On Thu, 16 Jul 2020, Yi Zhao wrote:

>
> On 7/16/20 11:27 AM, Yi Zhao wrote:
> >
> > On 7/15/20 6:38 PM, Scott Murray wrote:
> >> On Wed, 15 Jul 2020, Yi Zhao wrote:
> >>
> >>> On 7/15/20 12:19 AM, Scott Murray wrote:
> >>>> On Tue, 7 Jul 2020, Yi Zhao wrote:
> >>>>
> >>>>> Here is the changelog for this is patchset:
> >>>>>
> >>>>> * Drop refpolicy 2.20190201
> >>>>>     If we still keep two versions of refpolicy, it is difficult to
> >>>>> maintain
> >>>>>     two huge local patchsets. So drop this version and only keep the git
> >>>>>     version.
> >>>>>
> >>>>> * Add patches to make systemd/sysvinit can work with all policy types.
> >>>>>
> >>>>> Here are the results with this patcheset:
> >>>>>
> >>>>> Machine: qemux86-64
> >>>>> Image: core-image-selinux
> >>>>> Init manager: sysvinit and systemd
> >>>>> Policy types: minimum, targeted, standard, mcs, mls
> >>>>> Boot command: runqemu qemux86-64 kvm nographic bootparams="selinux=1
> >>>>> enforcing=1" qemuparams="-m 1024"
> >>>>>
> >>>>> 1. All refpolicy type can be built without problems.
> >>>>>
> >>>>> 2. With parameter selinux=1 & enforcing=1
> >>>>> The qemu can boot up and login with all policy types.
> >>>> [snip]
> >>>>
> >>>> I suspect I'm really missing something, but I'm unable to successfully
> >>>> make this work with poky + meta-selinux and its meta-openembedded
> >>>> dependencies with either sysvinit or systemd; I see denials on boot and
> >>>> cannot log in due to denials on reading /etc/passwd.  That's also the
> >>>> behavior I see without this update, so I'm wondering if I'm just doing
> >>>> something significantly wrong with respect to configuration.  My
> >>>> local.conf additions for testing are just:
> >>>>
> >>>> DISTRO_FEATURES_append = " selinux"
> >>>
> >>> Please set the following DISTRO_FEATURES:
> >>>
> >>> DISTRO_FEATURES_append = " acl xattr pam selinux"
> >> Ah, poky is missing "pam", I somehow missed that when I checked
> >> previously.  I can get logged in when I add it and rebuild.  It likely
> >> would make sense to use the check_features class in e.g.
> >> core-image-selinux to catch this.  Would you be okay with a patch that
> >> does so?
> >
> > Thanks. It makes sense. I can send a patch later or you can also do it.
> >
> >>
> >>> If you see some AVC denials for {map} like below:
> >>>
> >>> avc:  denied  { map } for  pid=249 comm="dbus-daemon" path="/etc/passwd"
> >>> dev="vda" ino=345 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023
> >>> tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
> >>> avc:  denied  { map } for  pid=319 comm="avahi-daemon" path="/etc/passwd"
> >>> dev="vda" ino=345 scontext=system_u:system_r:avahi_t:s0
> >>> tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
> >>> avc:  denied  { map } for  pid=379 comm="login" path="/etc/passwd"
> >>> dev="vda"
> >>> ino=345 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023
> >>> tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
> >>>
> >>> They are harmless.
> >> Having spurious denials seems like it would make using them for detecting
> >> actual bad behavior harder, I'll likely start looking at the policy to
> >> see if some of this can be fixed.
>
> You can install auditd into the rootfs and startup the daemon to let the
> denials messages write to audit.log rather than print to the console.

Yes, but ideally I'd like to not have to filter a bunch of spam from the
auditd logs to have them be useful for potential incident detection.  As I
mentioned on my other reply, I plan to look into it further and likely
will just carry a policy patch locally if it's reasonable to work out one.

Scott
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#49987): https://lists.yoctoproject.org/g/yocto/message/49987
Mute This Topic: https://lists.yoctoproject.org/mt/75351492/21656
Group Owner: yocto+ow...@lists.yoctoproject.org
Unsubscribe: https://lists.yoctoproject.org/g/yocto/unsub  
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to