Frank Murphy wrote:
Basically this is F9 on a USB-Stick, installed as "install to
hd"
upgraded full to newkey status.
restorecon -v '/var/lib/dhclient/dhclient-eth0.leases' -:- No change to avc(s)
Summary:
SELinux is preventing consoletype (consoletype_t) "read" to
/var/lib/dhclient/dhclient-eth0.leases (dhcpc_state_t).
Detailed Description:
SELinux denied access requested by consoletype. It is not expected that this
access is required by consoletype and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.
Allowing Access:
Sometimes labeling problems can cause SELinux denials. You could try to restore
the default system file context for /var/lib/dhclient/dhclient-eth0.leases,
restorecon -v '/var/lib/dhclient/dhclient-eth0.leases'
If this does not work, there is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see FAQ
(
http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (
http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.
Additional Information:
Source Context unconfined_u:system_r:consoletype_t:s0
Target Context unconfined_u:object_r:dhcpc_state_t:s0
Target Objects /var/lib/dhclient/dhclient-eth0.leases [ file ]
Source consoletype
Source Path /sbin/consoletype
Port <Unknown>
Host usbstick-01
Source RPM Packages initscripts-8.76-1
Target RPM Packages
Policy RPM selinux-policy-3.3.1-42.fc9
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name catchall_file
Host Name usbstick-01
Platform Linux usbstick-01 2.6.25-14.fc9.i686 #1 SMP Thu
May 1 06:28:41 EDT 2008 i686 i686
Alert Count 3
First Seen Sat 13 Sep 2008 17:54:44 IST
Last Seen Sun 14 Sep 2008 10:48:26 IST
Local ID d216653d-c0e7-4df0-81bd-c9ee3c1d542b
Line Numbers
Raw Audit Messages
host=usbstick-01 type=AVC msg=audit(1221385706.55:48): avc: denied {
read } for pid=4706 comm="consoletype"
path="/var/lib/dhclient/dhclient-eth0.leases" dev=dm-0 ino=47658
scontext=unconfined_u:system_r:consoletype_t:s0
tcontext=unconfined_u:object_r:dhcpc_state_t:s0 tclass=file
host=usbstick-01 type=SYSCALL msg=audit(1221385706.55:48):
arch=40000003 syscall=11 success=yes exit=0 a0=844fcb8 a1=844f738
a2=844f958 a3=0 items=0 ppid=4705 pid=4706 auid=500 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm="consoletype"
exe="/sbin/consoletype" subj=unconfined_u:system_r:consoletype_t:s0
key=(null)
Summary:
SELinux is preventing ifconfig (ifconfig_t) "read" to
/var/lib/dhclient/dhclient-eth0.leases (dhcpc_state_t).
Detailed Description:
SELinux denied access requested by ifconfig. It is not expected that this access
is required by ifconfig and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.
Allowing Access:
Sometimes labeling problems can cause SELinux denials. You could try to restore
the default system file context for /var/lib/dhclient/dhclient-eth0.leases,
restorecon -v '/var/lib/dhclient/dhclient-eth0.leases'
If this does not work, there is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see FAQ
(
http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (
http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.
Additional Information:
Source Context unconfined_u:system_r:ifconfig_t:s0
Target Context unconfined_u:object_r:dhcpc_state_t:s0
Target Objects /var/lib/dhclient/dhclient-eth0.leases [ file ]
Source ifconfig
Source Path /sbin/ifconfig
Port <Unknown>
Host usbstick-01
Source RPM Packages net-tools-1.60-87.fc9
Target RPM Packages
Policy RPM selinux-policy-3.3.1-42.fc9
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name catchall_file
Host Name usbstick-01
Platform Linux usbstick-01 2.6.25-14.fc9.i686 #1 SMP Thu
May 1 06:28:41 EDT 2008 i686 i686
Alert Count 4
First Seen Sat 13 Sep 2008 17:54:44 IST
Last Seen Sun 14 Sep 2008 10:48:26 IST
Local ID c7b6f250-55d9-4401-97db-6503d3d2db46
Line Numbers
Raw Audit Messages
host=usbstick-01 type=AVC msg=audit(1221385706.103:49): avc: denied
{ read } for pid=4726 comm="ifconfig"
path="/var/lib/dhclient/dhclient-eth0.leases" dev=dm-0 ino=47658
scontext=unconfined_u:system_r:ifconfig_t:s0
tcontext=unconfined_u:object_r:dhcpc_state_t:s0 tclass=file
host=usbstick-01 type=SYSCALL msg=audit(1221385706.103:49):
arch=40000003 syscall=11 success=yes exit=0 a0=8490b40 a1=8490960
a2=8477018 a3=0 items=0 ppid=4704 pid=4726 auid=500 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm="ifconfig"
exe="/sbin/ifconfig" subj=unconfined_u:system_r:ifconfig_t:s0
key=(null)
audit2allow -M lease < /var/lib/dhclient/dhclient-eth0.leases
compilation failed:
lease.te:6:ERROR 'syntax error' at token '' on line 6:
This should have been audit2allow -M lease < /var/log/audit/audit.log
/usr/bin/checkmodule: error(s) encountered while parsing configuration
/usr/bin/checkmodule: loading policy configuration from lease.te
[root@usbstick-01 ~]# audit2allow -M local <
'/var/lib/dhclient/dhclient-eth0.leases'
compilation failed:
local.te:6:ERROR 'syntax error' at token '' on line 6:
/usr/bin/checkmodule: error(s) encountered while parsing configuration
/usr/bin/checkmodule: loading policy configuration from local.te
Frank
If you take a look at what these AVC's are saying, you should realize
they make no sense. The AVC's are reporting that consoletype and
application for looking at the current terminal wants to read a file
created by dhclient? Not likely. When I see a avc like this that makes
no sense, my mind instantly thinks leaked file descriptors. When you
see the second avc saying ifconfig_t also wants to read the same file, I
have a pretty good idea this is a leak.
SELinux is just reporting that the dhclient program passed an open file
descriptor that confined domains that it is execing do not have access
to. SELinux is closing the file descriptors and consoletype and
ifconfig are working fine, but SELinux complains about the descriptors.
The dhclient program should get a bugzilla telling them to close the
desctiptors on exec.
fcntl(fd, F_SETFD, FD_CLOEXEC);
This would eliminate a potential security hole and get SELinux to be
quiet.