All of lore.kernel.org
 help / color / mirror / Atom feed
* policy for PowerDNS
@ 2012-12-03 14:22 Sander Hoentjen
  2012-12-03 15:08 ` grift
  2012-12-03 15:10 ` grift
  0 siblings, 2 replies; 17+ messages in thread
From: Sander Hoentjen @ 2012-12-03 14:22 UTC (permalink / raw)
  To: selinux

Hi all,

I had created a policy for PowerDNS (pdns package in Fedora), but after 
e-mailing with dwalsh he told me it might be better to just adapt the 
named policy a bit. Here is what I have so far:
======pdns.fc======
/usr/sbin/pdns_server  -- gen_context(system_u:object_r:named_exec_t,s0)
/etc/pdns/pdns.conf    -- gen_context(system_u:object_r:named_conf_t,s0)
/var/run/pdns.controlsocket -s 
gen_context(system_u:object_r:named_var_run_t,s0)
/var/run/pdns.pid   -- gen_context(system_u:object_r:named_var_run_t,s0)
===================
======pdns.te======
policy_module(pdns,0.0.1)

require{
     type named_t;
}

#gmysql backend:
bool pdns_can_connect_db true;
tunable_policy(`pdns_backend_mysql', `
     mysql_read_config(named_t)
     #socket
     mysql_stream_connect(named_t)
')
===================
With this added pdns works with both the bind-backend and the 
mysql-backend (pdns-backend-mysql in Fedora). I do still get some 
denials, first 2 with both backends:
type=AVC msg=audit(12/03/2012 14:30:26.767:597) : avc:  denied  { fsetid 
} for  pid=23063 comm=pdns_server capability=fsetid 
scontext=system_u:system_r:named_t:s0 
tcontext=system_u:system_r:named_t:s0 tclass=capability

type=AVC msg=audit(12/03/2012 14:30:26.735:595) : avc:  denied  { kill } 
for  pid=20597 comm=pdns_server capability=kill 
scontext=system_u:system_r:named_t:s0 
tcontext=system_u:system_r:named_t:s0 tclass=capability

For this I can add:
allow named_t self:capability { fsetid kill };
but I am not sure if that is okay, can anyone please advise?

Last one I get with the mysql backend:
type=AVC msg=audit(12/03/2012 13:37:52.315:545) : avc:  denied  { 
getattr } for  pid=20772 comm=pdns_server 
path=/usr/share/mysql/charsets/Index.xml dev="dm-0" ino=8936 
scontext=system_u:system_r:named_t:s0 
tcontext=system_u:object_r:usr_t:s0 tclass=file
To allow this I will have to allow read access from named_t to usr_t, 
would that be okay?

Kind regards,

Sander

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 17+ messages in thread

end of thread, other threads:[~2013-01-04 14:12 UTC | newest]

Thread overview: 17+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-12-03 14:22 policy for PowerDNS Sander Hoentjen
2012-12-03 15:08 ` grift
2012-12-04 11:37   ` Sander Hoentjen
2012-12-04 14:14     ` Daniel J Walsh
2012-12-04 21:11       ` Sven Vermeulen
2012-12-05 11:51         ` Daniel J Walsh
2012-12-05 13:10           ` Sander Hoentjen
2012-12-05 19:24           ` Sven Vermeulen
2012-12-24 12:48             ` Sander Hoentjen
     [not found]               ` <50DC666E.4040101@redhat.com>
2012-12-27 15:23                 ` Sander Hoentjen
2012-12-27 17:21                   ` Daniel J Walsh
2013-01-03 13:47                     ` Sander Hoentjen
2013-01-03 13:52                       ` Daniel J Walsh
2013-01-03 16:40                       ` Daniel J Walsh
2013-01-04 14:11                         ` Sander Hoentjen
2012-12-03 15:10 ` grift
2012-12-04  9:56   ` Sander Hoentjen

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.