All of lore.kernel.org
 help / color / mirror / Atom feed
* krb5 policy bug
@ 2020-05-25 19:11 Corey Penford
  2020-05-29 13:46 ` Stephen Smalley
  0 siblings, 1 reply; 2+ messages in thread
From: Corey Penford @ 2020-05-25 19:11 UTC (permalink / raw)
  To: selinux

This is happening on Fedora MATE, release 31. This workstation is domain joined via realm/sssd. Latest updates are all installed and workstation was rebooted.

This only started happening recently enough, but it’s hard to tell if it was a regression in a selinux policy update, or if the behaviour is related to working from home.. I am running XRDP on the Linux workstation at the office, and using a Windows laptop using the Windows RDP client to connect to it from home.

This seems to happen every time the screen locks via timeout on the Linux workstation over my RDP connection. I can’t reproduce it by locking manually, it seems to only happen when the screen locks via the 15 minute inactivity timer, and then goes black from no mouse movement.

Any further info I can provide let me know
------------------------------------------------

SELinux is preventing krb5_child from read access on the key labeled unconfined_service_t.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that krb5_child should be allowed read access on key labeled unconfined_service_t by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'krb5_child' --raw | audit2allow -M my-krb5child
# semodule -X 300 -i my-krb5child.pp

Additional Information:
Source Context                system_u:system_r:sssd_t:s0
Target Context                system_u:system_r:unconfined_service_t:s0
Target Objects                Unknown [ key ]
Source                        krb5_child
Source Path                   krb5_child
Port                          <Unknown>
Host                          PW948
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-3.14.4-50.fc31.noarch
Local Policy RPM              selinux-policy-targeted-3.14.4-50.fc31.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     PW948
Platform                      Linux PW948 5.6.13-200.fc31.x86_64 #1 SMP Thu May
                              14 23:26:14 UTC 2020 x86_64 x86_64
Alert Count                   4
First Seen                    2020-05-25 14:57:27 EDT
Last Seen                     2020-05-25 14:57:27 EDT
Local ID                      d1ee27bb-6ce3-401d-ba7f-45935ad0c3d2

Raw Audit Messages
type=AVC msg=audit(1590433047.446:422): avc:  denied  { read } for  pid=12279 comm="krb5_child" scontext=system_u:system_r:sssd_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=0


Hash: krb5_child,sssd_t,unconfined_service_t,key,read

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: krb5 policy bug
  2020-05-25 19:11 krb5 policy bug Corey Penford
@ 2020-05-29 13:46 ` Stephen Smalley
  0 siblings, 0 replies; 2+ messages in thread
From: Stephen Smalley @ 2020-05-29 13:46 UTC (permalink / raw)
  To: Corey Penford; +Cc: selinux

On Mon, May 25, 2020 at 5:49 PM Corey Penford <coreypenford@live.com> wrote:
>
> This is happening on Fedora MATE, release 31. This workstation is domain joined via realm/sssd. Latest updates are all installed and workstation was rebooted.
>
> This only started happening recently enough, but it’s hard to tell if it was a regression in a selinux policy update, or if the behaviour is related to working from home.. I am running XRDP on the Linux workstation at the office, and using a Windows laptop using the Windows RDP client to connect to it from home.
>
> This seems to happen every time the screen locks via timeout on the Linux workstation over my RDP connection. I can’t reproduce it by locking manually, it seems to only happen when the screen locks via the 15 minute inactivity timer, and then goes black from no mouse movement.
>
> Any further info I can provide let me know
> ------------------------------------------------
>
> SELinux is preventing krb5_child from read access on the key labeled unconfined_service_t.
>
> *****  Plugin catchall (100. confidence) suggests   **************************
>
> If you believe that krb5_child should be allowed read access on key labeled unconfined_service_t by default.
> Then you should report this as a bug.
> You can generate a local policy module to allow this access.
> Do
> allow this access for now by executing:
> # ausearch -c 'krb5_child' --raw | audit2allow -M my-krb5child
> # semodule -X 300 -i my-krb5child.pp
>
> Additional Information:
> Source Context                system_u:system_r:sssd_t:s0
> Target Context                system_u:system_r:unconfined_service_t:s0
> Target Objects                Unknown [ key ]
> Source                        krb5_child
> Source Path                   krb5_child
> Port                          <Unknown>
> Host                          PW948
> Source RPM Packages
> Target RPM Packages
> SELinux Policy RPM            selinux-policy-targeted-3.14.4-50.fc31.noarch
> Local Policy RPM              selinux-policy-targeted-3.14.4-50.fc31.noarch
> Selinux Enabled               True
> Policy Type                   targeted
> Enforcing Mode                Enforcing
> Host Name                     PW948
> Platform                      Linux PW948 5.6.13-200.fc31.x86_64 #1 SMP Thu May
>                               14 23:26:14 UTC 2020 x86_64 x86_64
> Alert Count                   4
> First Seen                    2020-05-25 14:57:27 EDT
> Last Seen                     2020-05-25 14:57:27 EDT
> Local ID                      d1ee27bb-6ce3-401d-ba7f-45935ad0c3d2
>
> Raw Audit Messages
> type=AVC msg=audit(1590433047.446:422): avc:  denied  { read } for  pid=12279 comm="krb5_child" scontext=system_u:system_r:sssd_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=0
>
>
> Hash: krb5_child,sssd_t,unconfined_service_t,key,read

Fedora selinux policy issues should be reported to the Fedora selinux
list, see https://lists.fedoraproject.org/admin/lists/selinux.lists.fedoraproject.org/,
and/or bugzilla.redhat.com against its policy.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2020-05-29 13:46 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-05-25 19:11 krb5 policy bug Corey Penford
2020-05-29 13:46 ` Stephen Smalley

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.