Bug 1343929
| Summary: | [SELinux]: kerberos mount fails with selinux denials in audit logs. | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Prasanth <pprakash> | |
| Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> | |
| Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> | |
| Severity: | urgent | Docs Contact: | Marie Hornickova <mdolezel> | |
| Priority: | high | |||
| Version: | 7.2 | CC: | lvrabec, mdolezel, mgrepl, mmalik, plautrba, pprakash, pvrabec, rcyriac, snagar, sraj, ssekidde | |
| Target Milestone: | rc | Keywords: | ZStream | |
| Target Release: | --- | |||
| Hardware: | x86_64 | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | selinux-policy-3.13.1-78.el7 | Doc Type: | If docs needed, set a value | |
| Doc Text: |
When the nfs-ganesha server was set up with a volume, and an attempt to mount this volume on a client within the Kerberos network was made, SELinux denied this Kerberos mount. This update ensures that the Gluster SELinux domain can read the Kerberos keytab files. As a result, the Kerberos mount is successful in the described scenario.
|
Story Points: | --- | |
| Clone Of: | 1343925 | |||
| : | 1344630 (view as bug list) | Environment: | ||
| Last Closed: | 2016-11-04 02:30:57 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1344630 | |||
|
Description
Prasanth
2016-06-08 10:47:06 UTC
Without the workaround: [root@dhcp42-142 ~]# rpm -qa|grep selinux selinux-policy-targeted-3.13.1-60.el7_2.6.noarch selinux-policy-3.13.1-60.el7_2.6.noarch [root@dhcp42-142 ~]# getenforce Enforcing [root@dhcp42-130 ~]# mount -t nfs -o sec=krb5 dhcp42-142.lab.eng.blr.redhat.com:/testvolume /mnt mount.nfs: access denied by server while mounting dhcp42-142.lab.eng.blr.redhat.com:/testvolume [root@dhcp42-130 ~]# mount -t nfs -o sec=krb5i dhcp42-142.lab.eng.blr.redhat.com:/testvolume /mnt mount.nfs: access denied by server while mounting dhcp42-142.lab.eng.blr.redhat.com:/testvolume [root@dhcp42-130 ~]# mount -t nfs -o sec=krb5p dhcp42-142.lab.eng.blr.redhat.com:/testvolume /mnt mount.nfs: access denied by server while mounting dhcp42-142.lab.eng.blr.redhat.com:/testvolume With the workaround: In enforcing mode: mount is successful and no AVC's are seen [root@dhcp42-130 ~]# mount -t nfs -o sec=krb5 dhcp42-142.lab.eng.blr.redhat.com:/testvolume /mnt [root@dhcp42-130 ~]# mount -t nfs -o sec=krb5i dhcp42-142.lab.eng.blr.redhat.com:/testvolume /mnt [root@dhcp42-130 ~]# mount -t nfs -o sec=krb5p dhcp42-142.lab.eng.blr.redhat.com:/testvolume /mnt In permissive mode: Mount is successful and no AVC's are seen [root@dhcp42-130 ~]# mount -t nfs -o sec=krb5 dhcp42-142.lab.eng.blr.redhat.com:/testvolume /mnt [root@dhcp42-130 ~]# mount -t nfs -o sec=krb5i dhcp42-142.lab.eng.blr.redhat.com:/testvolume /mnt [root@dhcp42-130 ~]# mount -t nfs -o sec=krb5p dhcp42-142.lab.eng.blr.redhat.com:/testvolume /mnt So the above workaround mentioned in comment 2 works fine; kerberos mount is successful and no AVC's are seen in audit.log Thank you for testing. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-2283.html |