04/09/2007 lspp Meeting Minutes:
===============================
  Attendees

  Lawrence Wilson (IBM) - LW
  George Wilson (IBM) - GW
  Kris Wilson (IBM) - KEW
  Loulwa Salem (IBM) - LS
  Joy Latten (IBM) - JL
  Klaus Kiwi (IBM) - KK
  Irina Boverman (Red Hat) - IB
  Steve Grubb (Red Hat) - SG
  Dan Walsh (Red Hat) - DW
  Eric Paris (Red Hat) - EP
  Lisa Smith (HP) - LMS
  Linda Knippers (HP) - LK
  Amy Griffis (HP) - AG
  Matt Anderson (HP) - MA
  Paul Moore (HP) - PM
  Klaus Weidner (Atsec) - KW
  Ken Hake (Atsec) - KH
  Chad Hanson (TCS) - CH
  Joe Nall - JN

Agenda:

                 General Issues
                 Bug Discussion

Repo: http://people.redhat.com/sgrubb/files/lspp/

RHEL 5+ Packages

                 acl-2.2.39-2.1.el5
                 aide-0.12-8.el5
                 audit-1.3.1-3.el5
                 audit-libs-1.3.1-3.el5
                 audit-libs-devel-1.3.1-3.el5
                 audit-libs-python-1.3.1-3.el5
                 cups-1.2.4-11.8.el5
                 cups-devel-1.2.4-11.8.el5
                 cups-libs-1.2.4-11.8.el5
                 ipsec-tools-0.6.5-6.2.el5
                 kernel-2.6.18-8.1.1.lspp.72.el5
                 kernel-devel-2.6.18-8.1.1.lspp.72.el5
                 kernel-doc-2.6.18-8.1.1.lspp.72.el5
                 libacl-2.2.39-2.1.el5
                 libacl-devel-2.2.39-2.1.el5
                 libselinux-1.33.4-4.el5
                 libselinux-devel-1.33.4-4.el5
                 libselinux-python-1.33.4-4.el5
                 mcstrans-0.2.3-1.el5
                 openssh-4.3p2-21.el5
                 openssh-askpass-4.3p2-21.el5
                 openssh-clients-4.3p2-21.el5
                 openssh-server-4.3p2-21.el5
                 pam-0.99.6.2-3.19.el5
                 pam-devel-0.99.6.2-3.19.el5
                 policycoreutils-1.33.12-7.el5
                 policycoreutils-newrole-1.33.12-7.el5
                 selinux-policy-2.4.6-50.el5
                 selinux-policy-devel-2.4.6-50.el5
                 selinux-policy-mls-2.4.6-50.el5
                 selinux-policy-strict-2.4.6-50.el5
                 selinux-policy-targeted-2.4.6-50.el5
                 vixie-cron-4.1-67.el5

                 lspp-eal4-config-ibm-0.29-1
                 rbac-self-test (patches submitted for config RPM)

Tracker Bug: 
https://bugzilla.redhat.com/bugzilla/showdependencytree.cgi?id=224041

Query: https://bugzilla.redhat.com/bugzilla/buglist.cgi?cmdtype=runnamed&namedcmd=RHEL%205.0%

20LSPP&[EMAIL PROTECTED]&order=bugs.bug_id

    JN: I opened a few bugs today, bug# 235720. also an issue with
        /var/log/messages being system low
    KW: have you tried if processes can send msgs to higher levels
    JN: It either can write down or syslog can't work above systemlow, either
        way is broken. I assumed write down worked since sytemlogd is running at
        systemLow-high
    KW: ... you have to look and see
    LK: what's the bug number
    JN: bug 235725
    GW: we may need to add both to list. General items for discussion? we need
        to talk about severity of bugs Joe just opened. Also, I sent klaus
        patches for self tests to incorporate them into KS config package. Other
        issues people want to bring up before we dive into bug list
    KW: I posted version of KS that has that integrated self tests if people 
want
        to test it
    GW: I would appreciate testing and feedback. I know policy does not work at
        systemhigh and I am trying to fix that
    KW: I think this also was the last piece we needed, also thanks to Linda for
        her patches. I think the script is now complete; if people have any
        issue let us know as soon as possible.

