Experience with SELinux enabled and targetted policy

Richard E Miles r.godzilla at comcast.net
Tue Feb 22 00:16:54 UTC 2005


On Mon, 21 Feb 2005 18:23:20 -0500
Daniel J Walsh <dwalsh at redhat.com> wrote:

> Richard E Miles wrote:
> 
> >In order to understand SELinux more I enabled SELinux on my system. I noticed a
> >problem with access denied on portmap and ntpdate and ntpd services. The following is
> >the relevent information snipped from the dmesg output:
> >
> ><snip>
> >EXT3-fs: mounted filesystem with ordered data mode.
> >security:  3 users, 4 roles, 319 types, 20 bools
> >security:  53 classes, 10805 rules
> >SELinux:  Completing initialization.
> >SELinux:  Setting up existing superblocks.
> >SELinux: initialized (dev hda2, type ext3), uses xattr
> >SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
> >SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts
> >SELinux: initialized (dev mqueue, type mqueue), not configured for labeling
> >SELinux: initialized (dev hugetlbfs, type hugetlbfs), not configured for labeling
> >SELinux: initialized (dev devpts, type devpts), uses transition SIDs
> >SELinux: initialized (dev eventpollfs, type eventpollfs), uses genfs_contexts
> >SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
> >SELinux: initialized (dev futexfs, type futexfs), uses genfs_contexts
> >SELinux: initialized (dev pipefs, type pipefs), uses task SIDs
> >SELinux: initialized (dev sockfs, type sockfs), uses task SIDs
> >SELinux: initialized (dev proc, type proc), uses genfs_contexts
> >SELinux: initialized (dev bdev, type bdev), uses genfs_contexts
> >SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts
> >SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts
> >SELinux: initialized (dev usbfs, type usbfs), uses genfs_contexts
> ><snip>
> >ip_tables: (C) 2000-2002 Netfilter core team
> >ip_conntrack version 2.1 (2047 buckets, 16376 max) - 360 bytes per conntrack
> >eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.010:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.011:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.011:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.011:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.011:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.011:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009536.011:0): avc:  denied  { search } for  pid=3541 exe=/sbin/portmap name=/ dev=hda2 ino=2 scontext=user_u:system_r:portmap_t tcontext=system_u:object_r:file_t tclass=dir
> >SELinux: initialized (dev rpc_pipefs, type rpc_pipefs), uses genfs_contexts
> ><snip>
> >IPv6 over IPv4 tunneling driver
> >divert: not allocating divert_blk for non-ethernet device sit0
> >audit(1109009547.625:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.625:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.625:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.626:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.626:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.626:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.626:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.626:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.626:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.626:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.626:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.627:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.627:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.627:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.627:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.627:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.627:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.627:0): avc:  denied  { search } for  pid=4176 exe=/usr/sbin/ntpdate name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.763:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.764:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.765:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.765:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.765:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.765:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.765:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.766:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >audit(1109009547.766:0): avc:  denied  { search } for  pid=4180 exe=/usr/sbin/ntpd name=/ dev=hda2 ino=2 scontext=user_u:system_r:ntpd_t tcontext=system_u:object_r:file_t tclass=dir
> >
> >Since I use ntpdate to keep my system date and time in sync this is a
> >problem. I don't know what not having portmap runnin will do.
> >
> >Does anyone know why I am being denied access to these services. If so is there
> >a way to correct this denial?
> >
> >  
> >
> If you see a file context marked file_t, that means the file system was 
> not labeled.  You need to relabel in order to get SELinux to
> work properly.  The best way to relabel is touch /.autorelabel and reboot.
> 
> -- 
> fedora-list mailing list
> fedora-list at redhat.com
> To unsubscribe: http://www.redhat.com/mailman/listinfo/fedora-list

Thank you Daniel. I will do that and give it a whirl. After the relable should
I get rid of this file?

-- 
Richard E Miles
Federal Way WA. USA
registered linux user 46097




More information about the fedora-list mailing list