[ale] SElinux, Fedora3, and postgresql
James P. Kinney III
jkinney at localnetsolutions.com
Fri Nov 26 21:53:01 EST 2004
On Fri, 2004-11-26 at 18:26, James P. Kinney III wrote:
> On Fri, 2004-11-26 at 14:28, Chris Ricker wrote:
> > On Fri, 26 Nov 2004, James P. Kinney III wrote:
> >
> > > What a combination. My head hurts.
> > >
> > > I would _like_ to keep the selinux turned on but I can't get the policy
> > > set right to allow access to the postgresql socket from a cgi script.=20
> > >
> > > Google turns up no specific data on postgresql (other than Gentoo has a
> > > million setups that don't work with Selinux). The Selinux site on NSA
> > > covers up through FC2. Fedors mailing list has no info on Postgresql.
> > >
> > > Any security gurus schlogging their way through SELinux and has some
> > > wisdom to share?
> >
> > What point are you at? Getting avc: denied errors? Are you running strict or
> > targeted policy?
> yep. Targeted policy.
>
> Nov 26 13:52:08 camelot kernel: audit(1101495128.034:0): avc: denied {
> search } for pid=3879 exe=/usr/bin/perl
> scontext=root:system_r:httpd_sys_script_t
> tcontext=system_u:object_r:sysctl_kernel_t tclass=dir
> Nov 26 13:52:08 camelot kernel: audit(1101495128.034:0): avc: denied {
> search } for pid=3879 exe=/usr/bin/perl name=sys dev=proc
> ino=4026531865 scontext=root:system_r:httpd_sys_script_t
> tcontext=system_u:object_r:sysctl_t tclass=dir
> Nov 26 13:52:08 camelot kernel: audit(1101495128.150:0): avc: denied {
> write } for pid=3879 exe=/usr/bin/perl name=.s.PGSQL.5432 dev=hda2
> ino=3342343 scontext=root:system_r:httpd_sys_script_t
> tcontext=root:object_r:tmp_t tclass=sock_file
Success! Found the tool audit2allow and added the following to the
policy.conf file:
#line 83
allow httpd_sys_script_t port_type:{ tcp_socket udp_socket } { send_msg
recv_msg };
#line 83
allow httpd_sys_script_t sysctl_kernel_t:dir search;
#line 83
allow httpd_sys_script_t sysctl_t:dir search;
#line 83
allow httpd_sys_script_t tmp_t:sock_file write;
#line 83
allow httpd_sys_script_t httpd_sys_content_t:lnk_file read;
#line 83
allow httpd_sys_script_t sysctl_kernel_t:file read;
#line 83
allow httpd_sys_script_t unconfined_t:unix_stream_socket connectto;
NOTE** This allows sql-ledger to run on FC3. I have NOT done a full
policy analysis to determine if this opens up more than I want to have
open.
>
> >
> > later,
> > chris
> > _______________________________________________
> > Ale mailing list
> > Ale at ale.org
> > http://www.ale.org/mailman/listinfo/ale
> >
> > !DSPAM:41a78416159041402011530!
--
James P. Kinney III \Changing the mobile computing world/
CEO & Director of Engineering \ one Linux user /
Local Net Solutions,LLC \ at a time. /
770-493-8244 \.___________________________./
http://www.localnetsolutions.com
GPG ID: 829C6CA7 James P. Kinney III (M.S. Physics)
<jkinney at localnetsolutions.com>
Fingerprint = 3C9E 6366 54FC A3FE BA4D 0659 6190 ADC3 829C 6CA7
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
More information about the Ale
mailing list