On Tue, Sep 12, 2017 at 1:36 PM, Dominick Grift <[email protected]> wrote:
> On Tue, Sep 12, 2017 at 12:01:35PM -0400, Stephen Smalley wrote:
>> On Sep 12, 2017 7:01 AM, "Dominick Grift" <[email protected]> wrote:
>>
>> I have extended socket class polcap enabled but i am still seeing "socket"
>> class events and i was wondering whether that is to be expected?
>>
>> avc:  denied  { create } for  pid=10484 comm="nethogs" scontext=wheel.id:
>> sysadm.role:nethogs.subj:s0 tcontext=wheel.id:sysadm.role:nethogs.subj:s0
>> tclass=socket permissive=0
>>
>> This seems to be common to processes that also create (and map! [1])
>> "packet_socket" sockets (tcpdump/nethogs)
>>
>> [1] avc:  denied  { map } for  pid=10525 comm="nethogs"
>> path="socket:[56040]" dev="sockfs" ino=56040
>> scontext=wheel.id:sysadm.role:nethogs.subj:s0
>> tcontext=wheel.id:sysadm.role:nethogs.subj:s0 tclass=packet_socket
>> permissive=0
>>
>>
>> No, that is not expected. Can you enable sys call audit and get those
>> records?
>
> type=PROCTITLE msg=audit(09/12/2017 19:35:54.063:4458) : proctitle=nethogs 
> enp8s0
> type=SYSCALL msg=audit(09/12/2017 19:35:54.063:4458) : arch=x86_64 
> syscall=socket success=yes exit=5 a0=local a1=SOCK_RAW a2=ip a3=0xb4 items=0 
> ppid=3251 pid=8963 auid=kcinimod uid=root gid=root euid=root suid=root 
> fsuid=root egid=root sgid=root fsgid=root tty=pts5 ses=1 comm=nethogs 
> exe=/usr/sbin/nethogs subj=wheel.id:sysadm.role:nethogs.subj:s0 key=(null)
> type=AVC msg=audit(09/12/2017 19:35:54.063:4458) : avc:  denied  { create } 
> for  pid=8963 comm=nethogs scontext=wheel.id:sysadm.role:nethogs.subj:s0 
> tcontext=wheel.id:sysadm.role:nethogs.subj:s0 tclass=socket permissive=1

Ah ha, AF_UNIX/SOCK_RAW, that's the problem.  Luis Ressel fixed this
(see the commit below) and it should make it up to Linus during the
current merge window (eventually, maybe, hopefully).

If you run Fedora Rawhide, you can try one of recent kernel builds in
the COPR repo below, it should have the fix.

*  https://copr.fedorainfracloud.org/coprs/pcmoore/kernel-secnext

  commit 2a764b529ae57bed61da2c90ff132b9fec97f80b
  Author: Luis Ressel <[email protected]>
  Date:   Tue Jul 25 15:13:41 2017 -0400

   selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets

   For PF_UNIX, SOCK_RAW is synonymous with SOCK_DGRAM (cf.
   net/unix/af_unix.c). This is a tad obscure, but libpcap uses it.

   Signed-off-by: Luis Ressel <[email protected]>
   Acked-by: Stephen Smalley <[email protected]>
   Signed-off-by: Paul Moore <[email protected]>

-- 
paul moore
www.paul-moore.com

Reply via email to