Selinux update breaks nscd?

Jason L Tibbitts III tibbs at math.uh.edu
Thu Jun 16 23:13:00 UTC 2005


At the risk of being deemed insane for talking to myself...

I read the Selinux policy HOWTO and poked through the policy files
long enough to gain a rudimentary comprehension of the contents.  I
found that nscd seems to have no permission at all to interact with
certificates, and that applying the following patch fixes my problem:

--- policy-1.17.30/domains/program/unused/nscd.te.orig	2005-06-16 17:20:12.000000000 -0500
+++ policy-1.17.30/domains/program/unused/nscd.te	2005-06-16 17:21:50.000000000 -0500
@@ -73,4 +73,11 @@
 allow nscd_t tmp_t:dir { search getattr };
 allow nscd_t tmp_t:lnk_file read;
 allow nscd_t { urandom_device_t random_device_t }:chr_file { getattr read };
+
+# XXXX
+allow nscd_t cert_t:dir { search getattr };
+allow nscd_t cert_t:file { getattr read };
+allow nscd_t cert_t:lnk_file { getattr read };
+# XXXX
+
 log_domain(nscd)

It may not be the minimum patch that works.  I still get the following
in the logs, but it doesn't seem to disrupt anything:

audit(1118963275.487:0): avc:  denied  { read } for  pid=2815 exe=/usr/sbin/nscd name=cert.pem dev=dm-3 ino=49451 scontext=root:system_r:nscd_t tcontext=system_u:object_r:usr_t tclass=lnk_file

cert.pem is part of the openssl package and was installed in
/usr/share/ssl.  It is actually a link to
/usr/share/ssl/certs/ca-bundle.crt, but the link has context
system_u:object_r:usr_t.  The link destination is properly labeled:
system_u:object_r:cert_t.

 - J<




More information about the fedora-list mailing list