Re: Bad file access on the rise

2013-06-07 Thread Matthew Garrett
On Fri, Jun 07, 2013 at 05:24:30PM -0400, Steve Grubb wrote: > Hmm...sounds like kernel change. But in the meantime, most of the offenders I > see seem to have something to do with loading icons: Sounds like code that doesn't differentiate between files that are in user-local directories and sy

Re: Bad file access on the rise

2013-06-07 Thread Matthew Garrett
On Fri, Jun 07, 2013 at 07:03:24PM -0600, Stephen John Smoogen wrote: > On 7 June 2013 12:29, Matthew Garrett wrote: > > So why not add a mechanism to permit applications to indicate that > > certain accesses they make should be ignored by audit? > > > Just so people know, this is like one of the

Re: F18 => F19 update adventures

2013-06-07 Thread Adam Williamson
On Fri, 2013-06-07 at 21:53 +0200, Michał Piotrowski wrote: > That was simple... > > sudo systemctl enable mysqld.service > ln -s '/usr/lib/systemd/system/mysqld.service' > '/etc/systemd/system/multi-user.target.wants/mysqld.service' > > > But why update removed this service from multi-user.targ

Re: Bad file access on the rise

2013-06-07 Thread Richard W.M. Jones
On Fri, Jun 07, 2013 at 06:55:46PM +0200, Lennart Poettering wrote: > User "simo" creates /dev/shm/1000/ even though 1000 is the UID of user > "lennart". Lennart can never start PA again, ever. And can't do anything > about it, because "simo" is in control, and /dev/shm is sticky. For /run we crea

Re: Bad file access on the rise

2013-06-07 Thread Steve Grubb
On Friday, June 07, 2013 05:02:41 PM Colin Walters wrote: > On Fri, 2013-06-07 at 22:14 +0200, Miloslav Trmač wrote: > > On Fri, Jun 7, 2013 at 10:05 PM, Colin Walters wrote: > > > On Fri, 2013-06-07 at 20:42 +0100, Matthew Garrett wrote: > > >> Without further analysis, it doesn't tell us much. D

Re: Bad file access on the rise

2013-06-07 Thread Matthew Garrett
On Fri, Jun 07, 2013 at 04:06:30PM -0400, Steve Grubb wrote: > Which is a bad patterm. O_NOATIME requires CAP_FOWNER Documentation disagrees: EPERM The O_NOATIME flag was specified, but the effective user ID of the caller did not match the owner of the file and the caller

Re: Bad file access on the rise

2013-06-07 Thread Colin Walters
On Fri, 2013-06-07 at 22:14 +0200, Miloslav Trmač wrote: > On Fri, Jun 7, 2013 at 10:05 PM, Colin Walters wrote: > > On Fri, 2013-06-07 at 20:42 +0100, Matthew Garrett wrote: > > > >> Without further analysis, it doesn't tell us much. Does the code attempt > >> to open a file O_NOATIME and then fa

Re: Bad file access on the rise

2013-06-07 Thread Matthew Garrett
On Fri, Jun 07, 2013 at 10:14:36PM +0200, Miloslav Trmač wrote: > (IMHO only very special applications should use O_NOATIME; if it is > not predictable which accesses do/don't update atime, the field > completely loses its value. It's already not especially predictable - we've been using relatime

Re: Bad file access on the rise

2013-06-07 Thread Eric Sandeen
On 6/7/13 3:06 PM, Steve Grubb wrote: > On Friday, June 07, 2013 08:42:09 PM Matthew Garrett wrote: >> On Fri, Jun 07, 2013 at 03:35:28PM -0400, Steve Grubb wrote: >>> So far, the discussion has focused on pulseaudio. But what about the >>> O_NOATIME issue? >> >> Without further analysis, it doesn'

Re: Bad file access on the rise

2013-06-07 Thread Miloslav Trmač
On Fri, Jun 7, 2013 at 10:05 PM, Colin Walters wrote: > On Fri, 2013-06-07 at 20:42 +0100, Matthew Garrett wrote: > >> Without further analysis, it doesn't tell us much. Does the code attempt >> to open a file O_NOATIME and then fall back to trying it without? > > It's likely: > https://bugzilla.g

