Bug 1053052 - neutron cannot run neutron-rootwrap binary
Summary: neutron cannot run neutron-rootwrap binary
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 19
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Lukas Vrabec
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-01-14 15:54 UTC by Richard W.M. Jones
Modified: 2014-02-17 21:07 UTC (History)
4 users (show)

Fixed In Version: selinux-policy-3.12.1-74.18.fc19
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-02-17 21:07:55 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Richard W.M. Jones 2014-01-14 15:54:15 UTC
Description of problem:

[root@avon ~(keystone_admin)]# setenforce Enforcing
[root@avon ~(keystone_admin)]# neutron net-list
Authentication required
[root@avon ~(keystone_admin)]# nova list
ERROR: The server could not comply with the request since it is either malformed or otherwise incorrect. (HTTP 400) (Request-ID: req-316b43b8-d764-45cf-a4bc-4e98eded52f6)

but ...

[root@avon ~(keystone_admin)]# setenforce Permissive
[root@avon ~(keystone_admin)]# neutron net-list
+--------------------------------------+---------+------------------------------------------------------+
| id                                   | name    | subnets                                              |
+--------------------------------------+---------+------------------------------------------------------+
| 1e0b93d5-4567-45d6-a4d6-5dba9b21eb0e | private | 712e3923-d312-4a4d-8752-f5165257aa50 10.0.0.0/24     |
| 7d687647-8674-43d5-a52c-862f83b43871 | public  | 6e18adeb-d24f-4f76-ae8e-bf11d246d596 172.24.4.224/28 |
+--------------------------------------+---------+------------------------------------------------------+
[root@avon ~(keystone_admin)]# nova list
+--------------------------------------+---------------+---------+------------+-------------+---------------------+
| ID                                   | Name          | Status  | Task State | Power State | Networks            |
+--------------------------------------+---------------+---------+------------+-------------+---------------------+
| b9ba2eae-20bd-4f62-8620-ebda97cd3b78 | cirros-server | SHUTOFF | None       | Shutdown    | public=172.24.4.227 |
+--------------------------------------+---------------+---------+------------+-------------+---------------------+

The AVC is:

# sealert -l 4260d71d-d2b0-4124-a44c-e73dec8f78f3
SELinux is preventing /usr/bin/python2.7 from execute access on the file /usr/sbin/xtables-multi.

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that python2.7 should be allowed execute access on the xtables-multi file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep neutron-rootwra /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp


Additional Information:
Source Context                system_u:system_r:neutron_t:s0
Target Context                system_u:object_r:iptables_exec_t:s0
Target Objects                /usr/sbin/xtables-multi [ file ]
Source                        neutron-rootwra
Source Path                   /usr/bin/python2.7
Port                          <Unknown>
Host                          avon.home.annexia.org
Source RPM Packages           python-2.7.5-9.fc19.x86_64
Target RPM Packages           iptables-1.4.18-1.fc19.x86_64
Policy RPM                    selinux-policy-3.12.1-74.16.fc19.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     avon.home.annexia.org
Platform                      Linux avon.home.annexia.org 3.12.7-200.fc19.x86_64
                              #1 SMP Fri Jan 10 15:32:06 UTC 2014 x86_64 x86_64
Alert Count                   29325
First Seen                    2013-12-12 16:40:21 GMT
Last Seen                     2014-01-14 15:42:50 GMT
Local ID                      4260d71d-d2b0-4124-a44c-e73dec8f78f3

Raw Audit Messages
type=AVC msg=audit(1389714170.261:7851): avc:  denied  { execute } for  pid=22037 comm="neutron-rootwra" name="xtables-multi" dev="dm-1" ino=2503252 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file


type=SYSCALL msg=audit(1389714170.261:7851): arch=x86_64 syscall=access success=no exit=EACCES a0=1bd4950 a1=1 a2=306b5bbf88 a3=6962732f7273752f items=0 ppid=22036 pid=22037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=neutron-rootwra exe=/usr/bin/python2.7 subj=system_u:system_r:neutron_t:s0 key=(null)

Hash: neutron-rootwra,neutron_t,iptables_exec_t,file,execute

Version-Release number of selected component (if applicable):

python-neutron-2013.2.1-1.fc20.noarch
python-neutronclient-2.3.1-2.fc20.noarch

(Note these are packages from RDO, the base OS is Fedora 19)

How reproducible:

100%

Steps to Reproduce:
1. See above.

Comment 1 Miroslav Grepl 2014-01-16 16:11:53 UTC
Needs to be back ported.

Comment 2 Richard W.M. Jones 2014-01-16 16:17:58 UTC
(In reply to Miroslav Grepl from comment #1)
> Needs to be back ported.

Miroslav, if this only affects F19 and is fixed in F20, then
you may prefer to close it WONTFIX.  I'm intending to upgrade
this box to F20 in the near future.

Comment 3 Lukas Vrabec 2014-01-17 11:57:52 UTC
I back ported it.

commit ed5eba4faa416a1ffac7ed113608725ca2263599
Author: Lukas Vrabec <lvrabec>
Date:   Fri Jan 17 12:53:39 2014 +0100

    Allow neutron domtrans to iptables

Comment 4 Fedora Update System 2014-02-11 22:10:04 UTC
selinux-policy-3.12.1-74.18.fc19 has been submitted as an update for Fedora 19.
https://admin.fedoraproject.org/updates/selinux-policy-3.12.1-74.18.fc19

Comment 5 Fedora Update System 2014-02-12 14:50:37 UTC
Package selinux-policy-3.12.1-74.18.fc19:
* should fix your issue,
* was pushed to the Fedora 19 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing selinux-policy-3.12.1-74.18.fc19'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2014-2409/selinux-policy-3.12.1-74.18.fc19
then log in and leave karma (feedback).

Comment 6 Fedora Update System 2014-02-17 21:07:55 UTC
selinux-policy-3.12.1-74.18.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.