-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Resolve local_login_t denials #131
Comments
- Needed after a `chage -d 0 $USERNAME`
- Needed after a `chage -d 0 $USERNAME`
Remaining denials:
type=AVC msg=audit(1433423000.229:414): avc: denied { sendto } for pid=616 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1433423022.952:423): avc: denied { write } for pid=1236 comm="login" name=".pwd.lock" dev="dm-1" ino=4758 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shadow_t:s0 tclass=file type=AVC msg=audit(1433423022.961:424): avc: denied { search } for pid=1236 comm="login" name="crypto" dev="proc" ino=13063 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir type=AVC msg=audit(1433423022.961:424): avc: denied { read } for pid=1236 comm="login" name="fips_enabled" dev="proc" ino=13064 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file type=AVC msg=audit(1433423022.961:424): avc: denied { open } for pid=1236 comm="login" path="/proc/sys/crypto/fips_enabled" dev="proc" ino=13064 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file type=AVC msg=audit(1433423022.961:425): avc: denied { getattr } for pid=1236 comm="login" path="/proc/sys/crypto/fips_enabled" dev="proc" ino=13064 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file type=AVC msg=audit(1433423022.968:426): avc: denied { create } for pid=1236 comm="login" name="nshadow" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shadow_t:s0 tclass=file type=AVC msg=audit(1433423022.968:427): avc: denied { setattr } for pid=1236 comm="login" name="nshadow" dev="dm-1" ino=4579 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shadow_t:s0 tclass=file type=AVC msg=audit(1433423022.969:428): avc: denied { rename } for pid=1236 comm="login" name="nshadow" dev="dm-1" ino=4579 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shadow_t:s0 tclass=file type=AVC msg=audit(1433423022.969:428): avc: denied { unlink } for pid=1236 comm="login" name="shadow" dev="dm-1" ino=7001 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shadow_t:s0 tclass=file type=AVC msg=audit(1433423022.975:433): avc: denied { write } for pid=1236 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1433423022.975:433): avc: denied { link } for pid=1236 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key |
@mpalmi can this issue be closed? |
@mpalmi can this be closed? |
Okay, so there are remaining denials here (with dontaudits turned off): type=AVC msg=audit(1442254013.580:627): avc: denied { search } for pid=614 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254013.580:627): avc: denied { write } for pid=614 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254013.607:631): avc: denied { sendto } for pid=614 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442254055.728:412): avc: denied { sendto } for pid=616 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442254071.076:424): avc: denied { write } for pid=1239 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254071.076:424): avc: denied { link } for pid=1239 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254103.006:461): avc: denied { search } for pid=1239 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254103.006:461): avc: denied { search } for pid=1239 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254103.009:462): avc: denied { sendto } for pid=1239 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442254248.335:418): avc: denied { write } for pid=624 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254248.335:418): avc: denied { link } for pid=624 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254248.344:419): avc: denied { sendto } for pid=624 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442254355.341:505): avc: denied { search } for pid=624 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254355.341:505): avc: denied { write } for pid=624 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254355.342:506): avc: denied { sendto } for pid=624 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442254396.281:417): avc: denied { write } for pid=619 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254396.281:417): avc: denied { link } for pid=619 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254396.288:418): avc: denied { sendto } for pid=619 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442254451.496:498): avc: denied { search } for pid=619 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254451.496:498): avc: denied { write } for pid=619 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254914.326:418): avc: denied { write } for pid=614 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254914.326:418): avc: denied { link } for pid=614 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442254914.334:419): avc: denied { sendto } for pid=614 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442255010.098:504): avc: denied { search } for pid=614 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442255010.098:504): avc: denied { write } for pid=614 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442255010.157:512): avc: denied { sendto } for pid=614 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442266395.331:447): avc: denied { write } for pid=612 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442266395.331:447): avc: denied { link } for pid=612 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442266395.337:448): avc: denied { sendto } for pid=612 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442266693.339:529): avc: denied { search } for pid=612 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442266693.339:529): avc: denied { write } for pid=612 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442266693.386:542): avc: denied { sendto } for pid=612 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442266710.228:530): avc: denied { rlimitinh } for pid=612 comm="login" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442266710.228:530): avc: denied { siginh } for pid=612 comm="login" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442266710.228:530): avc: denied { noatsecure } for pid=612 comm="login" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442266710.248:531): avc: denied { rlimitinh } for pid=1235 comm="unix_chkpwd" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442266710.248:531): avc: denied { siginh } for pid=1235 comm="unix_chkpwd" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442266710.248:531): avc: denied { noatsecure } for pid=1235 comm="unix_chkpwd" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442266713.967:539): avc: denied { write } for pid=612 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442266713.967:539): avc: denied { link } for pid=612 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442266713.976:540): avc: denied { sendto } for pid=612 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442266713.982:544): avc: denied { rlimitinh } for pid=1239 comm="bash" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1442266713.982:544): avc: denied { siginh } for pid=1239 comm="bash" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1442266713.982:544): avc: denied { noatsecure } for pid=1239 comm="bash" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1442326780.823:877): avc: denied { search } for pid=612 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442326780.823:877): avc: denied { write } for pid=612 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442326780.825:878): avc: denied { sendto } for pid=612 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442327053.558:535): avc: denied { rlimitinh } for pid=615 comm="login" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327053.558:535): avc: denied { siginh } for pid=615 comm="login" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327053.558:535): avc: denied { noatsecure } for pid=615 comm="login" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327053.580:536): avc: denied { rlimitinh } for pid=1236 comm="unix_chkpwd" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327053.580:536): avc: denied { siginh } for pid=1236 comm="unix_chkpwd" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327053.580:536): avc: denied { noatsecure } for pid=1236 comm="unix_chkpwd" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327057.049:544): avc: denied { write } for pid=615 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442327057.049:544): avc: denied { link } for pid=615 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442327057.056:545): avc: denied { sendto } for pid=615 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442327057.064:549): avc: denied { rlimitinh } for pid=1240 comm="bash" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1442327057.064:549): avc: denied { siginh } for pid=1240 comm="bash" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1442327057.064:549): avc: denied { noatsecure } for pid=1240 comm="bash" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1442327109.816:641): avc: denied { search } for pid=615 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442327109.816:641): avc: denied { write } for pid=615 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442327109.862:654): avc: denied { sendto } for pid=615 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442327259.833:531): avc: denied { rlimitinh } for pid=620 comm="login" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327259.833:531): avc: denied { siginh } for pid=620 comm="login" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327259.833:531): avc: denied { noatsecure } for pid=620 comm="login" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327259.854:532): avc: denied { rlimitinh } for pid=1238 comm="unix_chkpwd" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327259.854:532): avc: denied { siginh } for pid=1238 comm="unix_chkpwd" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327259.854:532): avc: denied { noatsecure } for pid=1238 comm="unix_chkpwd" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1442327263.019:540): avc: denied { write } for pid=620 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442327263.019:540): avc: denied { link } for pid=620 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1442327263.025:541): avc: denied { sendto } for pid=620 comm="login" path="/dev/log" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket type=AVC msg=audit(1442327263.035:545): avc: denied { rlimitinh } for pid=1242 comm="bash" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1442327263.035:545): avc: denied { siginh } for pid=1242 comm="bash" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1442327263.035:545): avc: denied { noatsecure } for pid=1242 comm="bash" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=toor_u:staff_r:staff_t:s0 tclass=process
The process-related denials can likely be ignored, leaving the following: allow local_login_t kernel_t:unix_dgram_socket sendto; Logging-related, though /dev/log should have devlog_t as a label, as opposed to kernel_t. This may just be a timing issue. and allow local_login_t staff_t:key { write search link }; Password-related? As it stands, logins work, so I'm not really sure that these denials are a priority. Perhaps we should add this ticket to the watchlist? |
@mpalmi can you please update this what else needs to be done before we can close out the issue? Was this finished when we released Beta? |
We need to make sure that this is complete |
The following allow rules are still missing although /dev/log is labeled devlog_t after boot (not kernel_t) and logins work as-is. We can revisit this in future |
In order to get this system booting in Enforcing, we will need to resolve the remaining kernel_t denials.
Assumptions:
Subtasks:
audit2allow
audit.log
The text was updated successfully, but these errors were encountered: