Bug 842818

Summary: SELinux problem saslauthd cannot work with MECH=shadow
Product: Red Hat Enterprise Linux 6 Reporter: David Spurek <dspurek>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED ERRATA QA Contact: Milos Malik <mmalik>
Severity: high Docs Contact:
Priority: medium    
Version: 6.3CC: dwalsh, ebenes, mmalik
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.7.19-159.el6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-02-21 08:25:56 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description David Spurek 2012-07-24 16:13:36 UTC
Description of problem:

type=SYSCALL msg=audit(1343144349.886:25757): arch=c000003e syscall=2 success=no exit=-13 a0=7f09300996bb a1=80000 a2=1b6 a3=0 items=0 ppid=1 pid=12930 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="saslauthd" exe="/usr/sbin/saslauthd" subj=unconfined_u:system_r:saslauthd_t:s0 key=(null)
type=AVC msg=audit(1343144349.886:25757): avc:  denied  { dac_read_search } for  pid=12930 comm="saslauthd" capability=2  scontext=unconfined_u:system_r:saslauthd_t:s0 tcontext=unconfined_u:system_r:saslauthd_t:s0 tclass=capability
type=AVC msg=audit(1343144349.886:25757): avc:  denied  { dac_override } for  pid=12930 comm="saslauthd" capability=1  scontext=unconfined_u:system_r:saslauthd_t:s0 tcontext=unconfined_u:system_r:saslauthd_t:s0 tclass=capability

boolean allow_saslauthd_read_shadow set on:

getsebool -a | grep sasl
allow_saslauthd_read_shadow --> on

sesearch --all -C | grep allow_sasl
ERROR: Cannot get avrules: Neverallow rules requested but not available
DT allow saslauthd_t shadow_t : file { ioctl read getattr lock open } ; [ allow_saslauthd_read_shadow ]
DT allow saslauthd_t etc_t : dir { ioctl read getattr lock search open } ; [ allow_saslauthd_read_shadow ]


Version-Release number of selected component (if applicable):
selinux-policy-3.7.19-154.el6

How reproducible:
always

Steps to Reproduce:
1. run test /CoreOS/cyrus-sasl/Sanity/sanity-saslauthd-and-Cyrus-SASL-Plugins

Actual results:
testsaslauthd -u testuser -p redhat in first Test Phase FAIL
    0: NO "authentication failed"

Expected results:
testsaslauthd -u testuser -p redhat in first Test Phase PASS
    0: OK "Success."

Additional info:

Comment 1 Milos Malik 2012-07-24 16:35:09 UTC
Following AVCs were seen in permissive mode:
----
time->Tue Jul 24 18:32:01 2012
type=SYSCALL msg=audit(1343147521.798:21101): arch=40000003 syscall=156 success=yes exit=0 a0=46e7 a1=0 a2=bff305f4 a3=b7762740 items=0 ppid=1 pid=18151 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="saslauthd" exe="/usr/sbin/saslauthd" subj=unconfined_u:system_r:saslauthd_t:s0 key=(null)
type=AVC msg=audit(1343147521.798:21101): avc:  denied  { setsched } for  pid=18151 comm="saslauthd" scontext=unconfined_u:system_r:saslauthd_t:s0 tcontext=unconfined_u:system_r:saslauthd_t:s0 tclass=process
type=AVC msg=audit(1343147521.798:21101): avc:  denied  { sys_nice } for  pid=18151 comm="saslauthd" capability=23  scontext=unconfined_u:system_r:saslauthd_t:s0 tcontext=unconfined_u:system_r:saslauthd_t:s0 tclass=capability
----
time->Tue Jul 24 18:32:01 2012
type=SYSCALL msg=audit(1343147521.794:21100): arch=40000003 syscall=5 success=yes exit=8 a0=1e2f19 a1=80000 a2=1b6 a3=1e2eb5 items=0 ppid=1 pid=18151 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="saslauthd" exe="/usr/sbin/saslauthd" subj=unconfined_u:system_r:saslauthd_t:s0 key=(null)
type=AVC msg=audit(1343147521.794:21100): avc:  denied  { dac_override } for  pid=18151 comm="saslauthd" capability=1  scontext=unconfined_u:system_r:saslauthd_t:s0 tcontext=unconfined_u:system_r:saslauthd_t:s0 tclass=capability
----

Comment 2 Daniel Walsh 2012-07-24 17:16:48 UTC
Can you turn on full auditing so that we can see what path dac_override is complaining about?

Comment 3 Milos Malik 2012-07-25 07:07:03 UTC
----
time->Wed Jul 25 09:00:25 2012
type=SYSCALL msg=audit(1343199625.891:21839): arch=40000003 syscall=156 success=yes exit=0 a0=c2f a1=0 a2=bf980cd4 a3=b75df740 items=0 ppid=1 pid=3119 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="saslauthd" exe="/usr/sbin/saslauthd" subj=unconfined_u:system_r:saslauthd_t:s0 key=(null)
type=AVC msg=audit(1343199625.891:21839): avc:  denied  { setsched } for  pid=3119 comm="saslauthd" scontext=unconfined_u:system_r:saslauthd_t:s0 tcontext=unconfined_u:system_r:saslauthd_t:s0 tclass=process
type=AVC msg=audit(1343199625.891:21839): avc:  denied  { sys_nice } for  pid=3119 comm="saslauthd" capability=23  scontext=unconfined_u:system_r:saslauthd_t:s0 tcontext=unconfined_u:system_r:saslauthd_t:s0 tclass=capability
----
time->Wed Jul 25 09:00:25 2012
type=PATH msg=audit(1343199625.882:21838): item=0 name="/etc/shadow" inode=187619 dev=08:03 mode=0100000 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:shadow_t:s0
type=CWD msg=audit(1343199625.882:21838):  cwd="/var/run/saslauthd"
type=SYSCALL msg=audit(1343199625.882:21838): arch=40000003 syscall=5 success=yes exit=8 a0=4fcf19 a1=80000 a2=1b6 a3=4fceb5 items=1 ppid=1 pid=3119 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="saslauthd" exe="/usr/sbin/saslauthd" subj=unconfined_u:system_r:saslauthd_t:s0 key=(null)
type=AVC msg=audit(1343199625.882:21838): avc:  denied  { dac_override } for  pid=3119 comm="saslauthd" capability=1  scontext=unconfined_u:system_r:saslauthd_t:s0 tcontext=unconfined_u:system_r:saslauthd_t:s0 tclass=capability
----

Comment 5 Miroslav Grepl 2012-08-07 23:45:49 UTC
Fixed in selinux-policy-3.7.19-159.el6

Comment 8 errata-xmlrpc 2013-02-21 08:25:56 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2013-0314.html