Re: Bad file access on the rise

2013-06-07 Thread Steve Grubb
On Friday, June 07, 2013 08:42:09 PM Matthew Garrett wrote: > On Fri, Jun 07, 2013 at 03:35:28PM -0400, Steve Grubb wrote: > > So far, the discussion has focused on pulseaudio. But what about the > > O_NOATIME issue? > > Without further analysis, it doesn't tell us much. Does the code attempt > to

Re: Bad file access on the rise

2013-06-07 Thread Colin Walters
On Fri, 2013-06-07 at 20:42 +0100, Matthew Garrett wrote: > Without further analysis, it doesn't tell us much. Does the code attempt > to open a file O_NOATIME and then fall back to trying it without? It's likely: https://bugzilla.gnome.org/show_bug.cgi?id=680326 Code: https://git.gnome.org/brow

Re: Bad file access on the rise

2013-06-07 Thread Matthew Garrett
On Fri, Jun 07, 2013 at 03:35:28PM -0400, Steve Grubb wrote: > So far, the discussion has focused on pulseaudio. But what about the > O_NOATIME > issue? Without further analysis, it doesn't tell us much. Does the code attempt to open a file O_NOATIME and then fall back to trying it without? -

Re: Bad file access on the rise

2013-06-07 Thread Steve Grubb
On Friday, June 07, 2013 07:29:56 PM Matthew Garrett wrote: > On Fri, Jun 07, 2013 at 02:02:14PM -0400, Simo Sorce wrote: > > The point is that we are simply throwing ideas off the wall as an aid in > > finding a way to solve the issue for all. > > So why not add a mechanism to permit applications

Re: Bad file access on the rise

2013-06-07 Thread Bill Nottingham
Miloslav Trmač (m...@volny.cz) said: > On Fri, Jun 7, 2013 at 8:39 PM, Bill Nottingham wrote: > > Any reason we don't run with namespaced /dev/shm vis-a-vis private /tmp? > > Private /tmp is optional and not enabled for users sessions by > default. For namespaced /dev/shm to impact pulseaudio,

Re: Bad file access on the rise

2013-06-07 Thread Matthew Garrett
On Fri, Jun 07, 2013 at 08:38:56PM +0200, Miloslav Trmač wrote: > On Fri, Jun 7, 2013 at 8:29 PM, Matthew Garrett wrote: > > So why not add a mechanism to permit applications to indicate that > > certain accesses they make should be ignored by audit? > > Because it would be primarily useful to th

Re: Review swap: two simple pkgs

2013-06-07 Thread Antonio
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Fri 07 Jun 2013 08:29:57 PM CEST, Björn Esser wrote: >> >> Are you also interested to review bugs in RPMFusion ? :) > > Why not? Sure :) Where to apply for packager-status in rpmfusion? Great ! https://bugzilla.rpmfusion.org/show_bug.cgi?id=2531 I

Re: Bad file access on the rise

2013-06-07 Thread Miloslav Trmač
On Fri, Jun 7, 2013 at 8:39 PM, Bill Nottingham wrote: > Any reason we don't run with namespaced /dev/shm vis-a-vis private /tmp? Private /tmp is optional and not enabled for users sessions by default. For namespaced /dev/shm to impact pulseaudio, it would have to be applied automatically to eve

Re: Bad file access on the rise

2013-06-07 Thread Bill Nottingham
Lennart Poettering (mzerq...@0pointer.de) said: > Yes, it is. > > POSIX shared memory doesn't define any useful scheme for automatic > removing of shared memory segments from /dev/shm after use. Hence, in > order to make sure that left-over segments don't fill up /dev/shm > forever PA will try to

Re: Bad file access on the rise

2013-06-07 Thread Miloslav Trmač
On Fri, Jun 7, 2013 at 8:29 PM, Matthew Garrett wrote: > So why not add a mechanism to permit applications to indicate that > certain accesses they make should be ignored by audit? Because it would be primarily useful to the attackers' applications. Or am I missing something? (BTW, audit already

Re: Bad file access on the rise

2013-06-07 Thread Matthew Garrett
On Fri, Jun 07, 2013 at 02:02:14PM -0400, Simo Sorce wrote: > The point is that we are simply throwing ideas off the wall as an aid in > finding a way to solve the issue for all. So why not add a mechanism to permit applications to indicate that certain accesses they make should be ignored by au

