* krb5 policy bug
@ 2020-05-25 19:11 Corey Penford
2020-05-29 13:46 ` Stephen Smalley
0 siblings, 1 reply; 2+ messages in thread
From: Corey Penford @ 2020-05-25 19:11 UTC (permalink / raw)
To: selinux
This is happening on Fedora MATE, release 31. This workstation is domain joined via realm/sssd. Latest updates are all installed and workstation was rebooted.
This only started happening recently enough, but it’s hard to tell if it was a regression in a selinux policy update, or if the behaviour is related to working from home.. I am running XRDP on the Linux workstation at the office, and using a Windows laptop using the Windows RDP client to connect to it from home.
This seems to happen every time the screen locks via timeout on the Linux workstation over my RDP connection. I can’t reproduce it by locking manually, it seems to only happen when the screen locks via the 15 minute inactivity timer, and then goes black from no mouse movement.
Any further info I can provide let me know
------------------------------------------------
SELinux is preventing krb5_child from read access on the key labeled unconfined_service_t.
***** Plugin catchall (100. confidence) suggests **************************
If you believe that krb5_child should be allowed read access on key labeled unconfined_service_t by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'krb5_child' --raw | audit2allow -M my-krb5child
# semodule -X 300 -i my-krb5child.pp
Additional Information:
Source Context system_u:system_r:sssd_t:s0
Target Context system_u:system_r:unconfined_service_t:s0
Target Objects Unknown [ key ]
Source krb5_child
Source Path krb5_child
Port <Unknown>
Host PW948
Source RPM Packages
Target RPM Packages
SELinux Policy RPM selinux-policy-targeted-3.14.4-50.fc31.noarch
Local Policy RPM selinux-policy-targeted-3.14.4-50.fc31.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name PW948
Platform Linux PW948 5.6.13-200.fc31.x86_64 #1 SMP Thu May
14 23:26:14 UTC 2020 x86_64 x86_64
Alert Count 4
First Seen 2020-05-25 14:57:27 EDT
Last Seen 2020-05-25 14:57:27 EDT
Local ID d1ee27bb-6ce3-401d-ba7f-45935ad0c3d2
Raw Audit Messages
type=AVC msg=audit(1590433047.446:422): avc: denied { read } for pid=12279 comm="krb5_child" scontext=system_u:system_r:sssd_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=0
Hash: krb5_child,sssd_t,unconfined_service_t,key,read
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: krb5 policy bug
2020-05-25 19:11 krb5 policy bug Corey Penford
@ 2020-05-29 13:46 ` Stephen Smalley
0 siblings, 0 replies; 2+ messages in thread
From: Stephen Smalley @ 2020-05-29 13:46 UTC (permalink / raw)
To: Corey Penford; +Cc: selinux
On Mon, May 25, 2020 at 5:49 PM Corey Penford <coreypenford@live.com> wrote:
>
> This is happening on Fedora MATE, release 31. This workstation is domain joined via realm/sssd. Latest updates are all installed and workstation was rebooted.
>
> This only started happening recently enough, but it’s hard to tell if it was a regression in a selinux policy update, or if the behaviour is related to working from home.. I am running XRDP on the Linux workstation at the office, and using a Windows laptop using the Windows RDP client to connect to it from home.
>
> This seems to happen every time the screen locks via timeout on the Linux workstation over my RDP connection. I can’t reproduce it by locking manually, it seems to only happen when the screen locks via the 15 minute inactivity timer, and then goes black from no mouse movement.
>
> Any further info I can provide let me know
> ------------------------------------------------
>
> SELinux is preventing krb5_child from read access on the key labeled unconfined_service_t.
>
> ***** Plugin catchall (100. confidence) suggests **************************
>
> If you believe that krb5_child should be allowed read access on key labeled unconfined_service_t by default.
> Then you should report this as a bug.
> You can generate a local policy module to allow this access.
> Do
> allow this access for now by executing:
> # ausearch -c 'krb5_child' --raw | audit2allow -M my-krb5child
> # semodule -X 300 -i my-krb5child.pp
>
> Additional Information:
> Source Context system_u:system_r:sssd_t:s0
> Target Context system_u:system_r:unconfined_service_t:s0
> Target Objects Unknown [ key ]
> Source krb5_child
> Source Path krb5_child
> Port <Unknown>
> Host PW948
> Source RPM Packages
> Target RPM Packages
> SELinux Policy RPM selinux-policy-targeted-3.14.4-50.fc31.noarch
> Local Policy RPM selinux-policy-targeted-3.14.4-50.fc31.noarch
> Selinux Enabled True
> Policy Type targeted
> Enforcing Mode Enforcing
> Host Name PW948
> Platform Linux PW948 5.6.13-200.fc31.x86_64 #1 SMP Thu May
> 14 23:26:14 UTC 2020 x86_64 x86_64
> Alert Count 4
> First Seen 2020-05-25 14:57:27 EDT
> Last Seen 2020-05-25 14:57:27 EDT
> Local ID d1ee27bb-6ce3-401d-ba7f-45935ad0c3d2
>
> Raw Audit Messages
> type=AVC msg=audit(1590433047.446:422): avc: denied { read } for pid=12279 comm="krb5_child" scontext=system_u:system_r:sssd_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=0
>
>
> Hash: krb5_child,sssd_t,unconfined_service_t,key,read
Fedora selinux policy issues should be reported to the Fedora selinux
list, see https://lists.fedoraproject.org/admin/lists/selinux.lists.fedoraproject.org/,
and/or bugzilla.redhat.com against its policy.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2020-05-29 13:46 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-05-25 19:11 krb5 policy bug Corey Penford
2020-05-29 13:46 ` Stephen Smalley
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.