Bug 1098234
| Summary: | provide selinux policy for --allinone | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Dave Allan <dallan> | ||||
| Component: | openstack-selinux | Assignee: | Ryan Hallisey <rhallise> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Ami Jeain <ajeain> | ||||
| Severity: | high | Docs Contact: | |||||
| Priority: | unspecified | ||||||
| Version: | 5.0 (RHEL 7) | CC: | acathrow, lbezdick, lhh, mgrepl, oblaut, ohochman, rhallise, ssekidde, yeylon | ||||
| Target Milestone: | rc | ||||||
| Target Release: | 5.0 (RHEL 7) | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2014-07-08 15:13:24 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Attachments: |
|
||||||
|
Description
Dave Allan
2014-05-15 14:23:57 UTC
Created attachment 895959 [details]
audit log with AVCs from an initial install and boot of an instance
#============= neutron_t ==============
allow neutron_t netutils_exec_t:file { read execute open execute_no_trans };
allow neutron_t self:capability dac_override;
allow neutron_t self:packet_socket { bind create getattr };
allow neutron_t self:process setcap;
allow neutron_t sysctl_net_t:dir search;
allow neutron_t sysctl_net_t:file { write getattr open };
allow neutron_t var_run_t:file { read create open };
#============= swift_t ==============
allow swift_t file_t:dir { read getattr open };
enable bool: nis_enabled
These are the fixes from Dave's log. What else did you run into?
(In reply to Ryan Hallisey from comment #3) > These are the fixes from Dave's log. What else did you run into? That log has everything so far. If you get me a test package, I'll retry. We are working with lbezdick on fixes. Basically most of these AVCs have been already fixed. Thanks new builds only throw: allow swift_t xserver_port_t:tcp_socket name_bind; #============= swift_t ==============
allow swift_t tmpfs_t:file { write getattr link read create unlink open };
allow swift_t xserver_port_t:tcp_socket name_bind;
allow swift_t httpd_config_t:dir search;
allow swift_t keystone_port_t:tcp_socket name_connect;
allow swift_t memcache_port_t:tcp_socket name_connect;
#============= neutron_t ==============
allow neutron_t var_run_t:file { read create open };
allow neutron_t tmp_t:dir create;
#============= nagios_t ==============
allow nagios_t ping_exec_t:file { read execute open execute_no_trans };
allow nagios_t self:capability net_raw;
allow nagios_t self:process setcap;
allow nagios_t self:rawip_socket { getopt create setopt };
sekidde is going to post a package with fixes.
sekidde and I were concerned over the two neutron allow rules.
Mgrepl if you think they are ok can you put this into selinux-policy if there is still time for RHEL 6.6 & 7.
Test with the newest policy and post back with any new avcs No issue is seen with [root@puma04 ~(keystone_admin_tenant1)]$grep avc /var/log/messages Jun 8 08:02:08 puma04 dbus-daemon: dbus[804]: avc: received policyload notice (seqno=2) Jun 8 08:02:08 puma04 dbus[804]: avc: received policyload notice (seqno=2) Jun 8 08:02:14 puma04 kernel: type=1107 audit(1402203734.891:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=2) Jun 8 08:25:11 puma04 dbus-daemon: dbus[804]: avc: received policyload notice (seqno=3) Jun 8 08:25:11 puma04 dbus[804]: avc: received policyload notice (seqno=3) Jun 8 08:25:13 puma04 dbus-daemon: dbus[804]: avc: received policyload notice (seqno=4) Jun 8 08:25:13 puma04 dbus[804]: avc: received policyload notice (seqno=4) [root@puma04 ~(keystone_admin_tenant1)]$grep avc /var/log/messages ^C [root@puma04 ~(keystone_admin_tenant1)]$rpm -qa | grep selinux libselinux-2.2.2-6.el7.x86_64 libselinux-utils-2.2.2-6.el7.x86_64 libselinux-ruby-2.2.2-6.el7.x86_64 selinux-policy-targeted-3.12.1-153.el7_0.10.noarch libselinux-python-2.2.2-6.el7.x86_64 selinux-policy-3.12.1-153.el7_0.10.noarch Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHEA-2014-0845.html |