[perl-Module-Signature/f18] (2 commits) ...Update to 0.73

2013-06-07 Thread Paul Howarth
Summary of changes: 8272c4e... - Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass (*) 6e82801... Update to 0.73 (*) (*) This commit already existed in another branch; no separate mail sent -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing

Re: Bad file access on the rise

2013-06-07 Thread Miloslav Trmač
On Fri, Jun 7, 2013 at 6:55 PM, Lennart Poettering wrote: > > Well, you know, this problem isn't new. Some SELinux AVCs can be set to > ignored for precisely reasons like this one, because it is common that > things like these happen: accesses which fail where that is > expected. Well, whether i

Re: Bad file access on the rise

2013-06-07 Thread Simo Sorce
On Fri, 2013-06-07 at 18:55 +0200, Lennart Poettering wrote: > On Fri, 07.06.13 12:42, Simo Sorce (s...@redhat.com) wrote: > > > On Fri, 2013-06-07 at 18:21 +0200, Lennart Poettering wrote: > > > On Fri, 07.06.13 12:09, Steve Grubb (sgr...@redhat.com) wrote: > > > > > > > > > > POSIX shared memor

Re: Review swap: two simple pkgs

2013-06-07 Thread Antonio
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Fri 07 Jun 2013 07:20:03 PM CEST, Björn Esser wrote: > Hi there! > > Anybody interested in review swaps? I currently have two simple > review-bugs open waiting to be reviewed: > > git-extras - Little git extras > https://bugzilla.redhat.com/

Re: Bad file access on the rise

2013-06-07 Thread Steve Grubb
On Friday, June 07, 2013 06:21:00 PM Lennart Poettering wrote: > On Fri, 07.06.13 12:09, Steve Grubb (sgr...@redhat.com) wrote: > > > > > POSIX shared memory doesn't define any useful scheme for automatic > > > > > removing of shared memory segments from /dev/shm after use. Hence, > > > > > in > >

Re: Bad file access on the rise

2013-06-07 Thread Lennart Poettering
On Fri, 07.06.13 12:42, Simo Sorce (s...@redhat.com) wrote: > On Fri, 2013-06-07 at 18:21 +0200, Lennart Poettering wrote: > > On Fri, 07.06.13 12:09, Steve Grubb (sgr...@redhat.com) wrote: > > > > > > > > POSIX shared memory doesn't define any useful scheme for automatic > > > > > > removing of

Re: Bad file access on the rise

2013-06-07 Thread Simo Sorce
On Fri, 2013-06-07 at 18:21 +0200, Lennart Poettering wrote: > On Fri, 07.06.13 12:09, Steve Grubb (sgr...@redhat.com) wrote: > > > > > > POSIX shared memory doesn't define any useful scheme for automatic > > > > > removing of shared memory segments from /dev/shm after use. Hence, in > > > > > ord

Re: Bad file access on the rise

2013-06-07 Thread Lennart Poettering
On Fri, 07.06.13 12:09, Steve Grubb (sgr...@redhat.com) wrote: > > > > POSIX shared memory doesn't define any useful scheme for automatic > > > > removing of shared memory segments from /dev/shm after use. Hence, in > > > > order to make sure that left-over segments don't fill up /dev/shm > > > >

Re: Bad file access on the rise

2013-06-07 Thread Steve Grubb
On Friday, June 07, 2013 05:48:39 PM Lennart Poettering wrote: > On Fri, 07.06.13 11:44, Steve Grubb (sgr...@redhat.com) wrote: > > 88 times? Something changed. It didn't used to be this bad. Its doing this > > over and over on the same file it was denied access on previously. > > Actually all lib

Orphaning some python packages and perl-Class-CSV

2013-06-07 Thread David Malcolm
I'm not directly using these right now, and am trying to focus on gcc work, so I've orphaned the following: * perl-Class-CSV * python-numarray in EPEL5 * python-pefile * python-sqlparse * python-subprocess32 * python3-cherrypy * python3-postgresql -- devel mailing list devel@lists.fedoraproject