Bug List:       (Sun Apr 8 22:23:46 EDT 2007 - 12 bugs found.)
ID      Sev     Pri     Plt     Assignee                Status  Summary

218386 med nor pow [EMAIL PROTECTED] ASSI LSPP: labeled ipsec does not work over loopback
    JL: I submitted patch to ipsec tools but did not hear back. over weekend I
        left stress tests running and noticed today that on 72 kernel with
        latest racoon, if you leave it running, after a certain amount of hours
        (about 17 in this case) racoon stopped negotiating SA. The complaint was
        it could no longer open shared key file, and could no longer do the
        is_selinux_enabled call. George and I noticed that on the machine
        initiating there was huge amount of file descriptors (fd) open.
        I'm investigating that now, at first I thought it was result of my
        loopback patch, but then I ran it with just racoon (without my patch)
        and I see it in that too. so it's not result of the patch
    KW: sounds like something is opened but not closed. use lsof to see
    GW: yes we used that, and we saw lots of sockets still opened
    JL: I'm trying to debug it, and not sure why I have not seen this before.
        When I initially saw this it had been running for 36 hours. I need to go
        back and check more
    SG: try the GA version, to see if it's a patch we added or something already
        there.
    JL: I have a bug opened for that, I'll look it up
    SG: about those patches, status is we just got the ok to build that one.
        overnight I should have a new ipsec-tools package out.
    JL: I don't think this is result of loopback patch, so if everyone wants to
        try it I'd welcome that
    GW: can people maybe run a cron job with lsof to monitor it while they are
        running with the loopback patch
    JL: it usually happens on racoon that is on the initiator side. The bug is
        235680
    GW: that one is on the list actually, and you had all the info in it?
    JL: yes.
    GW: is that the only problem you see with loopback
    JL: I don't think it is related to loopback
    GW: should that be built then
    JL: yes, the sooner we test and use that the better
    GW: is the plan going to be to build that one then steve?
    SG: yeah, we just got ok to do build on that one. same with 234491.
    JL: both of those patches I sent to ipsec tools and I am still waiting on
        response.
    SG: we got ok on both of those.
    GW: Ok thanks.

225443  med     nor     ppc     [EMAIL PROTECTED]       MODI    LSPP: No 
console login on first boot
    GW: I was still seeing that and got confirmation from Linda and matt as
        well. matt installed the extra audit module and saw more messages
    LK: I don't think we tried the latest policy
    GW: yeah, I have not seen it.
    SG: I think we are still waiting on the build
    GW: .50 is the last version in repo
    LK: so only .50 is there. we are waiting then to verify this one.

228366 med nor All [EMAIL PROTECTED] ASSI LSPP: audit does not log obj label for signal recipient
    SG: thinking amy updated that one and Eric was supposed to check on it. I'll
        check on that
    LK: yes amy updated it

231090  med     urg     ppc     [EMAIL PROTECTED]       ASSI    LSPP: getattr 
causes python Segfault
    GW: klaus k added a dump on the fifth.
    KK: I can use some help with this bug, I can't get a test case running for
        i386. and the syscall giving me problem is found on i386, z and ppc.
    GW: so this is impacting ppc and s390
    SG: I've never seen it, not sure if Jeremy is looking at it. It crashes on
        my x86, so it's hard to really tell if it's a bug in test case or kernel
        or python bug. On the machine it is supposed to work on it's not
        working. I don't know what to think. I feel Jeremy is in the same boat.
    GW: you are having problem reproducing it.
    SG: Jeremy says that first thing to do is go through test case and fix bugs
        in test case.
    GW: the problem is that it should run on i386 or x86_64
    SG: it ought to be on all
    IB: is that applicable to version 2 of the test case?
    SG: I have to check
    IB: it's attached to the bug
    KK: this status is specific to ppc and it was not available to i386. I also
        attached the back trace where I am having this segfault.
    SG: also you need strace to go with it.
    KK: I can try attaching the strace also
    SG: have you tried running in GDB
    KK: yes the backtrace from GDB is in the comment. And with python debug
        installed.
    SG: does gdp do anything that looks like null pointer. what is it crashing
        on
    KK: it looks like it is trying to assert structure member. it is trying to
        access exec_exe type and whole thing segfaults. strange thing is that I
        can't see any misuse of c function we are using inside the swig
        libraries. It should be able to execute if we have mac permission. I can
        try working further with it and provide strace. I think strace was
        running indefinetely with this test case, and didn't have time to look
        at it further. but I'll look into it
    GW: what else can we do to make progress on this Steve?
    SG: can you have anyone else look at it. Jeremy is looking at FC and extras
        merge, so I think he'll be busy
    LK: I built v2 on i386 and it runs. so you might try it to make it easier to
        trouble shoot.
    SG: ok, i'll try
    GW: klaus k is looking at it, maybe we can all take a look at it and get
        more info. So we need info from our side
    LK: test case does not build on x86_64 cause of syscall number


