Bug 1402327 - SELinux is preventing pptpcm from 'read' accesses on the chr_file random.
Summary: SELinux is preventing pptpcm from 'read' accesses on the chr_file random.
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 25
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Lukas Vrabec
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:1155a531edb31bcaba1e9a8b992...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-12-07 09:18 UTC by Paweł
Modified: 2017-01-04 12:53 UTC (History)
9 users (show)

Fixed In Version: selinux-policy-3.13.1-225.3.fc25
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-12-12 23:59:13 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
SELinux detailed report, after dnf upgrade (5 mins ago) (2.11 KB, text/plain)
2016-12-13 21:57 UTC, Paweł
no flags Details

Description Paweł 2016-12-07 09:18:45 UTC
Description of problem:
Before todays pptp upgrade, I couldn't use PPTP - it just didn't work, because nf_conntrack_pptp module was not loaded (it was not found/loaded on kernel 4.8.10, this bug => https://bugzilla.redhat.com/show_bug.cgi?id=1254340), but I didn't have the time to properly diagnose it.

Then I upgraded to the 4.8.11 kernel, and it still didn't work.

Then after todays pptp upgrade (1.9.0-1), this SELinux alert happens everytime i try to start pptp vpn. So basically I just can't use PPTP VPN on Fedora 25.
SELinux is preventing pptpcm from 'read' accesses on the chr_file random.

*****  Plugin catchall_boolean (89.3 confidence) suggests   ******************

If aby allow authlogin to nsswitch use ldap
Then należy powiadomić o tym SELinuksa włączając zmienną logiczną „authlogin_nsswitch_use_ldap”.
Na stronie podręcznika „None” znajduje się więcej informacji.
Do
setsebool -P authlogin_nsswitch_use_ldap 1

*****  Plugin catchall (11.6 confidence) suggests   **************************

If aby pptpcm powinno mieć domyślnie read dostęp do random chr_file.
Then proszę to zgłosić jako błąd.
Można utworzyć lokalny moduł polityki, aby umożliwić ten dostęp.
Do
allow this access for now by executing:
# ausearch -c 'pptpcm' --raw | audit2allow -M my-pptpcm
# semodule -X 300 -i my-pptpcm.pp

Additional Information:
Source Context                system_u:system_r:pptp_t:s0
Target Context                system_u:object_r:random_device_t:s0
Target Objects                random [ chr_file ]
Source                        pptpcm
Source Path                   pptpcm
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
Policy RPM                    selinux-policy-3.13.1-224.fc25.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 4.8.11-300.fc25.x86_64 #1 SMP Mon
                              Nov 28 18:24:51 UTC 2016 x86_64 x86_64
Alert Count                   1
First Seen                    2016-12-07 09:55:34 CET
Last Seen                     2016-12-07 09:55:34 CET
Local ID                      d775628f-78d5-47c5-b852-b72eb8bd37a3

Raw Audit Messages
type=AVC msg=audit(1481100934.400:281): avc:  denied  { read } for  pid=2453 comm="pptpcm" name="random" dev="devtmpfs" ino=1032 scontext=system_u:system_r:pptp_t:s0 tcontext=system_u:object_r:random_device_t:s0 tclass=chr_file permissive=0


Hash: pptpcm,pptp_t,random_device_t,chr_file,read

Version-Release number of selected component:
selinux-policy-3.13.1-224.fc25.noarch

Additional info:
reporter:       libreport-2.8.0
hashmarkername: setroubleshoot
kernel:         4.8.11-300.fc25.x86_64
type:           libreport

Comment 1 Doktorn 2016-12-08 20:33:30 UTC
Description of problem:
Connected to a VPN (PPTP) through network manager. PPTP provider require username and log in. I set that all users on the computer should share the password in Network manager.
SELINUX did not fully appreciate this feature.

Version-Release number of selected component:
selinux-policy-3.13.1-224.fc25.noarch

Additional info:
reporter:       libreport-2.8.0
hashmarkername: setroubleshoot
kernel:         4.8.11-300.fc25.x86_64
type:           libreport

Comment 2 Fedora Update System 2016-12-09 13:47:59 UTC
selinux-policy-3.13.1-225.3.fc25 has been submitted as an update to Fedora 25. https://bodhi.fedoraproject.org/updates/FEDORA-2016-f24b3ddc6a

Comment 3 Fedora Update System 2016-12-10 03:58:39 UTC
selinux-policy-3.13.1-225.3.fc25 has been pushed to the Fedora 25 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-f24b3ddc6a

Comment 4 Fedora Update System 2016-12-12 23:59:13 UTC
selinux-policy-3.13.1-225.3.fc25 has been pushed to the Fedora 25 stable repository. If problems still persist, please make note of it in this bug report.

Comment 5 Paweł 2016-12-13 21:57:32 UTC
Created attachment 1231340 [details]
SELinux detailed report, after dnf upgrade (5 mins ago)

I upgraded 5 mins ago, and it still happens. Attached details of the report.

Comment 6 jadecristal 2017-01-04 12:53:50 UTC
Description of problem:
Adding a PPTP connection to a vpn provider and setting options using solely the NetworkManager dialog boxes (disabling, from default, all by MSCHAPv2, and setting the Use Point-to-Point Encryption option) causes the error when attempting to bring the link up.

Version-Release number of selected component:
selinux-policy-3.13.1-225.3.fc25.noarch

Additional info:
reporter:       libreport-2.8.0
hashmarkername: setroubleshoot
kernel:         4.8.14-300.fc25.x86_64
type:           libreport


Note You need to log in before you can comment on or make changes to this bug.