Bug 1253706
Summary: | ipsilon-client-install fails due to AVC on IDP | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Scott Poore <spoore> |
Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.2 | CC: | lvrabec, mgrepl, mmalik, plautrba, pvrabec, spoore, ssekidde |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | selinux-policy-3.13.1-43.el7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-11-19 10:43:45 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Scott Poore
2015-08-14 13:30:18 UTC
What SELinux denials do you see when you run the scenario in permissive mode? # setenforce 0 # your scenario # ausearch -m avc -m user_avc -m selinux_err -i -ts recent The same as far as I can tell: time->Fri Aug 14 13:36:00 2015 type=SYSCALL msg=audit(1439577360.083:637): arch=c000003e syscall=4 success=yes exit=0 a0=7f7b6c63a390 a1=7f7b75558610 a2=7f7b75558610 a3=fffff000 items=0 ppid=25900 pid=25919 auid=4294967295 uid=995 gid=992 euid=995 suid=995 fsuid=995 egid=992 sgid=992 fsgid=992 tty=(none) ses=4294967295 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) type=AVC msg=audit(1439577360.083:637): avc: denied { read } for pid=25919 comm="httpd" name="ipsilon.conf" dev="dm-0" ino=9228359 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:httpd_var_lib_t:s0 tclass=lnk_file commit 521964ed995ce15b0a0c80c59858fb9e9d0ecd52 Author: Lukas Vrabec <lvrabec> Date: Tue Aug 18 09:53:26 2015 +0200 Allow httpd daemon to manage httpd_var_lib_t lnk_files. Resolves: #1253706 This appears to be fixed: Version :: selinux-policy-3.13.1-44.el7.noarch Results :: [root@idp ~]# getenforce Enforcing [root@client1 ~]# ipsilon-client-install --saml-idp-metadata https://idp.testrelm.test/idp/saml2/metadata --saml-auth /secure Generating a 2048 bit RSA private key ......................................................................................................................................................................+++ .....................................................+++ writing new private key to '/etc/httpd/saml2/client1.testrelm.test/certificate.key' ----- [root@client1 ~]# [root@idp ~]# ausearch -m avc <no matches> [root@client1 ~]# ausearch -m avc <no matches> Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2015-2300.html |