Bug 1808987 - SELinux prevents the ninfod service from starting
Summary: SELinux prevents the ninfod service from starting
Keywords:
Status: CLOSED EOL
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 32
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Patrik Koncity
QA Contact: Milos Malik
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-03-02 08:16 UTC by Milos Malik
Modified: 2021-05-25 18:14 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-05-25 18:14:45 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Milos Malik 2020-03-02 08:16:14 UTC
Description of problem:

Version-Release number of selected component (if applicable):
iputils-20190515-5.fc32.x86_64
iputils-ninfod-20190515-5.fc32.x86_64
selinux-policy-3.14.5-28.fc32.noarch
selinux-policy-targeted-3.14.5-28.fc32.noarch

How reproducible:
 * always

Steps to Reproduce:
1. get a Fedora 32 (targeted policy is active)
2. start the ninfod service
3. search for SELinux denials

Actual results (enforcing mode):
----
type=PROCTITLE msg=audit(03/02/2020 02:59:04.675:368) : proctitle=/usr/sbin/ninfod -d 
type=PATH msg=audit(03/02/2020 02:59:04.675:368) : item=1 name=/lib64/ld-linux-x86-64.so.2 inode=151766 dev=fc:01 mode=file,755 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:ld_so_t:s0 nametype=NORMAL cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 cap_frootid=0 
type=PATH msg=audit(03/02/2020 02:59:04.675:368) : item=0 name=/usr/sbin/ninfod inode=135730 dev=fc:01 mode=file,755 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:ninfod_exec_t:s0 nametype=NORMAL cap_fp=net_raw cap_fi=none cap_fe=1 cap_fver=2 cap_frootid=0 
type=CWD msg=audit(03/02/2020 02:59:04.675:368) : cwd=/ 
type=EXECVE msg=audit(03/02/2020 02:59:04.675:368) : argc=2 a0=/usr/sbin/ninfod a1=-d 
type=BPRM_FCAPS msg=audit(03/02/2020 02:59:04.675:368) : fver=2 fp=net_raw fi=none fe=1 old_pp=chown,dac_override,dac_read_search,fowner,fsetid,kill,setgid,setuid,setpcap,linux_immutable,net_bind_service,net_broadcast,net_admin,net_raw,ipc_lock,ipc_owner,sys_module,sys_rawio,sys_chroot,sys_ptrace,sys_pacct,sys_admin,sys_boot,sys_nice,sys_resource,sys_time,sys_tty_config,mknod,lease,audit_write,audit_control,setfcap,mac_override,mac_admin,syslog,wake_alarm,block_suspend,audit_read old_pi=net_raw old_pe=none old_pa=net_raw pp=net_raw pi=net_raw pe=net_raw pa=none frootid=0 
type=SYSCALL msg=audit(03/02/2020 02:59:04.675:368) : arch=x86_64 syscall=execve success=yes exit=0 a0=0x557c53fed2f0 a1=0x557c54235a30 a2=0x557c5424bb00 a3=0x557c54000750 items=2 ppid=1 pid=1182 auid=unset uid=ninfod gid=unknown(64371) euid=ninfod suid=ninfod fsuid=ninfod egid=unknown(64371) sgid=unknown(64371) fsgid=unknown(64371) tty=(none) ses=unset comm=ninfod exe=/usr/sbin/ninfod subj=system_u:system_r:init_t:s0 key=(null) 
type=SELINUX_ERR msg=audit(03/02/2020 02:59:04.675:368) : op=security_bounded_transition seresult=denied oldcontext=system_u:system_r:init_t:s0 newcontext=system_u:system_r:ninfod_t:s0 
type=AVC msg=audit(03/02/2020 02:59:04.675:368) : avc:  denied  { nnp_transition } for  pid=1182 comm=(ninfod) scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:ninfod_t:s0 tclass=process2 permissive=0 
----
type=PROCTITLE msg=audit(03/02/2020 02:59:04.681:369) : proctitle=/usr/sbin/ninfod -d 
type=SYSCALL msg=audit(03/02/2020 02:59:04.681:369) : arch=x86_64 syscall=socket success=no exit=EACCES(Permission denied) a0=inet6 a1=SOCK_RAW a2=ipv6-icmp a3=0x7fc2567df0eb items=0 ppid=1 pid=1182 auid=unset uid=ninfod gid=unknown(64371) euid=ninfod suid=ninfod fsuid=ninfod egid=unknown(64371) sgid=unknown(64371) fsgid=unknown(64371) tty=(none) ses=unset comm=ninfod exe=/usr/sbin/ninfod subj=system_u:system_r:init_t:s0 key=(null) 
type=AVC msg=audit(03/02/2020 02:59:04.681:369) : avc:  denied  { create } for  pid=1182 comm=ninfod scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=rawip_socket permissive=0 
----

