Bug 811361
Summary: | svnserve runs as initrc_t | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Milos Malik <mmalik> | ||||
Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> | ||||
Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 6.3 | CC: | dwalsh, mtruneck | ||||
Target Milestone: | rc | ||||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | selinux-policy-3.7.19-160.el6 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | |||||||
: | 870601 (view as bug list) | Environment: | |||||
Last Closed: | 2013-02-21 08:35:16 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 832330, 870601 | ||||||
Attachments: |
|
Description
Milos Malik
2012-04-10 19:43:42 UTC
The daemon is not confined by SELinux. Please help SELinux folks to create a suitable policy module. You know that we should minimize the number of programs running as initrc_t, don't you? I hadn't realised this daemon had no policy coverage already - it's been in RHEL since RHEL5 at least. It is an awkward daemon since it requires an SVN repository to access, but there is no "natural" place for such... other than /srv. Here are constraints I can think of: - svnserve will bind/listen/accept connections on TCP port 3690 - svnserve will need full fs read/write/list (etc) access to any SVN repos on the system, maybe a special label needed? - the daemon will write a pidfile at /var/run/svnserve.pid - svnserve can be invoked on command-line (e.g. via ssh) by non-privileged users, in a similar way to some IMAP servers, so that mode needs to continue working - the svnserve daemon can be configured to use SASL; is there a standard way to handle that permissions required there? Is that sufficient to craft a policy? So how do we progress this? Can you add policy to selinux-policy for the daemon? Is the information in comment 2 sufficient? Joe we will be adding policies for this in the next couple of weeks. Created attachment 587212 [details]
svnserve test policy
The svnserve test policy. Could you test it using
# semodule -i svnserve.pp
# restorecon -R -v /usr/bin/svnserve /var/run/svnserve*
Then just test it and execute
# ausearch -m avc -ts recent
Thank you. I added this policy to Fedora.
This request was not resolved in time for the current release. Red Hat invites you to ask your support representative to propose this request, if still desired, for consideration in the next release of Red Hat Enterprise Linux. This request was erroneously removed from consideration in Red Hat Enterprise Linux 6.4, which is currently under development. This request will be evaluated for inclusion in Red Hat Enterprise Linux 6.4. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-0314.html |