231392 hig med All [EMAIL PROTECTED] NEW LSPP: Misc soft-lockups in x86_64 lspp.67 kernel
    LS: this is the lockup I saw last time and I can't reproduce it. Someone
        said it was going to be left aside if we can't reproduce it
    SG: I thought it might be the soft lockup detection code that has the
        problem. one thing to consider is the tests have alot of overhead, so it
        may have a delay to get back from CPU. once we remove all debug code, it
        should be faster.
    GW: so we still have debug code?
    SG: yes .. since we are still adding patches
    GW: none of us can run with that in
    SG: right .. I think we added all the patches we need for now.
    EP: there is one that Joe added .. James will look at it, I'll be out rest
        of the week.
    GW: do we have target for .73 kernel.
    EP: I can get it out tomorrow, but definetely there will be at least one
        more coming
    GW: ok, I am trying to get a read on what to expect.
    EP: I'll get you one tomorrow, but once James is done we'll get another one
    GW: good. both Linda and I need to have idea on when we'll have it.


231529 hig med All [EMAIL PROTECTED] ASSI [LSPP] bogus audit records with cups printing
    SG: still looking at that, but leaning towards closing it.
    GW: ok, exactly what I had from last week


233153 med med x86 [EMAIL PROTECTED] ASSI LSPP: semanage not always removing entry from /etc/selinu...
    LS: joy and I we looking at this, but did not find anything yet.
    JL: it's not semanage it seems. it's a library call to libsemanage
    DW: you know how this happened
    JL: so far we are still trying to figure it out
    LS: the test case has a comment that says it has to make direct calls to
        libsemanage because you can't directly manipulate nodes from semanage.
        so we are still trying to figure out all the functions it's going
        through
    DW: why are you calling the library. semanage then should handle nodes, you
        might want to open a bug about that.
    LS: ok .. so we'll open one


234491 med med All [EMAIL PROTECTED] ASSI LSPP: kernel sends additional ACQUIRES that racoon is not...
    GW: we already talked about this. It's getting ready to be built

234923 med med All [EMAIL PROTECTED] ASSI LSPP: update lspp.rules file for evaluation
    SG: have not had chance to look at this yet

235321 med med All [EMAIL PROTECTED] NEW LSPP: audit DAEMON_CONFIG record truncated
    SG: worked on this and right now writing a patch to the daemon

235398 med med All [EMAIL PROTECTED] NEW LSPP: ausearch does not correctly find out of order records
    SG: this has existed since RHEL4 and was scheduled to be fixed in auparse
        library. I don't know about switching everything to auparse
    LK: question is does it block evaluation when it didn't in the past. maybe
        we can get an opinion from klaus
    GW: it may be problem for audit selection
    KW: I think it is border line. you can argue that the file is human readable
        and data is in the file, so can argue that it is not a big deal, but the
        expectation is that audit parsing functions will work as you expect them
        to. I'll check with evaluator.
    SG: later this week I may look at doing that fix.
    LK: as a work around, someone can always sort the audit log.
    SG: well, it's a nasty workaround. The tool now can take stdin, so you can
        do some shell work to get everything together then pipe it into
        ausearch. if we do have to fix this one it'll be end of this week, or
        early next week to start looking at it. They way to fix it is probably
        in ausearch tool, then I'll step up the audit version.
    GW: let's see what evaluator thinks.

235468 hig med All [EMAIL PROTECTED] MODI LSPP: ausearch does not return DAEMON_END record when sea...
    SG: patch done and will get packaged

235475 hig med i38 [EMAIL PROTECTED] ASSI LSPP: Panic when running IPSEC labeled loopback on LSPP k...
    GW: assigned to james, we don't have read when that one will be done
    JN: only way to do it is to put a bigger setrans.conf. I can reliably panic
        the box in two lines of code
    GW: so far it's only on 32 bit
    JN: I only tried it on 32 bit
    GW: has anyone tried this on 64 bit?
    LK: I care about 32 bit
    SG: is 32 bit going to be evaluated
    LK: that's the plan
    JN: I can try it on 64 bit.
    GW: and just because we have not seen it on 64 bit doesn't mean it's not a
        problem
    JN: problm maybe that vendor supplied translation files are not very
        stressful. when we started exploring limits we ran into these issues
    SG: last eval there was lots of testing with file names at maximum size, I
        don't know if we are stressing the context size. I know Linda found an
        issue and based on that, I found similar issues in few other places. I'm
        fixing that but we should have tests to stress the context. I think
        selinux is smart and it tries to consolidate them.
    JN: I did all even and all odd to avoid it consolidating.
    SG: ok, good
    GW: it will help us all to try to invoke this. I'll give this a shot on ppc
        to see what happens
    SG: I'm wondering if pam has everything the way it should be so it's not
        truncating anything. if you log in with long context, are we gonna get
        all that info in PAM. it's alot of gray area
    GW: yeah, there are lots of possibilities for breaking. we have tests that
        use large number of categories, but not running on 32 bit.

235675 med med All [EMAIL PROTECTED] ASSI LSPP: INFO: possible recursive locking detected
    GW: Linda found this one
    LK: I don't know anything about it more that what I put in there, it seems
        it had to do with pre-link.
    GW: could this have been provoked by debug stuff in kernel
    LK: I assumed the debug coded causes it to be detected, but not happen
    EP: I doubt it'll cause it, but debug shows you the message. I'll try to get
        someone to look at it
    GW: you say it's possible, so it might not be happening
    LK: yes. and everything kept running, so I'm not sure.

235680 med med pow [EMAIL PROTECTED] ASSI LSPP: racoon is unable to open files after running for 17...
    GW: already talked about that one. this is the fd leak in racoon.
    IB: who is looking into that
    GW: Joy is looking into that actively
    SG: it's not a fd leak, but socket leak.. right?
    GW: yes ..


235725 med med All [EMAIL PROTECTED] MODI In LSPP configuration /var/log/messages is SystemLow
    SG: seems like messages should be at syshigh. if it opens up anything else,
        which it may have info that you don't want people to see. so probably
        all files that syslog writes to should be high.
    LK: why is it actually working
    JN: I didn't look at code alot. the daemon is running low-high and writing
        it's files at low. it really just had not been looked at
    GW: sounds like a downgrade to me
    SG: you can send info to syslog,and get info
    LK: can someone identify what in policy is allowing it to happen. I was
        looking if type has special privileges or is it a trusted object
    JN: I think it's because it's a low-high daemon. if I did this on permissive
        system it's one of two bug ..
    KW: if you are testing in permissive you can't tell if protection is working
        or not.
    KK: it won't make difference if it's sytemlow-high, since sysadm for example
        has overrides.
    SG: what did we do for audit daemon .. if it fails it writes to syslog
    SG: I agree, stuff should be high.
    DW: it's a trusted object so you can write to it not read from it.
    LK: are there any tools like log rotate that will break or are they running
        at the right level
    DW: logrotate has overrides I believe.
    LK: so who wants to look at this
    DW: me, I'll take a look at it.

