RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 658410 - SELinux denials with Cobbler on RHEL 6
Summary: SELinux denials with Cobbler on RHEL 6
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: selinux-policy
Version: 6.0
Hardware: All
OS: Linux
low
medium
Target Milestone: rc
: ---
Assignee: Miroslav Grepl
QA Contact: Karel Srot
URL:
Whiteboard:
Depends On:
Blocks: 658822
TreeView+ depends on / blocked
 
Reported: 2010-11-30 09:41 UTC by Mark Chappell
Modified: 2016-10-13 14:07 UTC (History)
5 users (show)

Fixed In Version: selinux-policy-3.7.19-59.el6
Doc Type: Bug Fix
Doc Text:
Clone Of:
: 658822 (view as bug list)
Environment:
Last Closed: 2011-05-19 11:57:09 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
Audit Log from enforcing mode (5.20 KB, text/plain)
2011-04-13 11:35 UTC, Mark Chappell
no flags Details
Audit Log from permissive mode (9.78 KB, text/plain)
2011-04-13 11:35 UTC, Mark Chappell
no flags Details
Output from restorecon (7.50 KB, text/plain)
2011-04-13 11:36 UTC, Mark Chappell
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2011:0526 0 normal SHIPPED_LIVE selinux-policy bug fix and enhancement update 2011-05-19 09:37:41 UTC

Description Mark Chappell 2010-11-30 09:41:34 UTC
Using EPEL's version of Cobbler for RHEL6 various pieces of cobbler's functionality seem to be being blocked by the RHEL6 SELinux policy.
It looks like a lot of Dominick Grift's recent work didn't make it into the RHEL6 policy.

I've ended up with the following extra module...


policy_module(rhit-cobbler, 1.0.8)

require {
    type cobblerd_t;
    type tftpd_t;
}

#============= cobblerd_t ==============
  # Not sure if these two are needed - generated by audit2allow
allow cobblerd_t self:capability fsetid;
files_read_var_lib_files(cobblerd_t)
  # Cobbler uses rsync to syncronise distributions between servers and 
  # creates/writes to /etc/rsyncd.conf
rsync_manage_config(cobblerd_t)
  # and runs rsync on the "slave"
corenet_tcp_connect_rsync_port(cobblerd_t)
  # Which are then written into /var/www/cobbler
apache_manage_sys_content(cobblerd_t)
miscfiles_manage_public_files(cobblerd_t)
  # Cobbler links a number of files into /var/lib/tftp which tftp should 
  # be able to serve but end up with a cobbler based context
cobbler_read_lib_files(tftpd_t)

Comment 2 Daniel Walsh 2010-11-30 14:51:54 UTC
Miroslav back port the cobbler and tftp policy from Rawhide, should cover most of these.

Comment 4 Miroslav Grepl 2010-12-09 16:04:54 UTC
Fixed in selinux-policy-3.7.19-59.el6

Comment 6 Karel Srot 2011-04-04 09:09:16 UTC
Hello Mark,
did you have a chance to retest it with selinux-policy-3.7.19-59.el6 (or newer)?

Comment 7 Mark Chappell 2011-04-04 09:21:57 UTC
Karel,

As far as I can tell the latest policy generally available is 3.7.19-54.el6_0.3, but I could try grabbing one of the more recent ones from brewweb.  I'll try to get our office dev environment back up running and let you know.


Mark

Comment 9 Daniel Walsh 2011-04-04 13:22:50 UTC
The next preview release of selinux-policy is always available in a yum repository on 

http://people.redhat.com/dwalsh/SELinux/RHEL6

Comment 10 Mark Chappell 2011-04-13 11:35:10 UTC
Created attachment 491730 [details]
Audit Log from enforcing mode

Comment 11 Mark Chappell 2011-04-13 11:35:36 UTC
Created attachment 491731 [details]
Audit Log from permissive mode

Comment 12 Mark Chappell 2011-04-13 11:36:36 UTC
Created attachment 491732 [details]
Output from restorecon

Comment 13 Mark Chappell 2011-04-13 11:41:25 UTC
I've just tried selinux-policy-targeted-3.7.19-84.el6.noarch

However I'm still seeing failures when SELinux is in enforcing mode.

Comment 14 Mark Chappell 2011-04-13 11:42:21 UTC
The restorecon output is the output of restorecon after I've run in permissive mode.

Comment 15 Daniel Walsh 2011-04-13 14:41:33 UTC
Mark Can you make sure everything is labelled correctly Maybe remove /var/lib/tftpboot altogether then install selinux-policy-targeted and reinstall cobbler and tftpboot,  Then check the labeling.  Then run the test.  I see in your avc's some mention of default_t

Comment 16 Mark Chappell 2011-04-18 14:51:09 UTC
I thought I'd already done a full relabel, apparently not.  

The new policy does indeed seem to be doing the job, thanks all.

Comment 18 Mark Chappell 2011-05-09 12:44:00 UTC
Bah, more denials....

Looks like apache isn't able to read the cobbler files to serve them.

type=AVC msg=audit(1304352033.736:94269): avc:  denied  { read } for  pid=1747 comm="httpd" name="RHEL-6-U0-Workstation-x86_64" dev=dm-2 ino=11386881 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u:object_r:cobbler_var_lib_t:s0 tclass=dir

# rpm -qa 'cobbler*' 'selinux-policy*'
selinux-policy-3.7.19-84.el6.noarch
selinux-policy-targeted-3.7.19-84.el6.noarch
cobbler-2.0.10-1.el6.noarch

Comment 20 errata-xmlrpc 2011-05-19 11:57:09 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHBA-2011-0526.html


Note You need to log in before you can comment on or make changes to this bug.