Bug 957974 - rules needed for dogtag (pki-tps and pki-ra)
Summary: rules needed for dogtag (pki-tps and pki-ra)
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 18
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-04-30 02:32 UTC by Ade Lee
Modified: 2013-05-21 08:41 UTC (History)
4 users (show)

Fixed In Version: selinux-policy-3.11.1-95.fc18
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-05-21 08:41:34 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)
AVC audit.log messages (TPS) (28.66 KB, patch)
2013-04-30 02:39 UTC, Matthew Harmsen
no flags Details | Diff
AVC audit.log messages (RA) (44.54 KB, patch)
2013-04-30 02:40 UTC, Matthew Harmsen
no flags Details | Diff
AVC audit.log messages (RA) - after installation of scratch selinux policy build (15.44 KB, patch)
2013-05-02 21:38 UTC, Matthew Harmsen
no flags Details | Diff
AVC audit.log messages (TPS) - after installation of scratch selinux policy build (5.04 KB, patch)
2013-05-02 21:45 UTC, Matthew Harmsen
no flags Details | Diff

Description Ade Lee 2013-04-30 02:32:38 UTC
Description of problem:

New rules for f18 installation:

# cat /var/log/audit/audit.log | audit2allow -R

require {
    type httpd_suexec_exec_t;
    type pki_tps_t;
    class file { read getattr execute };
}

#============= pki_tps_t ==============
allow pki_tps_t httpd_suexec_exec_t:file { read getattr execute };
files_manage_generic_tmp_dirs(pki_tps_t)
files_manage_generic_tmp_files(pki_tps_t)



RA:
# getenforce
Permissive

# cat /var/log/audit/audit.log | audit2allow -R

require {
    type pki_tps_t;
    type pki_ra_t;
    type httpd_suexec_exec_t;
    class file { getattr read execute };
}

#============= pki_ra_t ==============
allow pki_ra_t httpd_suexec_exec_t:file { read getattr execute };
files_manage_generic_tmp_dirs(pki_ra_t)
files_manage_generic_tmp_files(pki_ra_t)

#============= pki_tps_t ==============
allow pki_tps_t httpd_suexec_exec_t:file { read getattr execute };
files_manage_generic_tmp_dirs(pki_tps_t)
files_manage_generic_tmp_files(pki_tps_t)

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:

Comment 1 Ade Lee 2013-04-30 02:33:54 UTC
we probably need these for f19/rawhide as well.

Comment 2 Matthew Harmsen 2013-04-30 02:39:33 UTC
Created attachment 741728 [details]
AVC audit.log messages (TPS)

Comment 3 Matthew Harmsen 2013-04-30 02:40:09 UTC
Created attachment 741729 [details]
AVC audit.log messages (RA)

Comment 4 Miroslav Grepl 2013-04-30 06:18:34 UTC
commit 3aabce123ac964f3a065243c1e091da3f804a911
Author: Miroslav Grepl <mgrepl>
Date:   Tue Apr 30 08:18:07 2013 +0200

    Allow pki apache domain to create own tmp files and execute httpd_suexec

Comment 5 Miroslav Grepl 2013-05-02 20:36:50 UTC
I need to fix labeling for /usr/share/pki.

Comment 6 Matthew Harmsen 2013-05-02 21:35:30 UTC
After installing the following yum build:

    # yum update selinux-policy-3.11.1-93.fc18.noarch.rpm selinux-policy-targeted-
      3.11.1-93.fc18.noarch.rpm selinux-policy-devel-3.11.1-93.fc18.noarch.rpm
      selinux-policy-doc-3.11.1-93.fc18.noarch.rpm

I encountered the following AVCs when attempting to install an RA in Permissive mode:

    # cat /var/log/audit/audit.log | audit2allow -R
    
    require {
	    type pki_ra_t;
	    type cert_t;
	    class file { execute execute_no_trans };
    }
    
    #============= pki_ra_t ==============
    allow pki_ra_t cert_t:file { execute execute_no_trans };

The entire RA audit.log file will be attached.

Comment 7 Matthew Harmsen 2013-05-02 21:38:27 UTC
Created attachment 742927 [details]
AVC audit.log messages (RA) - after installation of scratch selinux policy build

Comment 8 Matthew Harmsen 2013-05-02 21:44:20 UTC
After installing the following yum build:

    # yum update selinux-policy-3.11.1-93.fc18.noarch.rpm selinux-policy-targeted-
      3.11.1-93.fc18.noarch.rpm selinux-policy-devel-3.11.1-93.fc18.noarch.rpm
      selinux-policy-doc-3.11.1-93.fc18.noarch.rpm

I encountered the following AVCs when attempting to install a TPS in Permissive mode:

    # cat /var/log/audit/audit.log | audit2allow -R
    
    require {
	    type cert_t;
	    type pki_tps_t;
	    class file { execute execute_no_trans };
    }
    
    #============= pki_tps_t ==============
    allow pki_tps_t cert_t:file { execute execute_no_trans };

The entire TPS audit.log file will be attached.

Comment 9 Matthew Harmsen 2013-05-02 21:45:34 UTC
Created attachment 742928 [details]
AVC audit.log messages (TPS) - after installation of scratch selinux policy build

Comment 10 Miroslav Grepl 2013-05-03 08:22:28 UTC
commit ebdb50273cd9216712af7d33795e35056375f833
Author: Miroslav Grepl <mgrepl>
Date:   Fri May 3 10:21:24 2013 +0200

    Add labeling just for /usr/share/pki/ca-trust-source instead of /usr/share/pki

Comment 11 Fedora Update System 2013-05-07 21:29:53 UTC
selinux-policy-3.11.1-94.fc18 has been submitted as an update for Fedora 18.
https://admin.fedoraproject.org/updates/selinux-policy-3.11.1-94.fc18

Comment 12 Fedora Update System 2013-05-09 10:12:33 UTC
Package selinux-policy-3.11.1-94.fc18:
* should fix your issue,
* was pushed to the Fedora 18 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing selinux-policy-3.11.1-94.fc18'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2013-7743/selinux-policy-3.11.1-94.fc18
then log in and leave karma (feedback).

Comment 13 Fedora Update System 2013-05-17 11:01:37 UTC
selinux-policy-3.11.1-95.fc18 has been submitted as an update for Fedora 18.
https://admin.fedoraproject.org/updates/selinux-policy-3.11.1-95.fc18

Comment 14 Fedora Update System 2013-05-21 08:41:34 UTC
selinux-policy-3.11.1-95.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.