2019-02-20 16:37:51

by Sugar, David

[permalink] [raw]
Subject: [PATCH v2] Add interface to get status of rsyslog service

Updated based on feedback.

Signed-off-by: Dave Sugar <[email protected]>
---
policy/modules/system/logging.if | 19 +++++++++++++++++++
1 file changed, 19 insertions(+)

diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if
index 16091eb6..c86c4bd9 100644
--- a/policy/modules/system/logging.if
+++ b/policy/modules/system/logging.if
@@ -427,6 +427,25 @@ interface(`logging_domtrans_syslog',`
')
')

+########################################
+## <summary>
+## Allow specified domain to check status of syslog unit
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`logging_status_syslog',`
+ gen_require(`
+ type syslogd_unit_t;
+ class service status;
+ ')
+
+ allow $1 syslogd_unit_t:service status;
+')
+
########################################
## <summary>
## Set the attributes of syslog temporary files.
--
2.20.1



2019-02-20 16:37:50

by Sugar, David

[permalink] [raw]
Subject: [PATCH v2] New interface to dontaudit access to cert_t

I'm seeing a bunch of denials for various processes (some refpolicy
domains, some my own application domains) attempting to access
/etc/pki. They seem to be working OK even with the denial. The
tunable authlogin_nsswitch_use_ldap controls access to cert_t
(for domains that are part of nsswitch_domain attribute). Use this
new interface when that tunable is off to quiet the denials.

Signed-off-by: Dave Sugar <[email protected]>
---
policy/modules/system/authlogin.te | 2 ++
policy/modules/system/miscfiles.if | 21 +++++++++++++++++++++
2 files changed, 23 insertions(+)

diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
index 345e07f3..a98054c5 100644
--- a/policy/modules/system/authlogin.te
+++ b/policy/modules/system/authlogin.te
@@ -431,6 +431,8 @@ sysnet_dns_name_resolve(nsswitch_domain)
tunable_policy(`authlogin_nsswitch_use_ldap',`
miscfiles_read_generic_certs(nsswitch_domain)
sysnet_use_ldap(nsswitch_domain)
+',`
+ miscfiles_dontaudit_read_generic_certs(nsswitch_domain)
')

optional_policy(`
diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if
index 93c1f9c1..df11794a 100644
--- a/policy/modules/system/miscfiles.if
+++ b/policy/modules/system/miscfiles.if
@@ -131,6 +131,27 @@ interface(`miscfiles_read_generic_certs',`
read_lnk_files_pattern($1, cert_t, cert_t)
')

+########################################
+## <summary>
+## Do not audit attempts to read generic SSL/TLS certificates.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <rolecap/>
+#
+interface(`miscfiles_dontaudit_read_generic_certs',`
+ gen_require(`
+ type cert_t;
+ ')
+
+ dontaudit $1 cert_t:dir list_dir_perms;
+ dontaudit $1 cert_t:file read_file_perms;
+ dontaudit $1 cert_t:lnk_file read_lnk_file_perms;
+')
+
########################################
## <summary>
## Manage generic SSL/TLS certificates.
--
2.20.1


2019-02-21 03:40:50

by Chris PeBenito

[permalink] [raw]
Subject: Re: [PATCH v2] New interface to dontaudit access to cert_t

On Wed, 2019-02-20 at 16:37 +0000, Sugar, David wrote:
> I'm seeing a bunch of denials for various processes (some refpolicy
> domains, some my own application domains) attempting to access
> /etc/pki. They seem to be working OK even with the denial. The
> tunable authlogin_nsswitch_use_ldap controls access to cert_t
> (for domains that are part of nsswitch_domain attribute). Use this
> new interface when that tunable is off to quiet the denials.
>
> Signed-off-by: Dave Sugar <[email protected]>
> ---
> policy/modules/system/authlogin.te | 2 ++
> policy/modules/system/miscfiles.if | 21 +++++++++++++++++++++
> 2 files changed, 23 insertions(+)
>
> diff --git a/policy/modules/system/authlogin.te
> b/policy/modules/system/authlogin.te
> index 345e07f3..a98054c5 100644
> --- a/policy/modules/system/authlogin.te
> +++ b/policy/modules/system/authlogin.te
> @@ -431,6 +431,8 @@ sysnet_dns_name_resolve(nsswitch_domain)
> tunable_policy(`authlogin_nsswitch_use_ldap',`
> miscfiles_read_generic_certs(nsswitch_domain)
> sysnet_use_ldap(nsswitch_domain)
> +',`
> + miscfiles_dontaudit_read_generic_certs(nsswitch_domain)
> ')
>
> optional_policy(`
> diff --git a/policy/modules/system/miscfiles.if
> b/policy/modules/system/miscfiles.if
> index 93c1f9c1..df11794a 100644
> --- a/policy/modules/system/miscfiles.if
> +++ b/policy/modules/system/miscfiles.if
> @@ -131,6 +131,27 @@ interface(`miscfiles_read_generic_certs',`
> read_lnk_files_pattern($1, cert_t, cert_t)
> ')
>
> +########################################
> +## <summary>
> +## Do not audit attempts to read generic SSL/TLS certificates.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain to not audit.
> +## </summary>
> +## </param>
> +## <rolecap/>
> +#
> +interface(`miscfiles_dontaudit_read_generic_certs',`
> + gen_require(`
> + type cert_t;
> + ')
> +
> + dontaudit $1 cert_t:dir list_dir_perms;
> + dontaudit $1 cert_t:file read_file_perms;
> + dontaudit $1 cert_t:lnk_file read_lnk_file_perms;
> +')
> +
> ########################################
> ## <summary>
> ## Manage generic SSL/TLS certificates.

Merged.

--
Chris PeBenito



2019-02-21 03:40:54

by Chris PeBenito

[permalink] [raw]
Subject: Re: [PATCH v2] Add interface to get status of rsyslog service

On Wed, 2019-02-20 at 16:37 +0000, Sugar, David wrote:
> Updated based on feedback.
>
> Signed-off-by: Dave Sugar <[email protected]>
> ---
> policy/modules/system/logging.if | 19 +++++++++++++++++++
> 1 file changed, 19 insertions(+)
>
> diff --git a/policy/modules/system/logging.if
> b/policy/modules/system/logging.if
> index 16091eb6..c86c4bd9 100644
> --- a/policy/modules/system/logging.if
> +++ b/policy/modules/system/logging.if
> @@ -427,6 +427,25 @@ interface(`logging_domtrans_syslog',`
> ')
> ')
>
> +########################################
> +## <summary>
> +## Allow specified domain to check status of syslog unit
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +#
> +interface(`logging_status_syslog',`
> + gen_require(`
> + type syslogd_unit_t;
> + class service status;
> + ')
> +
> + allow $1 syslogd_unit_t:service status;
> +')
> +
> ########################################
> ## <summary>
> ## Set the attributes of syslog temporary files.

Merged.

--
Chris PeBenito