235720 med med i38 [EMAIL PROTECTED] NEW LSPP: setkey -D fails for large numbers of Security Assoc...
    JN: I used the setrans.conf file attached and script that goes with it which
        creates 100s of SA, when you get to 195 it stops.
    CH: are you using setkey to display that
    JN: yes
    CH: that does not work.
    GW: we talked about this.. you have to use netlink
    CH: yeah, so you need to not use pfkey. that's a fundamental pfkey issue
    GW: has anyone made changes to ipsec to use netlink, since we talked about
        that
    CH: we never got around to it since we switched to openswan which already
        uses netlink
    SG: we heard from alot of networking people that ipsec-tools is not the way
        we want to do things next time
    CH: Venkat is working on porting things to openswan.
    JL: so you have all the code we need in openswan?
    CH: not yet
    SG: and we don't package openswan with RHEL
    CH: right .. it's in Fedora
    JN: so is this a duplicate of another bug?
    JL: Chad, are you planning on submitting it to openswan.
    CH: yes
    JL: It'll be a good idea since alot of people prefer openswan. out of
        curiosity, does openswan have the loopback issue
    CH: I think it does, but I don't know the answer to that. James morris
        prefers that I remember
    JL: yes, he liked it more, he says it has better SA management
    CH: and the openswan mailing list is more active than ipsec.
    LK: would that be an option for what we are doing now
    JL: does it have an IKE daemon?
    CH: I believe that's what Pluto is
    GW: yes I'm curious about Linda's question too
    LK: is it blocking bug from an evaluating perspective
    CH: they are all there, but kernel won't allow you to dump them all out.
        temporary hack is to change a kernel line to not have a resource limit.
    SG: that particular issue is not going to be decision for me or Eric to
        make, so we would need to take it internally
    LK: so we'll just live with it? trying to figure this out
    CH: it existed with ipsec for a while.
    JN: I think it'll be an issue that will happen alot
    PM: and I think it'll happen even not only on loopback, but also creating
        SAs.. and many other scenarios
    JN: if I run simplest data, I end up with few hundreds on the box
    PM: and expand that for each SPD .. I guess the point I am making is that
        even if not on localhost, trying to talk to remote host will cause you
        to create lots of SAs anyway
    JN: I agree
    GW: RH bug 181617 is about the same issue. it was closed by steve, with
        comment "patch applied in April". was that openswan since this is
        against rawhide
    SG: this was April of last year?
    LK: yes, but it was closed last September.
    JL: I'll look at mailing list archive to see if there was a patch
    CH: there was no patch from our part since this was a design issue
    GW: we've known about this for long time. should we have been doing our work
        on openswan
    CH: it's not in RHEL ..
    GW: should we have opened issue tracker(IT) to include openswan before
    SG: it's possible, even if you open one now, I would fight for it given the
        circumstances
    EP: do you have documentation that people can take a look at for openswan
    CH: not yet ..
    PM: if you are working on it, it would be good to share it since we are just
        learning this about it
    GW: seems to be a good direction for us to pursue. We knew about this a
        long time ago, I wish we lobbied this long time ago
    SG: we can lobby still
    GW: but it won't be possible for this evaluation. we are trying to have
        everything closed at this point. maybe it can be added to 5.1, I don't
        know though, adding packages in updates is not looked upon kindly.
    SG: looks like in changelog there was something around April 18 where we
        applied a patch to ipsec tools. I'll look to see if there was a patch
        that got lost somewhere.
    GW: that would be great to see if we have fix for this. people are going to
        be hitting this.

    GW: so we are not done yet and it looks like next week is earliest we will
        have anything
    SG: bug number is dropping, but we still got more to go.
    GW: yes, we are getting close
    SG: I'll be publishing the .52 policy in few minutes, and hopefully tomorrow
        ipsec-tools will be out
    KW: I talked to Stephan on audit bug we talked about, and he agrees that it
        is not a show stopper as long as it is logging. no immediate need to fix
        it
    GW: do we have to document it.
    KW: wouldn't hurt to do that
    GW: any other issues to bring up? Thanks Joe for helping test and bring up
        those last two issues
    JN: you're welcome
    DW: I'll put out a package with syslog logs at systemhigh for people to try.
        I'll put it out tomorrow
    SG: if you want to open feature request about openswan, go ahead and open it
        in case we need it. assign it to me and I'll work on the politics on
        this side
    GW: should that be an issue tracker
    SG: probably go through the proper channel to request feature. Actually I'll
        open a bugzilla, then you can attach issue tracker to it. we can get
        that started at least
    GW: anything else? ok, we'll adjourn and we'll continue testing. bye. Thanks

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to