Bug 1004279 - kshd runs as init_t when kshell.socket is active
kshd runs as init_t when kshell.socket is active
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: selinux-policy (Show other bugs)
All Linux
medium Severity medium
: rc
: ---
Assigned To: Miroslav Grepl
Milos Malik
Depends On:
Blocks: 1004161
  Show dependency treegraph
Reported: 2013-09-04 06:26 EDT by Milos Malik
Modified: 2014-06-17 22:25 EDT (History)
3 users (show)

See Also:
Fixed In Version: selinux-policy-3.12.1-76.el7
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2014-06-13 08:50:53 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Milos Malik 2013-09-04 06:26:53 EDT
Description of problem:

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
# systemctl enable kshell.socket
ln -s '/usr/lib/systemd/system/kshell.socket' '/etc/systemd/system/sockets.target.wants/kshell.socket'
# systemctl start kshell.socket
# systemctl status kshell.socket
kshell.socket - Kerberos-aware Rshell Server Activation Socket
   Loaded: loaded (/usr/lib/systemd/system/kshell.socket; enabled)
   Active: active (listening) since Wed 2013-09-04 12:22:40 CEST; 11s ago
   Listen: [::]:544 (Stream)
 Accepted: 0; Connected: 0

Sep 04 12:22:40 rhel70 systemd[1]: Starting Kerberos-aware Rshell Server Ac...t.
Sep 04 12:22:40 rhel70 systemd[1]: Listening on Kerberos-aware Rshell Serve...t.
# nc -v 544
Ncat: Version 6.40 ( http://nmap.org/ncat )
Ncat: Connected to
[1]+  Stopped                 nc -v 544
# ps -efZ | grep kshd
system_u:system_r:init_t:s0     root     22014     1  0 12:23 ?        00:00:00 /usr/kerberos/sbin/kshd
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 root 22016 24725  0 12:23 pts/0 00:00:00 grep --color=auto kshd
# fg
nc -v 544

Actual results:
 * kshd process is not labelled correctly

Expected results:
 * kshd process is labelled correctly
Comment 1 Milos Malik 2013-09-04 07:48:58 EDT
This bug talks about the kerberized version of rshell server.

# matchpathcon /usr/kerberos/sbin/kshd 
/usr/kerberos/sbin/kshd	system_u:object_r:rshd_exec_t:s0
# rpm -qf /usr/kerberos/sbin/kshd 

I believe that the fix will also solve the same problem of the original rshell server, because the files are labelled similarly.

# matchpathcon /usr/sbin/in.rshd 
/usr/sbin/in.rshd	system_u:object_r:rshd_exec_t:s0
# rpm -qf /usr/sbin/in.rshd 
Comment 2 Daniel Walsh 2013-09-04 08:53:44 EDT
All of these bugs look related, and we need to make sure there is not a labelling issue.
Comment 3 Milos Malik 2013-09-04 08:55:25 EDT
# ls -Z /usr/kerberos/sbin/kshd 
-rwxr-xr-x. root root system_u:object_r:rshd_exec_t:s0 /usr/kerberos/sbin/ksh
Comment 4 Miroslav Grepl 2013-09-04 08:57:08 EDT
Actually the problem with all these bugs is we miss init domain for these inetd domain.
Comment 6 Ludek Smid 2014-06-13 08:50:53 EDT
This request was resolved in Red Hat Enterprise Linux 7.0.

Contact your manager or support representative in case you have further questions about the request.

Note You need to log in before you can comment on or make changes to this bug.