All of lore.kernel.org
 help / color / mirror / Atom feed
* SELinux Policy in OpenSUSE 11.2
@ 2010-04-29  6:43 Justin P. Mattock
  2010-04-29  7:01 ` Justin P. Mattock
  0 siblings, 1 reply; 113+ messages in thread
From: Justin P. Mattock @ 2010-04-29  6:43 UTC (permalink / raw)
  To: selinux; +Cc: sds

o.k. Stephen,

bug entry:
https://bugzilla.novell.com/show_bug.cgi?id=582399

you were right with some init
file not having #! /bin/bash
on the top of the head.
after looking around and gutting
/etc/init.d I found
that the files:
/etc/rc.status and rc.splash
has no such entry, so after adding
this entry and rebooting
I can get a clean bootup and policy load
without the need for init_upstart=1

cheers..


Justin P. Mattock

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 113+ messages in thread
* Re: SELinux Policy in OpenSUSE 11.2
@ 2010-02-17 14:04 Thomas
  0 siblings, 0 replies; 113+ messages in thread
From: Thomas @ 2010-02-17 14:04 UTC (permalink / raw)
  To: Justin P. mattock; +Cc: Alan Rouse, 'selinux@tycho.nsa.gov'

Hello,
I am happy to see someone is working on SELinux for openSUSE.

To make this changes permanent, file the bug and findings in
our bugzilla (https://bugzilla.novell.com) please and put my
address (thomas@novell.com) into the CC list.

If you like to get more control and be more active I encourage
you to join the openSUSE community 
(http://en.opensuse.org/How_to_Participate).

We definitely lack skilled SELinux developers! :)

Thanks,
Thomas

Am Mittwoch 17 Februar 2010 08:16:36 schrieb Justin P. mattock:
> o.k. I think I thought too much on the subject
> (I need to stop building systems from scratch
> i.g. all I can think of is/are switches to enable).
> 
> Anyways I figured out the problem seems easier
> than I had expected:
> 
> with a fresh build of suse 11.2, then
> under yast adding the correct SELinux
> apps/libs, then adjusting grub(in the control
> center thing).
> 
> reboot
> 
> you hit a broken gdm dbus thing.
> 
> under /var/log/gdm/:5-greeter.log
> 
> there is an error message with dbus:
> 
> Failed to start message bus: Failed to open
> "/etc/selinux/targeted/contexts/dbus_contexts": No such file or directory
> EOF in dbus-launch reading address from dbus daemon.
> 
> so after reading that then looking at /etc/selinux/refpolicy-standard
> I decided to just cp -R refpolicy-standard targeted(reboot)
> and voila the system boots gdm starts, life is good with suse
> (I guess there not the darkside after all!!).
> 
> as for the real problem I'm guessing whatever is telling
> dbus-launch to look for /etc/selinux/targeted
> is the problem.
> 
> Alan does just a simple renaming of refpolicy to targeted
> at least get you up and running(if not use suses policy,
> and rename it to targeted, until I can find what dbus launch script is
> calling for that policy name).
> 
> Justin P. Mattock
> 
> 
> --
> This message was distributed to subscribers of the selinux mailing list.
> If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov
>  with the words "unsubscribe selinux" without quotes as the message.
> 

-- 
 Thomas Biege <thomas@suse.de>, SUSE LINUX, Security Support & Auditing
 SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
--
  Wer aufhoert besser werden zu wollen, hoert auf gut zu sein.
                            -- Marie von Ebner-Eschenbach

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 113+ messages in thread
* SELinux Policy in OpenSUSE 11.2
@ 2010-02-16 14:55 Alan Rouse
  2010-02-16 15:22 ` Dominick Grift
  2010-02-16 19:10 ` Stephen Smalley
  0 siblings, 2 replies; 113+ messages in thread
From: Alan Rouse @ 2010-02-16 14:55 UTC (permalink / raw)
  To: 'selinux@tycho.nsa.gov'

[-- Attachment #1: Type: text/plain, Size: 8491 bytes --]

I've been trying to get SELinux working in OpenSUSE 11.2.  So far I can get to runlevel 3 with enforcing=0.  Before I start tinkering with audit2allow, I thought I should get some advice.

