Bug 1417671
Summary: | Confined users are unable to get AFS tokens | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Jonathan Billings <jsbillin> | |
Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> | |
Status: | CLOSED WONTFIX | QA Contact: | Milos Malik <mmalik> | |
Severity: | low | Docs Contact: | ||
Priority: | medium | |||
Version: | 7.3 | CC: | lvrabec, mgrepl, mmalik, plautrba, pvrabec, rharwood, riehecky, ssekidde, zpytela | |
Target Milestone: | rc | Keywords: | Reopened | |
Target Release: | --- | |||
Hardware: | x86_64 | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | If docs needed, set a value | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1710962 (view as bug list) | Environment: | ||
Last Closed: | 2019-03-14 12:30:00 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1393066 |
Description
Jonathan Billings
2017-01-30 15:53:25 UTC
I have to amend my custom module, I forgot to allow staff_sudo_t: Here is the updated module .te: policy_module(afsusers,1.0.1) gen_require(` type staff_t, user_t, staff_sudo_t; ') gen_require(` type proc_afs_t; ') read_files_pattern({ staff_t user_t}, proc_afs_t, proc_afs_t) afs_read_config(staff_t) afs_read_config(staff_sudo_t) afs_read_config(user_t) We're going to close this bug as WONTFIX because * of limited capacity of selinux-policy developers * the bug is related to EPEL component or 3rd party SW only * the bug appears in unsupported configuration We believe this bug can be fixed via a local policy module. For more information please see: * https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/selinux_users_and_administrators_guide/sect-security-enhanced_linux-troubleshooting-fixing_problems#sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow If you disagree, please re-open the bug. We're going to close this bug as WONTFIX because * of limited capacity of selinux-policy developers * the bug is related to EPEL component or 3rd party SW only * the bug appears in unsupported configuration We believe this bug can be fixed via a local policy module. For more information please see: * https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/selinux_users_and_administrators_guide/sect-security-enhanced_linux-troubleshooting-fixing_problems#sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow If you disagree, please re-open the bug. Re-opening as per out-of-band conversation with Lukas. Justification is that the AFS policy hooks are already present, so they should be be fixed. Thanks! Milos, What about staff_t, could staff_t access afs_config_t ? AFAIK, we should allow it for usersdomains. Thanks, Lukas. staff_t and user_t can access afs_config_t, but the reporter also mentions staff_sudo_t. See comment#1. This issue was not selected to be included in Red Hat Enterprise Linux 7.7 because it is seen either as low or moderate impact to a small number of use-cases. The next release will be in Maintenance Support 1 Phase, which means that qualified Critical and Important Security errata advisories (RHSAs) and Urgent Priority Bug Fix errata advisories (RHBAs) may be released as they become available. We will now close this issue, but if you believe that it qualifies for the Maintenance Support 1 Phase, please re-open; otherwise, we recommend moving the request to Red Hat Enterprise Linux 8 if applicable. |