Bug 1810403
Summary: | SELinux is preventing traceroute from 'node_bind' accesses on the icmp_socket labeled node_t. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | eike.wuelfers |
Component: | selinux-policy | Assignee: | Zdenek Pytela <zpytela> |
Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 31 | CC: | dwalsh, grepl.miroslav, jsynacek, lvrabec, mmalik, plautrba, sbroz, vmojzis, zpytela |
Target Milestone: | --- | Keywords: | Triaged |
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Unspecified | ||
Whiteboard: | abrt_hash:8a8fc087e447c22bc194b7c709bf3432ed03ad3af5c3ef308cdc0e5936e58efd; | ||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-22 09:45:34 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
eike.wuelfers
2020-03-05 07:36:02 UTC
Hi, Could you please share the reproducing steps or a use case to trigger an AVC like this? Which switches are used? Besides, what is the path to the traceroute binary? Please list: $ ls -lZ /usr/bin/traceroute Steps to repro: $ traceroute -I <any ip> bind: Permission denied $ ls -lZ $(which traceroute) -rwxr-xr-x. 1 root root system_u:object_r:traceroute_exec_t:s0 86984 2019-07-27 14:43 /usr/bin/traceroute* Are all policy modules enabled on your machine? # semodule -lfull | grep -i disa (In reply to Milos Malik from comment #3) > Are all policy modules enabled on your machine? > > # semodule -lfull | grep -i disa The output of `sudo semodule -lfull | grep -i disa` is empty on my machine. I'm not aware having modified anything there, though. Would the full output (without grep) help you? Checking with traceroute maintainer: Jan, is traceroute expected to work for a user with icmp datagrams? Unlike ping which is shipped with cap_net_admin,cap_net_raw+p, traceroute does not have the file capabilities. Traceroute works for a user with the default udp, as well as it works for root with any protocol. Similar problem has been detected: Using (as a non-root user): # traceroute -I <host> hashmarkername: setroubleshoot kernel: 5.5.8-200.fc31.x86_64 package: selinux-policy-3.14.4-49.fc31.noarch reason: SELinux is preventing traceroute from 'node_bind' accesses on the icmp_socket labeled node_t. type: libreport I manage to find the answer: The file capabilities will not be used for ping/traceroute as a result of changes in sysctl: https://bugzilla.redhat.com/show_bug.cgi?id=1740809 https://fedoraproject.org/wiki/Changes/EnableSysctlPingGroupRange and subsequently applied to ping, Rawhide/F33 only: https://bugzilla.redhat.com/show_bug.cgi?id=1699497 Closing as a duplicate of 1803759 to continue the discussion there. *** This bug has been marked as a duplicate of bug 1803759 *** |