I was running some test cases and ran into a scenario where secadm_r was permitted to write to /var/log/audit/audit.log I was not expecting secadm to be able to perform that operation. However secadm_r was denied appends to the log. and I get AVC messages for append perms in the log (See output below)

I am running with the latest .74 kernel and policy.54 in Enforcing ofcourse

It doesn't really make sense to me that secadm can completely overwrite the audit log but can't append to it. I didn't think secadm should even have write permission to audit log in the first place

Any thoughts on this .. ?

Thanks
- Loulwa




Here are the steps I did...

[root/secadm_r/[EMAIL PROTECTED] bin]# id
uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel) context=staff_u:secadm_r:secadm_t:SystemLow-SystemHigh

[root/secadm_r/[EMAIL PROTECTED] bin]# ls -Z /var/log/audit/audit.log
-rw-r----- root root system_u:object_r:auditd_log_t:SystemHigh /var/log/audit/audit.log

[root/secadm_r/[EMAIL PROTECTED] bin]# echo "boo" > /var/log/audit/audit.log
[root/secadm_r/[EMAIL PROTECTED] bin]# cat /var/log/audit/audit.log
boo

[root/secadm_r/[EMAIL PROTECTED] bin]# echo "boo2" >> /var/log/audit/audit.log
-bash: /var/log/audit/audit.log: Permission denied
[root/secadm_r/[EMAIL PROTECTED] bin]# cat /var/log/audit/audit.log
boo
type=AVC msg=audit(1176408498.736:844): avc: denied { append } for pid=3853 comm="bash" name="audit.log" dev=dm-2 ino=294916 scontext=staff_u:secadm_r:secadm_t:s0-s15:c0.c1023 tcontext=system_u:object_r:auditd_log_t:s15:c0.c1023 tclass=file type=SYSCALL msg=audit(1176408498.736:844): arch=14 syscall=5 success=no exit=-13 a0=1011d668 a1=10441 a2=1b6 a3=10117fc8 items=0 ppid=3850 pid=3853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:secadm_r:secadm_t:s0-s15:c0.c1023 key=(null) type=AVC msg=audit(1176408498.737:845): avc: denied { append } for pid=3853 comm="bash" name="audit.log" dev=dm-2 ino=294916 scontext=staff_u:secadm_r:secadm_t:s0-s15:c0.c1023 tcontext=system_u:object_r:auditd_log_t:s15:c0.c1023 tclass=file type=SYSCALL msg=audit(1176408498.737:845): arch=14 syscall=5 success=no exit=-13 a0=1011d668 a1=10401 a2=0 a3=10117fc8 items=0 ppid=3850 pid=3853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:secadm_r:secadm_t:s0-s15:c0.c1023 key=(null)

--
redhat-lspp mailing list
[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to