2019-03-21 18:29:30

by Sugar, David

[permalink] [raw]
Subject: [PATCH 1/1] Resolve denial about logging to journal from chkpwd

type=AVC msg=audit(1553029357.588:513): avc: denied { sendto } for pid=7577 comm="unix_chkpwd" path="/dev/log" scontext=toor_u:staff_r:chkpwd_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket permissive=0

Signed-off-by: Dave Sugar <[email protected]>
---
policy/modules/system/authlogin.te | 5 +++++
1 file changed, 5 insertions(+)

diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
index 2b7586a2..d0c71285 100644
--- a/policy/modules/system/authlogin.te
+++ b/policy/modules/system/authlogin.te
@@ -144,6 +144,11 @@ ifdef(`distro_ubuntu',`
')
')

+ifdef(`init_systemd',`
+ # for journald /dev/log
+ kernel_dgram_send(chkpwd_t)
+')
+
optional_policy(`
# apache leaks file descriptors
apache_dontaudit_rw_tcp_sockets(chkpwd_t)
--
2.20.1



2019-03-21 18:29:30

by Sugar, David

[permalink] [raw]
Subject: [PATCH 1/1] Resolve denial about logging to journal from dbus

type=AVC msg=audit(1553013821.597:9897): avc: denied { sendto } for pid=7377 comm="dbus-daemon" path="/dev/log" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket permissive=1

Signed-off-by: Dave Sugar <[email protected]>
---
policy/modules/services/dbus.te | 3 +++
1 file changed, 3 insertions(+)

diff --git a/policy/modules/services/dbus.te b/policy/modules/services/dbus.te
index 24d12c64..fd7e2436 100644
--- a/policy/modules/services/dbus.te
+++ b/policy/modules/services/dbus.te
@@ -162,6 +162,9 @@ ifdef(`init_systemd', `
# for /run/systemd/dynamic-uid/
init_list_pids(system_dbusd_t)
init_read_runtime_symlinks(system_dbusd_t)
+
+ # for journald /dev/log
+ kernel_dgram_send(system_dbusd_t)
')

optional_policy(`
--
2.20.1


2019-03-24 18:44:04

by Chris PeBenito

[permalink] [raw]
Subject: Re: [PATCH 1/1] Resolve denial about logging to journal from chkpwd

On 3/21/19 2:29 PM, Sugar, David wrote:
> type=AVC msg=audit(1553029357.588:513): avc: denied { sendto } for pid=7577 comm="unix_chkpwd" path="/dev/log" scontext=toor_u:staff_r:chkpwd_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket permissive=0
>
> Signed-off-by: Dave Sugar <[email protected]>
> ---
> policy/modules/system/authlogin.te | 5 +++++
> 1 file changed, 5 insertions(+)
>
> diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
> index 2b7586a2..d0c71285 100644
> --- a/policy/modules/system/authlogin.te
> +++ b/policy/modules/system/authlogin.te
> @@ -144,6 +144,11 @@ ifdef(`distro_ubuntu',`
> ')
> ')
>
> +ifdef(`init_systemd',`
> + # for journald /dev/log
> + kernel_dgram_send(chkpwd_t)
> +')
> +
> optional_policy(`
> # apache leaks file descriptors
> apache_dontaudit_rw_tcp_sockets(chkpwd_t)

Merged.

--
Chris PeBenito

2019-03-24 18:44:06

by Chris PeBenito

[permalink] [raw]
Subject: Re: [PATCH 1/1] Resolve denial about logging to journal from dbus

On 3/21/19 2:29 PM, Sugar, David wrote:
> type=AVC msg=audit(1553013821.597:9897): avc: denied { sendto } for pid=7377 comm="dbus-daemon" path="/dev/log" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket permissive=1
>
> Signed-off-by: Dave Sugar <[email protected]>
> ---
> policy/modules/services/dbus.te | 3 +++
> 1 file changed, 3 insertions(+)
>
> diff --git a/policy/modules/services/dbus.te b/policy/modules/services/dbus.te
> index 24d12c64..fd7e2436 100644
> --- a/policy/modules/services/dbus.te
> +++ b/policy/modules/services/dbus.te
> @@ -162,6 +162,9 @@ ifdef(`init_systemd', `
> # for /run/systemd/dynamic-uid/
> init_list_pids(system_dbusd_t)
> init_read_runtime_symlinks(system_dbusd_t)
> +
> + # for journald /dev/log
> + kernel_dgram_send(system_dbusd_t)
> ')
>
> optional_policy(`

Merged.

--
Chris PeBenito