Bug 227733 - [LSPP] unable to ssh into a system as root/auditadm_r
[LSPP] unable to ssh into a system as root/auditadm_r
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: openssh (Show other bugs)
5.0
All Linux
medium Severity medium
: ---
: ---
Assigned To: Tomas Mraz
Brian Brock
:
: 227770 (view as bug list)
Depends On:
Blocks: RHEL5LSPPCertTracker
  Show dependency treegraph
 
Reported: 2007-02-07 15:48 EST by Matt Anderson
Modified: 2007-11-30 17:07 EST (History)
5 users (show)

See Also:
Fixed In Version: RHSA-2007-0540
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-11-07 10:32:29 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Proposed patch by Dan Walsh (1006 bytes, patch)
2007-02-09 09:34 EST, Tomas Mraz
no flags Details | Diff

  None (edit)
Description Matt Anderson 2007-02-07 15:48:54 EST
Description of problem:
With MLS policy it is not possible to ssh into a system as the auditadm_r role.

How reproducible:
Everytime.

Steps to Reproduce:
1. Install RHEL5rc1
2. Enable MLS policy
3. From a remote host run `ssh root/auditadm_r@$HOST`
  
Actual results:
The connection is not allowed

Expected results:
You should be able to connect into the sytem with the SELinux role of auditadm_r

Additional info:
Comment 1 Klaus Heinrich Kiwi 2007-02-07 18:23:30 EST
Make sure you have 'PermitRootLogin yes' in the /etc/ssh/sshd_config if you want
to log in as root.

For the records: ssh <user>/secadm_r@<host> isn't working either. Dan said it
would be fixed in the next policy release.
Comment 2 Daniel Walsh 2007-02-08 13:49:46 EST
Actually we found that it would be better to update openssh to make it work.
Comment 3 Tomas Mraz 2007-02-09 09:21:43 EST
*** Bug 227770 has been marked as a duplicate of this bug. ***
Comment 4 Tomas Mraz 2007-02-09 09:34:36 EST
Created attachment 147769 [details]
Proposed patch by Dan Walsh
Comment 5 Tomas Mraz 2007-02-09 16:32:25 EST
Fixed + improved auditing of role changes in openssh-4.3p2-17.el5.
Comment 6 Klaus Heinrich Kiwi 2007-02-15 08:23:29 EST
Built a package with the above patch and upgraded in a x86_64 box.. Logins as
secadm_r and auditadm_r are working fine.

The strange thing, though, is that on I can also log-in successfully in another
similar box in which the only difference (in terms of patchlevel/package
versions) is the patch above.

In both boxes I have:
[abat@zaphod ~]$ grep sshd_t /etc/selinux/mls/contexts/default_contexts
system_r:sshd_t:s0              user_r:user_t:s0 staff_r:staff_t:s0
sysadm_r:sysadm_t:s0
[abat@zaphod ~]$ 

And can't see also any difference in the way auditing works between the two
boxes (for both login acceptance and denial). On the other hand, it seems
acceptable the way it is now.

Wonder if this was fixed in a previous ssh release or even in another updated
package (maybe mcstrans and/or libselinux)
Comment 7 Klaus Heinrich Kiwi 2007-02-15 08:37:39 EST
My bad.. just now I saw that I was applying this same patch to the (stock) -16
release while it has already been applied and released in Dan's people page as
release -17 (which I had blindly upgraded without checking the changelog)

It's working fine and generating the additional USER_ROLE_CHANGE when
successfully logging in with non-default role, while some more info is being
reported in the USER_ERR record when the role change is denied.

I think we may close this bug. Matt? 
Comment 13 errata-xmlrpc 2007-11-07 10:32:29 EST
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2007-0540.html

Note You need to log in before you can comment on or make changes to this bug.