Expected results:
 * no SELinux denials
 * the ninfod service starts successfully

Comment 1 Milos Malik 2020-03-02 12:43:58 UTC
Caught in permissive mode:
----
type=PROCTITLE msg=audit(03/02/2020 07:42:13.194:727) : proctitle=/usr/sbin/ninfod -d 
type=PATH msg=audit(03/02/2020 07:42:13.194:727) : item=1 name=/lib64/ld-linux-x86-64.so.2 inode=151766 dev=fc:01 mode=file,755 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:ld_so_t:s0 nametype=NORMAL cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 cap_frootid=0 
type=PATH msg=audit(03/02/2020 07:42:13.194:727) : item=0 name=/usr/sbin/ninfod inode=147711 dev=fc:01 mode=file,755 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:ninfod_exec_t:s0 nametype=NORMAL cap_fp=net_raw cap_fi=none cap_fe=1 cap_fver=2 cap_frootid=0 
type=CWD msg=audit(03/02/2020 07:42:13.194:727) : cwd=/ 
type=EXECVE msg=audit(03/02/2020 07:42:13.194:727) : argc=2 a0=/usr/sbin/ninfod a1=-d 
type=BPRM_FCAPS msg=audit(03/02/2020 07:42:13.194:727) : fver=2 fp=net_raw fi=none fe=1 old_pp=chown,dac_override,dac_read_search,fowner,fsetid,kill,setgid,setuid,setpcap,linux_immutable,net_bind_service,net_broadcast,net_admin,net_raw,ipc_lock,ipc_owner,sys_module,sys_rawio,sys_chroot,sys_ptrace,sys_pacct,sys_admin,sys_boot,sys_nice,sys_resource,sys_time,sys_tty_config,mknod,lease,audit_write,audit_control,setfcap,mac_override,mac_admin,syslog,wake_alarm,block_suspend,audit_read old_pi=net_raw old_pe=none old_pa=net_raw pp=net_raw pi=net_raw pe=net_raw pa=none frootid=0 
type=SYSCALL msg=audit(03/02/2020 07:42:13.194:727) : arch=x86_64 syscall=execve success=yes exit=0 a0=0x557219e8f2f0 a1=0x557219e4b380 a2=0x557219e32db0 a3=0x557219ffa3e0 items=2 ppid=1 pid=18255 auid=unset uid=ninfod gid=unknown(64371) euid=ninfod suid=ninfod fsuid=ninfod egid=unknown(64371) sgid=unknown(64371) fsgid=unknown(64371) tty=(none) ses=unset comm=ninfod exe=/usr/sbin/ninfod subj=system_u:system_r:ninfod_t:s0 key=(null) 
type=AVC msg=audit(03/02/2020 07:42:13.194:727) : avc:  denied  { nnp_transition } for  pid=18255 comm=(ninfod) scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:ninfod_t:s0 tclass=process2 permissive=1 
----

Comment 2 Lukas Vrabec 2020-03-27 12:25:12 UTC
commit 80bcde108ad679e1a7c4bb14a463947cae720b0c (HEAD -> rawhide, origin/rawhide, origin/HEAD)
Author: Patrik Koncity <pkoncity>
Date:   Fri Mar 20 15:43:05 2020 +0100

    Update ninfod policy to add nnp transition from systemd to ninfod
    
    Allow SELinux Domain trasition from systemd into confined domain with NoNewPrivileges
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1808987

Comment 3 Fedora Update System 2020-04-08 11:52:53 UTC
FEDORA-2020-2fad1f552d has been submitted as an update to Fedora 32. https://bodhi.fedoraproject.org/updates/FEDORA-2020-2fad1f552d

Comment 4 Fedora Update System 2020-04-09 18:38:03 UTC
FEDORA-2020-2fad1f552d has been pushed to the Fedora 32 testing repository.
In short time you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2020-2fad1f552d`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2020-2fad1f552d

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 5 Fedora Program Management 2021-04-29 17:15:56 UTC
This message is a reminder that Fedora 32 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora 32 on 2021-05-25.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
Fedora 'version' of '32'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 32 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 6 Ben Cotton 2021-05-25 18:14:45 UTC
Fedora 32 changed to end-of-life (EOL) status on 2021-05-25. Fedora 32 is
no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.


Note You need to log in before you can comment on or make changes to this bug.