Re: Bad file access on the rise

2013-06-07 Thread Lennart Poettering
On Fri, 07.06.13 11:44, Steve Grubb (sgr...@redhat.com) wrote: > 88 times? Something changed. It didn't used to be this bad. Its doing this > over and over on the same file it was denied access on previously. Actually all libpulse clients do this. > > POSIX shared memory doesn't define any usef

Re: Bad file access on the rise

2013-06-07 Thread Simo Sorce
On Fri, 2013-06-07 at 17:14 +0200, Lennart Poettering wrote: > On Fri, 07.06.13 09:50, Steve Grubb (sgr...@redhat.com) wrote: > > > Let's look at one of these pule-shm events: > > # ausearch --start today -k access -f pulse-shm -i --just-one > > > > type=PATH msg=audit(06/07/2013 07:13:46.377

[389-devel] please review: Ticket 47383 - connections attribute in cn=snmp, cn=monitor is counted twice

2013-06-07 Thread Mark Reynolds
https://fedorahosted.org/389/ticket/47383 https://fedorahosted.org/389/attachment/ticket/47383/0001-Ticket-47383-connections-attribute-in-cn-snmp-cn-mon.patch -- Mark Reynolds Red Hat, Inc mreyno...@redhat.com -- 389-devel mailing list 389-de...@lists.fedoraproject.org https://admin.fedoraproje

Re: Bad file access on the rise

2013-06-07 Thread Steve Grubb
On Friday, June 07, 2013 05:14:30 PM Lennart Poettering wrote: > On Fri, 07.06.13 09:50, Steve Grubb (sgr...@redhat.com) wrote: > > Let's look at one of these pule-shm events: > > # ausearch --start today -k access -f pulse-shm -i --just-one > > > > type=PATH msg=audit(06/07/2013 07:13:46.377:

Re: Bad file access on the rise

2013-06-07 Thread Lennart Poettering
On Fri, 07.06.13 09:50, Steve Grubb (sgr...@redhat.com) wrote: > Let's look at one of these pule-shm events: > # ausearch --start today -k access -f pulse-shm -i --just-one > > type=PATH msg=audit(06/07/2013 07:13:46.377:215) : item=0 name=/dev/shm/pulse- > shm-3756395503 inode=25089 dev=00:1

Bad file access on the rise

2013-06-07 Thread Steve Grubb
Hello, Every now and then I look at the distribution to see that from an auditing perspective the OS is nicely behaving in the absence of intrusion. Meaning we are not getting audit events unnecessarily. One of the typical rules required by the DISA STIG is to watch for file access being denied

Re: Hardened checking - how?

2013-06-07 Thread Dhiru Kholia
On Fri, Jun 7, 2013 at 2:06 AM, Troy Dawson wrote: > Is there an official Fedora way for telling is something is hardened > correctly? > I'm working on hardening mongodb, and I think I have it right, but I'd > really like to check. > > I was given a couple of scripts, which had dependencies not in

rawhide report: 20130607 changes

2013-06-07 Thread Fedora Rawhide Report
Compose started at Fri Jun 7 08:15:02 UTC 2013 Broken deps for x86_64 -- [bind10] bind10-1.0.0-3.fc20.i686 requires liblog4cplus-1.1.so.5 bind10-1.0.0-3.fc20.x86_64 requires liblog4cplus-1.1.so.5()(64bit) bind10-dhcp-

[perl-Locale-Codes/f18] 3.26 bump

2013-06-07 Thread Petr Pisar
commit 980187ea2a038f8f945390cc0aa7e6e79d6a4815 Author: Petr Písař Date: Fri Jun 7 11:19:38 2013 +0200 3.26 bump .gitignore |1 + perl-Locale-Codes.spec |5 - sources|2 +- 3 files changed, 6 insertions(+), 2 deletions(-) --- diff --git a/.gitig

Re: Hardened checking - how?

2013-06-07 Thread Paul Wouters
On Thu, 6 Jun 2013, Troy Dawson wrote: Is there an official Fedora way for telling is something is hardened correctly? I'm working on hardening mongodb, and I think I have it right, but I'd really like to check. I use https://nohats.ca/checksec.sh Paul -- devel mailing list devel@lists.fedo