user SystemLow SystemLow-SystemHigh
user_r
user_u user SystemLow SystemLow
user_r
[root/abat_r/[EMAIL PROTECTED] framework]# semanage login -l
Login Name SELinux User MLS/MCS Range
__default__ user_u SystemLow
abat abat_u SystemLow-SystemHigh
abatroot abat_u SystemLow
ealuser staff_u SystemLow-SystemHigh
root root SystemLow-SystemHigh
system_u system_u SystemLow-SystemHigh
testuser testuser_u SystemLow-SystemHigh
> -- ljk
> >
> > Thanks,
> > - Loulwa
> >
> > Sample steps output:
> > [root/abat_r/SystemLow /]# ssh -l ealuser/sysadm_r/s0-s15:c0.c1023
> > localhost
> > Password:
> > Last login: Tue Mar 20 12:31:23 2007 from localhost.localdomain
> > [ealuser/sysadm_r/SystemLow ~]$ /bin/su -
> > Password:
> > [root/sysadm_r/SystemLow ~]# id
> > uid=0(root) gid=0(root)
> > groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel)
> > context=ealuser_u:sysadm_r:sysadm_t:SystemLow-SystemHigh
> > [root/sysadm_r/SystemLow ~]# netlabelctl cipsov4 add pass doi:1 tags:1
> > -bash: /sbin/netlabelctl: Permission denied
> >
> >
> > ---- ssh records (records I see when I ssh into system):
> > type=USER_AUTH msg=audit(1174412538.822:755): user pid=3051 uid=0
> > auid=4294967295 subj=system_u:system_r:sshd_t:s0-s15:c0.c1023 msg='PAM:
> > authentication acct=ealuser : exe="/usr/sbin/sshd"
> > (hostname=localhost.localdomain, addr=127.0.0.1, terminal=ssh res=success)'
> > type=USER_ACCT msg=audit(1174412538.864:756): user pid=3051 uid=0
> > auid=4294967295 subj=system_u:system_r:sshd_t:s0-s15:c0.c1023 msg='PAM:
> > accounting acct=ealuser : exe="/usr/sbin/sshd"
> > (hostname=localhost.localdomain, addr=127.0.0.1, terminal=ssh res=success)'
> > type=AVC msg=audit(1174412539.043:757): avc: granted { setexec } for
> > pid=3047 comm="sshd" scontext=system_u:system_r:sshd_t:s0-s15:c0.c1023
> > tcontext=system_u:system_r:sshd_t:s0-s15:c0.c1023 tclass=process
> >
> > ---- netlabel related records (the only 2 records I see when I get perm
> > denied)
> > type=SELINUX_ERR msg=audit(1174412941.179:771): security_compute_sid:
> > invalid context ealuser_u:system_r:netlabel_mgmt_t:s0-s15:c0.c1023 for
> > scontext=ealuser_u:sysadm_r:sysadm_t:s0-s15:c0.c1023
> > tcontext=system_u:object_r:netlabel_mgmt_exec_t:s0 tclass=process
> > type=SYSCALL msg=audit(1174412941.179:771): arch=14 syscall=11
> > success=no exit=-13 a0=10121d98 a1=1011edd0 a2=1011ee58 a3=0 items=0
> > ppid=3090 pid=3123 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
> > sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash"
> > subj=ealuser_u:sysadm_r:sysadm_t:s0-s15:c0.c1023 key=(null)
> >
> > --
> > redhat-lspp mailing list
> > [email protected]
> > https://www.redhat.com/mailman/listinfo/redhat-lspp
>
> --
> redhat-lspp mailing list
> [email protected]
> https://www.redhat.com/mailman/listinfo/redhat-lspp
--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp