Fwd: Re: http AVC

Tony Molloy tony.molloy at ul.ie
Thu Dec 2 17:36:36 UTC 2010


----------  Forwarded Message  ----------

Subject: Re: http AVC
Date: Thursday 02 December 2010, 17:21:25
From: Daniel J Walsh <dwalsh at redhat.com>
To: Tony Molloy <tony.molloy at ul.ie>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/02/2010 12:15 PM, Tony Molloy wrote:
> On Thursday 02 December 2010 15:04:24 you wrote:
>> On 12/02/2010 09:35 AM, Tony Molloy wrote:
>>> Hi,
>>>
>>> I'm running http on a fully updated Centos 5 system.
>>>
>>> httpd-2.2.3-43.el5.centos.3.x86_64
>>> selinux-policy-2.4.6-279.el5_5.2.noarch
>>> selinux-policy-targeted-2.4.6-279.el5_5.2.noarch
>>>
>>>
>>> I'm trying to run a cgi script from a user directory.
>>>
>>> With SELinux enabled I get the following error.
>>>
>>> [Thu Dec 02 12:10:11 2010] [error] [client 193.1.104.8]
>>>
>>>    (13)Permission denied: exec of '/usr/sbin/suexec' failed
>>>
>>> [Thu Dec 02 12:10:11 2010] [error] [client 193.1.104.8]
>>>
>>>    Premature end of script headers: survey.cgi
>>>
>>> With SELinux in permissive mode I get the following AVC
>>>
>>> Summary:
>>>
>>> SELinux prevented httpd executing access to http files.
>>>
>>> Detailed Description:
>>>
>>> [SELinux is in permissive mode, the operation would have been denied but
>>> was permitted due to permissive mode.]
>>>
>>> SELinux prevented httpd executing access to http files. Ordinarily httpd
>>> is allowed full access to all files labeled with http file context. This
>>> machine has a tightened security policy with the httpd_unified turned
>>> off, this requires
>>> explicit labeling of all files. If a file is a cgi script it needs to be
>>> labeled
>>> with httpd_TYPE_script_exec_t in order to be executed. If it is read-only
>>> content, it needs to be labeled httpd_TYPE_content_t, it is writable
>>> content. it
>>> needs to be labeled httpd_TYPE_script_rw_t or httpd_TYPE_script_ra_t. You
>>> can use the chcon command to change these contexts. Please refer to the
>>> man page "man httpd_selinux" or FAQ
>>> (http://fedora.redhat.com/docs/selinux-apache-fc3) "TYPE" refers to one
>>> of "sys", "user" or "staff" or potentially other script types.
>>>
>>> Allowing Access:
>>>
>>> Changing the "httpd_unified" boolean to true will allow this access:
>>> "setsebool -P httpd_unified=1"
>>>
>>> The following command will allow this access:
>>>
>>> setsebool -P httpd_unified=1
> 
>>> Raw Audit Messages
>>>
>>> host=a.b.c.d type=AVC msg=audit(1291296812.604:97588): avc:  denied  {
>>> execute_no_trans } for  pid=5567 comm="httpd" path="/usr/sbin/suexec"
>>> dev=sda2 ino=1791541 scontext=system_u:system_r:httpd_t:s0
>>> tcontext=system_u:object_r:httpd_suexec_exec_t:s0 tclass=file
>>>
>>> host=a.b.c.d type=SYSCALL msg=audit(1291296812.604:97588): arch=c000003e
>>> syscall=59 success=yes exit=0 a0=2abacad53449 a1=2abae3768e90
>>> a2=2abae37684d8 a3=0 items=0 ppid=789 pid=5567 auid=4294967295 uid=48
>>> gid=48 euid=0 suid=0 fsuid=0 egid=48 sgid=48 fsgid=48 tty=(none)
>>> ses=4294967295 comm="suexec" exe="/usr/sbin/suexec"
>>> subj=system_u:system_r:httpd_t:s0 key=(null)
>>>
>>>
>>> So it suggests "setsebool -P httpd_unified=1" will allow this access.
>>>
>>> However getsebool -a | grep http gives
>>> httpd_unified --> on
>>>
>>> So it is allready on.
>>>
>>>
>>> Thanks,
>>>
>>> Tony
>>
>> Do you have httpd_suexec_disable_trans turned on?
> 
> 
> Yep
> 
> getsebool -a | grep http
> 
> httpd_suexec_disable_trans --> on
> httpd_enable_cgi --> on
> 
> 
> Tony
> 
> 
> >

>Turn the httpd_suexec_disable_trans off

>setsebool -P httpd_suexec_disable_trans 0

>ANd I bet it will work

OK I'll try that, but I won't be able to test it until tomorrow morning.
I'll let you know what happens.

Thanks,

Tony



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkz31ZUACgkQrlYvE4MpobPhRQCeNTeiAI98Szsc1dVmFpP0SynC
RkMAnRlIiPwYqUYzhdbtGv5Hav8N+Ngk
=x3GH
-----END PGP SIGNATURE-----


-----------------------------------------
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.fedoraproject.org/pipermail/selinux/attachments/20101202/9aab1edd/attachment-0001.html 


More information about the selinux mailing list