Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Resolve toor_t denials #134

Open
3 tasks
mpalmi opened this issue Apr 24, 2015 · 2 comments
Open
3 tasks

Resolve toor_t denials #134

mpalmi opened this issue Apr 24, 2015 · 2 comments

Comments

@mpalmi
Copy link
Contributor

mpalmi commented Apr 24, 2015

In order to get this system booting in Enforcing, we will need to resolve the remaining kernel_t denials.

Assumptions:

  • Work will be done off of mpalmi/clip@95bafa0
  • Allow rules are needed to get CLIP booting in Enforcing
  • Least privilege access model will be employed
  • refpolicy guidelines for policy development will be followed.

Subtasks:

  • Ensure all files are properly labeled
  • Resolve power_unit_file denials
  • Determine whether or not toor_t should have other permissions and allow using least privilege

audit2allow

#============= toor_t ==============
allow toor_t power_unit_file_t:service start;

#=============staff_t ==============
allow staff_t toor_t:key create;
allow staff_t toor_t:process { siginh rlimitinh signal transition noatsecure };

audit.log

type=AVC msg=audit(1429889792.932:869): avc:  denied  { signal } for  pid=1291 comm="sudo" scontext=toor_u:staff_r:staff_t:s0 tcontext=toor_u:toor_r:toor_t:s0 tclass=process
type=USER_ROLE_CHANGE msg=audit(1429890038.964:606): pid=1267 uid=0 auid=1000 ses=1 subj=toor_u:staff_r:staff_t:s0 msg='newrole: old-context=toor_u:staff_r:staff_t:s0 new-context=toor_u:toor_r:toor_t:s0 exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/tty1 res=success'
type=AVC msg=audit(1429890038.966:608): avc:  denied  { create } for  pid=1267 comm="sudo" scontext=toor_u:staff_r:staff_t:s0 tcontext=toor_u:toor_r:toor_t:s0 tclass=key
type=AVC msg=audit(1429890038.966:609): avc:  denied  { transition } for  pid=1267 comm="sudoaudit_logs_20150424--114351/audit.log:957:type=AVC msg=audit(1429890038.966:609): avc:  denied  { rlimitinh } for  pid=1267 comm="sesh" scontext=toor_u:staff_r:staff_t:s0 tcontext=toor_u:toor_r:toor_t:s0 tclass=process
type=AVC msg=audit(1429890038.966:609): avc:  denied  { siginh } for  pid=1267 comm="sesh" scontext=toor_u:staff_r:staff_t:s0 tcontext=toor_u:toor_r:toor_t:s0 tclass=process
type=AVC msg=audit(1429890038.966:609): avc:  denied  { noatsecure } for  pid=1267 comm="sesh" scontext=toor_u:staff_r:staff_t:s0 tcontext=toor_u:toor_r:toor_t:s0 tclass=process
type=SYSCALL msg=audit(1429890038.966:609): arch=c000003e syscall=59 success=yes exit=0 a0=7f6eee72bbc0 a1=7f6ef02cf8e0 a2=7f6ef02cfb30 a3=65726379656b2f72 items=0 ppid=1263 pid=1267 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty1 ses=1 comm="sesh" exe="/usr/libexec/sesh" subj=toor_u:toor_r:toor_t:s0 key=(null)
type=USER_AVC msg=audit(1429890042.190:610): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc:  denied  { start } for auid=1000 uid=0 gid=0 path="/usr/lib/systemd/system/reboot.target" cmdline="shutdown -r now" scontext=toor_u:toor_r:toor_t:s0 tcontext=system_u:object_r:power_unit_file_t:s0 tclass=service  exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?'
type=AVC msg=audit(1429890042.198:614): avc:  denied  { signal } for  pid=1263 comm="sudo" scontext=toor_u:staff_r:staff_t:s0 tcontext=toor_u:toor_r:toor_t:s0 tclass=process
@mpalmi mpalmi added this to the RHEL_7-Alpha3 milestone Apr 24, 2015
@mpalmi mpalmi modified the milestones: RHEL_7-Beta, RHEL_7-Alpha3 Apr 29, 2015
@mpalmi mpalmi self-assigned this Jul 23, 2015
mpalmi added a commit to mpalmi/clip that referenced this issue Aug 5, 2015
mpalmi added a commit to mpalmi/clip that referenced this issue Aug 7, 2015
mpalmi added a commit to mpalmi/clip that referenced this issue Aug 7, 2015
@mpalmi mpalmi assigned ghost and unassigned mpalmi Aug 25, 2015
mpalmi added a commit to mpalmi/clip that referenced this issue Aug 28, 2015
mpalmi added a commit to mpalmi/clip that referenced this issue Sep 2, 2015
mpalmi added a commit to mpalmi/clip that referenced this issue Sep 2, 2015
@ghost ghost added Watch List and removed Code Review labels Sep 2, 2015
@ghost ghost added this to the RHEL_7_Final milestone Sep 2, 2015
@ghost ghost removed this from the RHEL_7-Beta milestone Sep 2, 2015
@ghost
Copy link

ghost commented Oct 6, 2015

@mpalmi can you please update this what else needs to be done before we can close out the issue?

@mpalmi
Copy link
Contributor Author

mpalmi commented Oct 7, 2015

I believe we just need to verify that auditd can be started/stopped/statused in Enforcing.

@minapoli minapoli assigned minapoli and unassigned ghost Jan 13, 2016
@minapoli minapoli modified the milestones: RHEL_7.1, RHEL_7_Final Jan 21, 2016
@minapoli minapoli modified the milestones: RHEL_7.2_Beta, RHEL_7.1 Feb 22, 2016
@minapoli minapoli modified the milestones: Future, RHEL_7.2 Apr 18, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants