[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: gpg avc



On Tue, 2004-04-20 at 22:36, Colin Walters wrote:
> On Tue, 2004-04-20 at 22:02, Josh Boyer wrote:
> > Trying to generate a new gpg key fails with the latest policy updates. 
> > Below is the avc:
> > 
> > audit(1082512578.827:0): avc:  denied  { read } for  pid=2543
> > exe=/usr/bin/gpg name=random dev=hda5 ino=267501
> > scontext=user_u:user_r:user_gpg_t
> > tcontext=system_u:object_r:random_device_t tclass=chr_file
> > 
> > [jwboyer localhost jwboyer]$ rpm -q policy
> > policy-1.11.2-9
> 
> Try this patch, will be in the next policy.

I presume by the way there's a reason access to random_device_t is was
originally denied - it prevents users from draining your good entropy by
generating a ton of keys. On the other hand, if you have GPG installed
on a system, I think most system administrators are going to expect
users to be able to generate keys securely.  

Maybe the right way is a resource constraint framework.  Anyways, do
people think this is worth being made into a tunable or something?

Attachment: signature.asc
Description: This is a digitally signed message part


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]