Bug 769175 - SELinux is preventing /usr/sbin/sssd from using the sys_admin capability.
Summary: SELinux is preventing /usr/sbin/sssd from using the sys_admin capability.
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: rawhide
Hardware: Unspecified
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks: 769301
TreeView+ depends on / blocked
 
Reported: 2011-12-20 07:22 UTC by Gowrishankar Rajaiyan
Modified: 2012-02-10 08:56 UTC (History)
8 users (show)

Fixed In Version:
Clone Of:
: 769301 (view as bug list)
Environment:
Last Closed: 2012-02-10 08:56:22 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Gowrishankar Rajaiyan 2011-12-20 07:22:59 UTC
Description of problem:


Version-Release number of selected component (if applicable):
sssd-1.7.0-0.20111219T1638Zgitbdd2050.fc15.x86_64

How reproducible:
Always

Steps to Reproduce:
1. Update Fedora 15 with the latest SSSD bits from http://jdennis.fedorapeople.org/ipa-devel/fedora/$releasever/$basearch/os/
2. ipa-client-install 
3. Observe /var/log/messages
  
Actual results:
Dec 20 20:13:50 dhcp201-106 setroubleshoot: SELinux is preventing /usr/sbin/sssd from using the sys_admin capability. For complete SELinux messages. run sealert -l 650ca357-5e3a-455b-b028-4d0afaa8e5d0


Expected results:
No SELinux denials and SSSD should be started successfully.


Additional info:

SELinux is preventing /usr/sbin/sssd from using the sys_admin capability.

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that sssd should have the sys_admin capability by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep sssd /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Comment 1 Stephen Gallagher 2011-12-20 13:27:31 UTC
SSSD grew a dependency on the sys_admin capability because it is now using keyctl_join_session_keyring() and keyctl_setperm() to connect to the kernel keyring and store passwords securely while the SSSD is running (such as for deferred kinit operation).

We need this new requirement added to SSSD in the selinux policy.

Comment 2 Miroslav Grepl 2011-12-20 14:02:55 UTC
So this is valid for F15+.

Comment 3 Stephen Gallagher 2011-12-20 14:11:16 UTC
(In reply to comment #2)
> So this is valid for F15+.

Yes, please.

Comment 4 Scott Poore 2011-12-23 02:15:48 UTC
Is this the same error?   Reads like it but I didn't get an setroubleshoot entry in /var/log/messages.

# /usr/bin/env LC_ALL=en_US.UTF-8 /sbin/ausearch -m AVC -m USER_AVC -m SELINUX_ERR -ts 12/22/2011 19:00
...snip....
type=AVC msg=audit(1324604821.705:299): avc:  denied  { sys_admin } for  pid=11976 comm="sssd" capability=21  scontext=system_u:system_r:sssd_t:s0 tcontext=system_u:system_r:sssd_t:s0 tclass=capability
...snip...

versions in question on my test system were:

sssd-1.8.0-0.20111222T1839Zgitb355dcb.fc16.x86_64

selinux-policy-3.10.0-67.fc16.noarch


And, sssd does appear to be running:

 systemctl status sssd.service
sssd.service - LSB: System Security Services Daemon
	  Loaded: loaded (/etc/rc.d/init.d/sssd)
	  Active: active (running) since Thu, 22 Dec 2011 20:47:02 -0500; 27min ago
	  CGroup: name=systemd:/system/sssd.service
		  ├ 11977 /usr/sbin/sssd -f -D
		  ├ 11989 /usr/libexec/sssd/sssd_be --domain testrelm --debu...
		  ├ 11990 /usr/libexec/sssd/sssd_nss --debug-to-files
		  └ 11991 /usr/libexec/sssd/sssd_pam --debug-to-files


Just checking that I am actually seeing the same issue before opening another BZ.

Thanks,
Scott

Comment 5 Miroslav Grepl 2011-12-23 11:46:48 UTC
Pleas, try it with the latest policy from koji

http://koji.fedoraproject.org/koji/buildinfo?buildID=279701

Comment 6 Scott Poore 2012-01-03 21:25:13 UTC
I do believe that fixed what I was seeing at least:

# /usr/bin/env LC_ALL=en_US.UTF-8 /sbin/ausearch -m AVC -m USER_AVC -m SELINUX_ERR -ts 01/03/2012 15:00:00|grep sss

...no output...

However, I should note (just in case) that I had to set NSS_SSL_CBC_RANDOM_IV=0 in /etc/profile first to work this issue:

https://bugzilla.redhat.com/show_bug.cgi?id=771357

Thanks,
Scott

Comment 7 Miroslav Grepl 2012-01-06 15:18:44 UTC
# sesearch -A -s sssd_t -t sssd_t -c capability -p sys_admin
Found 1 semantic av rules:
   allow sssd_t sssd_t : capability { chown dac_override dac_read_search kill setgid setuid net_admin sys_admin sys_nice audit_write } ;

which tells us that the capability has been added.


Note You need to log in before you can comment on or make changes to this bug.