SELinux & apache/httpd access to /home/*/www

Stephen Smalley sds at epoch.ncsc.mil
Fri Sep 17 17:13:13 UTC 2004


On Fri, 2004-09-17 at 12:40, Cream[DONut] wrote:
> Sep 17 18:23:15 DONut kernel: audit(1095438195.775:0): avc:  denied  { 
> read write } for  pid=2822 exe=/usr/sbin/httpd path=/dev/pts/0 
> dev=devpts ino=2 scontext=root:system_r:httpd_t 
> tcontext=root:object_r:devpts_t tclass=chr_file

This one is correct; we revoke access to the tty upon the transition to
the httpd_t domain so that a compromised daemon cannot subsequently gain
access to an admin tty.  IIRC, that did cause breakage in apache until
we made a change to the kernel to also re-open descriptors 0-2 to
/dev/null when it closes access to the tty so that stdin/stdout/stderr
are still defined as expected for it during initialization.  The kernel
change wasn't made until after test1, so that is likely why this breaks
for you.  You can allow it temporarily if you like for testing purposes,
or update to a newer kernel.

> Sep 17 18:24:10 DONut kernel: audit(1095438250.555:0): avc:  denied  { 
> search } for  pid=2826 exe=/usr/sbin/httpd name=xxxxxx dev=hda2 
> ino=886604 scontext=root:system_r:httpd_t 
> tcontext=system_u:object_r:user_home_dir_t tclass=dir
> Sep 17 18:24:10 DONut kernel: audit(1095438250.556:0): avc:  denied  { 
> getattr } for  pid=2826 exe=/usr/sbin/httpd path=/home/xxxxxx dev=hda2 
> ino=886604 scontext=root:system_r:httpd_t 
> tcontext=system_u:object_r:user_home_dir_t tclass=dir

This should have been allowed, and it is allowed in the current targeted
policy.  Looking at the CVS history, it was fixed for the targeted
policy after test1 as well, which explains your error.  So you can add
it or update your policy.

-- 
Stephen Smalley <sds at epoch.ncsc.mil>
National Security Agency




More information about the fedora-selinux-list mailing list