The 11.2 repository gives me these policy rpms:

http://download.opensuse.org/repositories/openSUSE:/11.2/standard/noarch/selinux-policy-2.20081210-3.1.noarch.rpm
http://download.opensuse.org/repositories/openSUSE:/11.2/standard/src/selinux-policy-2.20081210-3.1.src.rpm

But that version of policy has some issues in OpenSUSE:

1) failure to allow the graphical desktop to load (even with enforcing=0) .   The following message appears in the console during boot:

** (gdm:1073): WARNING **: Couldn't connect to system bus: A SELinux policy prevents this sender from sending this message to this recipient (rejected message had sender "(unset)" interface "org.freedesktop.DBus" member "Hello" erro name "(unset)" destination "org.freedesktop.DBus") startproc: exit status of parent of /usr/sbin/gdm: 1

Since enforcing is off, I'm surprised to see a message like that.  SELinux shouldn't be preventing anything, so I don't see how modifying policy will solve that.  Ideas?

2) Attempting to boot to runlevel 5 with kernel parms "security=selinux selinux=1 enforcing=0", I'm dropped off in runlevel 3 instead. I'm getting a couple of pages of AVC errors after boot (see below).

I've tried several other versions of the policy without luck:
- the version included in Fedora 12  (refpolicy-2.2009117
- the latest release from Tresys
- the latest from the repository at Tresys

They all give basically the same problems.  Any advice would be appreciated.

Thanks,
Alan

Following are the AVC messages I've been getting:

type=DAEMON_START msg=audit(1265904613.457:3152): auditd start, ver=1.7.13 format=raw kernel=2.6.31.5-0.1-desktop auid=4294967295 pid=2337 subj=system_u:system_r:sysadm_t res=success
type=AVC msg=audit(1265904613.473:202): avc:  denied  { write } for  pid=2342 comm="auditctl" path="/dev/blog" dev=tmpfs ino=1836 scontext=system_u:system_r:auditctl_t tcontext=system_u:object_r:tmpfs_t tclass=fifo_file
type=AVC msg=audit(1265904613.689:203): avc:  denied  { execstack } for  pid=2382 comm="cupsd" scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=process
type=AVC msg=audit(1265904613.690:204): avc:  denied  { execmem } for  pid=2382 comm="cupsd" scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=process
type=AVC msg=audit(1265904614.260:205): avc:  denied  { read write } for  pid=2448 comm="smartd" name="sda" dev=tmpfs ino=1749 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file
type=AVC msg=audit(1265904614.260:206): avc:  denied  { open } for  pid=2448 comm="smartd" name="sda" dev=tmpfs ino=1749 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file
type=AVC msg=audit(1265904614.261:207): avc:  denied  { ioctl } for  pid=2448 comm="smartd" path="/dev/sda" dev=tmpfs ino=1749 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file
type=AVC msg=audit(1265904615.964:208): avc:  denied  { read } for  pid=287 comm="stapio" path="/sys/kernel/debug/systemtap/preloadtrace/trace0" dev=debugfs ino=4136 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=file
type=AVC msg=audit(1265904615.964:209): avc:  denied  { read } for  pid=2337 comm="auditd" scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=netlink_audit_socket
type=AVC msg=audit(1265904616.052:210): avc:  denied  { read } for  pid=2728 comm="modprobe" path="/dev/console" dev=tmpfs ino=3969 scontext=system_u:system_r:insmod_t tcontext=system_u:object_r:console_device_t tclass=chr_file
type=AVC msg=audit(1265904616.053:211): avc:  denied  { write } for  pid=2728 comm="modprobe" path="/dev/blog" dev=tmpfs ino=1836 scontext=system_u:system_r:insmod_t tcontext=system_u:object_r:tmpfs_t tclass=fifo_file
type=AVC msg=audit(1265904616.063:212): avc:  denied  { read } for  pid=308 comm="udevd" scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=netlink_kobject_uevent_socket
type=AVC msg=audit(1265904616.063:213): avc:  denied  { write } for  pid=308 comm="udevd" scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=netlink_kobject_uevent_socket
type=AVC msg=audit(1265904616.069:214): avc:  denied  { write } for  pid=2729 comm="mount" path="/dev/blog" dev=tmpfs ino=1836 scontext=system_u:system_r:mount_t tcontext=system_u:object_r:tmpfs_t tclass=fifo_file
type=AVC msg=audit(1265904617.858:215): avc:  denied  { write } for  pid=2779 comm="ip6tables" path="/tmp/SuSEfirewall2_iptables.2F1un9MP" dev=sda2 ino=132181 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:user_tmp_t tclass=file
type=AVC msg=audit(1265904617.859:216): avc:  denied  { write } for  pid=2779 comm="ip6tables" path="/dev/blog" dev=tmpfs ino=1836 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=fifo_file
type=AVC msg=audit(1265904617.889:217): avc:  denied  { write } for  pid=2785 comm="modprobe" path="/tmp/SuSEfirewall2_iptables.2F1un9MP" dev=sda2 ino=132181 scontext=system_u:system_r:insmod_t tcontext=system_u:object_r:user_tmp_t tclass=file
type=AVC msg=audit(1265904618.183:218): avc:  denied  { read } for  pid=2831 comm="iptables-batch" name="SuSEfirewall2_iptables.2F1un9MP" dev=sda2 ino=132181 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:user_tmp_t tclass=file
type=AVC msg=audit(1265904618.183:219): avc:  denied  { open } for  pid=2831 comm="iptables-batch" name="SuSEfirewall2_iptables.2F1un9MP" dev=sda2 ino=132181 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:user_tmp_t tclass=file
type=AVC msg=audit(1265904618.183:220): avc:  denied  { getattr } for  pid=2831 comm="iptables-batch" path="/tmp/SuSEfirewall2_iptables.2F1un9MP" dev=sda2 ino=132181 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:user_tmp_t tclass=file
type=AVC msg=audit(1265904618.473:221): avc:  denied  { setattr } for  pid=2853 comm="mingetty" name="tty1" dev=tmpfs ino=3984 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file
type=AVC msg=audit(1265904618.480:222): avc:  denied  { getattr } for  pid=2853 comm="mingetty" path="/sys/kernel/debug/systemtap/preloadtrace/.cmd" dev=debugfs ino=4137 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=file
type=AVC msg=audit(1265904621.738:223): avc:  denied  { write } for  pid=286 comm="stapio" path="/sys/kernel/debug/systemtap/preloadtrace/.cmd" dev=debugfs ino=4137 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=file
type=AVC msg=audit(1265904621.783:224): avc:  denied  { search } for  pid=2868 comm="staprun" name="/" dev=debugfs ino=1 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir
type=AVC msg=audit(1265904621.783:225): avc:  denied  { open } for  pid=2868 comm="staprun" name=".cmd" dev=debugfs ino=4137 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=file
type=AVC msg=audit(1265904621.784:226): avc:  denied  { sys_module } for  pid=2868 comm="staprun" capability=16 scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=capability
type=AVC msg=audit(1265904628.319:227): avc:  denied  { create } for  pid=2853 comm="login" scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=netlink_audit_socket
type=AVC msg=audit(1265904628.320:228): avc:  denied  { write } for  pid=2853 comm="login" scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=netlink_audit_socket
type=AVC msg=audit(1265904628.320:229): avc:  denied  { nlmsg_relay } for  pid=2853 comm="login" scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=netlink_audit_socket
type=AVC msg=audit(1265904628.321:230): avc:  denied  { audit_write } for  pid=2853 comm="login" capability=29 scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=capability
type=AVC msg=audit(1265904628.370:231): avc:  denied  { audit_control } for  pid=2853 comm="login" capability=30 scontext=system_u:system_r:sysadm_t tcontext=system_u:system_r:sysadm_t tclass=capability



[-- Attachment #2: Type: text/html, Size: 11013 bytes --]

^ permalink raw reply	[flat|nested] 113+ messages in thread

end of thread, other threads:[~2010-04-29  7:01 UTC | newest]

Thread overview: 113+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-04-29  6:43 SELinux Policy in OpenSUSE 11.2 Justin P. Mattock
2010-04-29  7:01 ` Justin P. Mattock
  -- strict thread matches above, loose matches on Subject: below --
2010-02-17 14:04 Thomas
2010-02-16 14:55 Alan Rouse
2010-02-16 15:22 ` Dominick Grift
2010-02-16 18:04   ` Alan Rouse
2010-02-16 18:35     ` Dominick Grift
2010-02-16 18:52     ` Dominick Grift
2010-02-16 19:28     ` Stephen Smalley
2010-02-16 20:06       ` Justin P. mattock
2010-02-16 19:10 ` Stephen Smalley
2010-02-16 19:19   ` Alan Rouse
2010-02-16 19:38     ` Stephen Smalley
2010-02-16 21:30       ` Alan Rouse
2010-02-16 22:52         ` Dominick Grift
2010-02-17  3:36           ` Justin P. mattock
2010-02-17  7:16           ` Justin P. mattock
2010-02-17 13:43             ` Stephen Smalley
2010-02-17 15:35               ` Justin P. mattock
2010-02-17 16:34             ` Alan Rouse
2010-02-17 16:58               ` Stephen Smalley
2010-02-17 18:34                 ` Alan Rouse
2010-02-17 18:50                   ` Justin P. mattock
2010-02-17 18:58                   ` Stephen Smalley
2010-02-17 19:39                     ` Alan Rouse
2010-02-17 19:47                     ` Justin P. mattock
2010-02-17 20:00                       ` Stephen Smalley
2010-02-17 20:03                         ` Alan Rouse
2010-02-17 20:12                           ` Dominick Grift
2010-02-17 20:18                           ` Stephen Smalley
2010-02-17 20:17                             ` Alan Rouse
2010-02-17 20:25                             ` Stephen Smalley
     [not found]                               ` <5A5E55DF96F73844AF7DFB0F48721F0F529A7802A0@EUSAACMS0703.eamcs.ericsson.se>
     [not found]                                 ` <1266438910.4945.137.camel@moss-pluto.epoch.ncsc.mil>
2010-02-17 20:49                                   ` Alan Rouse
2010-02-17 21:09                                     ` Stephen Smalley
2010-02-17 21:11                                       ` Alan Rouse
2010-02-17 21:29                                         ` Stephen Smalley
2010-02-17 21:37                                           ` Stephen Smalley
2010-02-17 21:48                                             ` Alan Rouse
2010-02-18 14:16                                               ` Stephen Smalley
2010-02-18 21:28                                                 ` Stephen Smalley
2010-02-18 16:03                                               ` Stephen Smalley
2010-02-18 17:36                                                 ` Alan Rouse
2010-02-18 17:53                                                   ` Stephen Smalley
2010-02-18 18:21                                                     ` Alan Rouse
2010-02-19 14:49                                                       ` Stephen Smalley
2010-02-19 15:29                                                         ` Alan Rouse
2010-02-19 17:46                                                           ` Stephen Smalley
2010-02-19 20:23                                                             ` Alan Rouse
2010-02-19 21:06                                                               ` Stephen Smalley
2010-02-19 21:10                                                                 ` Alan Rouse
     [not found]                                           ` <5A5E55DF96F73844AF7DFB0F48721F0F529A780365@EUSAACMS0703.eamcs.ericsson.se>
2010-02-18 14:12                                             ` Stephen Smalley
2010-02-18 14:45                                               ` Alan Rouse
2010-02-17 20:08                         ` Alan Rouse
2010-02-18 21:40                           ` Justin P. mattock
2010-02-18 21:53                             ` Alan Rouse
2010-02-18 23:17                               ` Justin P. mattock
2010-02-19 14:35                                 ` Stephen Smalley
2010-02-19 15:43                                   ` Justin P. mattock
2010-02-19 15:58                                 ` Alan Rouse
2010-02-19 16:26                                   ` Justin P. mattock
2010-02-19 14:28                             ` Stephen Smalley
2010-02-19 15:48                               ` Justin P. mattock
2010-02-19 18:46                               ` Justin P. mattock
2010-02-19 21:08                                 ` Alan Rouse
2010-02-19 21:19                                   ` Dominick Grift
2010-02-19 21:22                                   ` Justin P. mattock
2010-02-19 21:25                                   ` Stephen Smalley
2010-02-19 21:30                                     ` Alan Rouse
2010-02-19 21:37                                       ` Stephen Smalley
2010-02-19 21:53                                         ` Alan Rouse
2010-02-22 14:10                                           ` Stephen Smalley
     [not found]                                             ` <5A5E55DF96F73844AF7DFB0F48721F0F52E41FF16B@EUSAACMS0703.eamcs.ericsson.se>
     [not found]                                               ` <1266850844.15933.38.camel@moss-pluto.epoch.ncsc.mil>
2010-02-22 17:39                                                 ` Alan Rouse
2010-02-22 17:56                                                   ` Stephen Smalley
2010-02-22 19:12                                                     ` Alan Rouse
2010-02-22 19:37                                                       ` Stephen Smalley
2010-02-19 23:48                                         ` Justin P. mattock
2010-02-22  1:29                                         ` Justin P. mattock
2010-02-19 21:47                                     ` Justin P. mattock
2010-02-22 14:00                                       ` Stephen Smalley
2010-02-22 19:27                                         ` Justin Mattock
     [not found]                                           ` <dd18b0c31002221129s4be9b56cha13b7be39c2cba36@mail.gmail.com>
2010-02-22 19:57                                             ` Justin P. mattock
2010-02-22 20:24                                               ` Stephen Smalley
2010-02-22 21:25                                                 ` Justin Mattock
2010-02-22 21:42                                                   ` Stephen Smalley
2010-02-22 22:10                                                   ` Justin P. mattock
2010-02-22 22:35                                                     ` Justin Mattock
2010-02-23  6:17                                                       ` Justin P. mattock
2010-02-23 13:40                                                         ` Stephen Smalley
2010-02-23 14:13                                                           ` Justin P. mattock
2010-02-23 15:56                                                           ` Alan Rouse
2010-02-23 16:10                                                             ` Stephen Smalley
2010-02-23 17:41                                                               ` Justin P. mattock
2010-02-23 18:01                                                                 ` Stephen Smalley
2010-02-23 18:30                                                                   ` Justin P. mattock
2010-02-23 18:42                                                                     ` Stephen Smalley
2010-02-23 18:58                                                                       ` Justin P. mattock
2010-02-23 19:00                                                                         ` Stephen Smalley
2010-02-23 19:03                                                                           ` Justin Mattock
2010-02-23 20:37                                                                             ` Justin P. mattock
2010-02-22 17:58                                       ` Alan Rouse
2010-02-22 18:23                                         ` Justin P. mattock
2010-02-22 18:31                                           ` Alan Rouse
2010-02-22 18:49                                             ` Justin P. mattock
     [not found]                     ` <5A5E55DF96F73844AF7DFB0F48721F0F529A780232@EUSAACMS0703.eamcs.ericsson.se>
2010-02-17 19:58                       ` Stephen Smalley
2010-02-17 20:09                         ` Justin P. mattock
2010-02-17 20:21                           ` Stephen Smalley
2010-02-17 23:22                             ` Justin P. mattock
2010-02-18 15:17                               ` Alan Rouse
2010-02-18 18:33                                 ` Justin P. mattock
2010-02-18 18:44                                   ` Alan Rouse
2010-02-17 13:35         ` Stephen Smalley
2010-02-17 15:14           ` Alan Rouse
2010-02-17 15:33             ` Stephen Smalley

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.