| Summary: | AVCs while using xl2tpd | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Ruben Kerkhof <ruben> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 13 | CC: | dwalsh, mgrepl |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | selinux-policy-3.7.19-89.fc13 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-03-17 18:49:12 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
Looks like we need to add auth_domtrans_chk_passwd(pppd_t) Ruben,
if you create the following local policy
# cat mypol.te
policy_module(mypol,1.0)
require{
type pppd_t;
}
auth_domtrans_chk_passwd(pppd_t)
and then execute
# make -f /usr/share/selinux/devel/Makefile
# semodule -i mypol.pp
does it work?
Hi Miroslav,
Yes, this works great, thanks!
There are only 2 AVCs left now:
type=AVC msg=audit(1295885268.911:46236): avc: denied { write } for pid=12710 comm="pppd" name="wtmp" dev=vda1 ino=27047 scontext=system_u:system_r:pppd_t:s0 tcontext=system_u:o
bject_r:wtmp_t:s0 tclass=file
and
type=AVC msg=audit(1295885268.902:46234): avc: denied { setsched } for pid=12710 comm="pppd" scontext=system_u:system_r:pppd_t:s0 tcontext=system_u:system_r:pppd_t:s0 tclass=pro
cess
Fixed in selinux-policy-3.7.19-87.fc13 selinux-policy-3.7.19-89.fc13 has been submitted as an update for Fedora 13. https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-89.fc13 selinux-policy-3.7.19-89.fc13 has been pushed to the Fedora 13 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update selinux-policy'. You can provide feedback for this update here: https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-89.fc13 selinux-policy-3.7.19-89.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report. |
Description of problem: Opening a vpn connection results in the following AVCs: type=AVC msg=audit(1295797298.171:39383): avc: denied { execute } for pid=19532 comm="pppd" name="unix_chkpwd" dev=vd a1 ino=14436 scontext=system_u:system_r:pppd_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file type=AVC msg=audit(1295797298.171:39383): avc: denied { read open } for pid=19532 comm="pppd" name="unix_chkpwd" dev= vda1 ino=14436 scontext=system_u:system_r:pppd_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file type=AVC msg=audit(1295797298.171:39383): avc: denied { execute_no_trans } for pid=19532 comm="pppd" path="/sbin/unix _chkpwd" dev=vda1 ino=14436 scontext=system_u:system_r:pppd_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file I'm using xl2tpd and pam authentication.