Bug 473391 - [Patch] SELinux protection for unbound daemon
Summary: [Patch] SELinux protection for unbound daemon
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 11
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-11-28 09:14 UTC by Adam Tkac
Modified: 2013-04-30 23:42 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2009-11-18 13:09:29 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
.fc file (252 bytes, text/plain)
2008-11-28 09:15 UTC, Adam Tkac
no flags Details
.te file (1.27 KB, text/plain)
2008-11-28 09:15 UTC, Adam Tkac
no flags Details

Description Adam Tkac 2008-11-28 09:14:26 UTC
Description of problem:
unbound daemon is new DNS resolver and it lacks SELinux protection. I've created proposed policy. Would it be possible put it to rawhide selinux-policy, please?

Comment 1 Adam Tkac 2008-11-28 09:15:19 UTC
Created attachment 324951 [details]
.fc file

Comment 2 Adam Tkac 2008-11-28 09:15:53 UTC
Created attachment 324952 [details]
.te file

Comment 3 Daniel Walsh 2008-12-04 15:49:32 UTC
Would it be better to just add it to the bind policy, since it has the same security requirements?

Comment 4 Paul Wouters 2008-12-04 16:02:24 UTC
that might change in the future anyway. I'd keep it separate.

Comment 5 Adam Tkac 2008-12-04 16:06:45 UTC
Well, it is possible but I don't think it is good. Unbound is recursive-only
nameserver, it is not authoritative server as named. Unbound policy can be far
more stricter than named's one. But if you think reuse of named policy makes
more sence simply reuse it, I might be "security-paranoid" ;)

(In reply to comment #4)
> that might change in the future anyway. I'd keep it separate.

Both are DNS servers so I don't expect major differences.

Comment 6 Daniel Walsh 2008-12-04 16:39:55 UTC
If unbound needs less privs then bind, fine we can add a boolean to turn off privs.  But adding an additional policy for basically the same security domain is a mistake.


If we find they become very different in the future, we can separate the policy.  But I think they are more similar then different, lastly there is probably little likelyhood that you would have bind data on the same machine as unbound, so I don't see them attacking each other.

Comment 7 Paul Wouters 2008-12-05 15:44:27 UTC
I think quite a few people will test with unbound having bind as a backup, or even using both on different IP's on the same box, while testing out things like DNSSEC.

But we've tried to ensure that bind and unbound use the same files for DNSSEC keys and all.

Comment 8 Adam Tkac 2008-12-08 11:45:45 UTC
(In reply to comment #7)
> I think quite a few people will test with unbound having bind as a backup, or
> even using both on different IP's on the same box, while testing out things
> like DNSSEC.

I can imagine someone will use unbound and named on same box so one policy won't be good enough (unbound will be allowed to interfere named and opposite).

Comment 9 Daniel Walsh 2008-12-08 14:01:33 UTC
That may be true, but for those users they are going to have to do some special stuff anyways to prevent the two domains from attacking each other since they both can use  dns ports. Adding the following to F10 and Rawhide Policy.

/etc/unbound(/.*)?			gen_context(system_u:object_r:named_conf_t,s0)
/etc/rc\.d/init\.d/unbound	--	gen_context(system_u:object_r:named_initrc_exec_t,s0)

/usr/sbin/unbound		--	gen_context(system_u:object_r:named_exec_t,s0)
/var/run/unbound(/.*)?			gen_context(system_u:object_r:named_var_run_t,s0)

Comment 10 Daniel Walsh 2008-12-08 20:16:50 UTC
Fixed in selinux-policy-3.5.13-33.fc10

Comment 11 Bug Zapper 2009-06-09 09:58:25 UTC
This bug appears to have been reported against 'rawhide' during the Fedora 11 development cycle.
Changing version to '11'.

More information and reason for this action is here:
http://fedoraproject.org/wiki/BugZappers/HouseKeeping


Note You need to log in before you can comment on or make changes to this bug.