Bug 162239
Summary: | cups/pam/audit/selinux problem | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Tim Waugh <twaugh> | ||||||
Component: | cups | Assignee: | Tim Waugh <twaugh> | ||||||
Status: | CLOSED RAWHIDE | QA Contact: | |||||||
Severity: | medium | Docs Contact: | |||||||
Priority: | medium | ||||||||
Version: | rawhide | CC: | dwalsh, sgrubb | ||||||
Target Milestone: | --- | ||||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2005-07-25 11:29:51 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | |||||||||
Bug Blocks: | 150221 | ||||||||
Attachments: |
|
Description
Tim Waugh
2005-07-01 11:35:56 UTC
Created attachment 116236 [details]
http-request.sh
Created attachment 116237 [details]
test.sh
There are no audit.log messages during the test. With 'setenforce 0', the error message changes to this: E [01/Jul/2005:12:38:29 +0100] IsAuthorized: pam_authenticate() returned 7 (Authentication failure)! which is expected. So SELinux is involved with this somehow. Indeed, with 'setenforce 0', there *are* audit.log messages: type=AVC msg=audit(1120218062.686:9886587): avc: denied { create } for pid=28128 comm="cupsd" scontext=root:system_r:cupsd_t tcontext=root:system_r:cupsd_t tclass=netlink_route_socket type=SYSCALL msg=audit(1120218062.686:9886587): arch=40000003 syscall=102 success=yes exit=6 a0=1 a1=bfcb24bc a2=343ff4 a3=bfcb2578 items=0 pid=28128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 comm="cupsd" exe="/usr/sbin/cupsd" type=SOCKETCALL msg=audit(1120218062.686:9886587): nargs=3 a0=10 a1=3 a2=0 type=AVC msg=audit(1120218062.688:9886622): avc: denied { bind } for pid=28128 comm="cupsd" scontext=root:system_r:cupsd_t tcontext=root:system_r:cupsd_t tclass=netlink_route_socket type=SYSCALL msg=audit(1120218062.688:9886622): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfcb24bc a2=343ff4 a3=bfcb2578 items=0 pid=28128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 comm="cupsd" exe="/usr/sbin/cupsd" type=SOCKADDR msg=audit(1120218062.688:9886622): saddr=100000000000000000000000 type=SOCKETCALL msg=audit(1120218062.688:9886622): nargs=3 a0=6 a1=bfcb24c8 a2=ctype=AVC msg=audit(1120218062.689:9886623): avc: denied { getattr } for pid=28128 comm="cupsd" scontext=root:system_r:cupsd_t tcontext=root:system_r:cupsd_t tclass=netlink_route_socket type=SYSCALL msg=audit(1120218062.689:9886623): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=bfcb24bc a2=343ff4 a3=bfcb2578 items=0 pid=28128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 comm="cupsd" exe="/usr/sbin/cupsd" type=SOCKETCALL msg=audit(1120218062.689:9886623): nargs=3 a0=6 a1=bfcb24c8 a2=bfcb24d4 type=AVC msg=audit(1120218062.689:9886625): avc: denied { write } for pid=28128 comm="cupsd" scontext=root:system_r:cupsd_t tcontext=root:system_r:cupsd_t tclass=netlink_route_socket type=AVC msg=audit(1120218062.689:9886625): avc: denied { nlmsg_read } for pid=28128 comm="cupsd" scontext=root:system_r:cupsd_t tcontext=root:system_r:cupsd_t tclass=netlink_route_socket type=SYSCALL msg=audit(1120218062.689:9886625): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=bfcb2440 a2=343ff4 a3=ffffffe0 items=0 pid=28128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 comm="cupsd" exe="/usr/sbin/cupsd" type=SOCKADDR msg=audit(1120218062.689:9886625): saddr=100000000000000000000000 type=SOCKETCALL msg=audit(1120218062.689:9886625): nargs=6 a0=6 a1=bfcb24a4 a2=14 a3=0 a4=bfcb24b8 a5=c type=AVC msg=audit(1120218062.690:9886626): avc: denied { read } for pid=28128 comm="cupsd" scontext=root:system_r:cupsd_t tcontext=root:system_r:cupsd_t tclass=netlink_route_socket type=SYSCALL msg=audit(1120218062.690:9886626): arch=40000003 syscall=102 success=yes exit=688 a0=11 a1=bfcb1430 a2=343ff4 a3=0 items=0 pid=28128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 comm="cupsd" exe="/usr/sbin/cupsd" type=SOCKETCALL msg=audit(1120218062.690:9886626): nargs=3 a0=6 a1=bfcb2488 a2=0 What do these messages mean? These are easier to understand if you use ausearch -i to look at the logs. The man page for ausearch is pretty good. The first SYSCALL is creating a netlink socket, the second is a bind call to bind to routing netlink family, the third is getsockname, the last is a sendto. But these are all for writing an audit log, aren't they? The policy already has this: allow cupsd_t self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay }; This is a routing socket. In the first SOCKETCALL, all the args to socket are captured. This means: socket(PF_NETLINK, SOCK_RAW, NETLINK_ROUTE); I don't know if this is in the policy. Well, this isn't anything that CUPS is doing, but pam. So what do I need to put in the cups.te file? Is there a macro for 'allow _pam_auditlog to work'? If I had to guess, I'd say this is originating in glibc or another library. pam shouldn't be doing anything with the routing table. Still looking... Fixed in selinux-policy-targeted-1.25.1-7 Confirmed. |