selinux-refpolicy.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] New interface to dontaudit access to cert_t
@ 2019-02-12 13:05 Sugar, David
  2019-02-13 23:42 ` Chris PeBenito
  0 siblings, 1 reply; 6+ messages in thread
From: Sugar, David @ 2019-02-12 13:05 UTC (permalink / raw)
  To: selinux-refpolicy

I'm seeing a bunch of denials for various processes (some refpolicy
domains, some my own application domains) attempting to access
/etc/pki.  They seem to be working OK even with the denial.  Adding
interface to dontaudit this stuff and calling the interface.

type=AVC msg=audit(1549932300.668:266): avc:  denied  { search } for pid=7077 comm="X" name="pki" dev="dm-1" ino=138 scontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cert_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1549932306.553:430): avc:  denied  { search } for pid=7345 comm="clamd" name="pki" dev="dm-1" ino=138 scontext=system_u:system_r:clamd_t:s0:c1 tcontext=system_u:object_r:cert_t:s0 tclass=dir permissive=0

Signed-off-by: Dave Sugar <dsugar@tresys.com>
---
 policy/modules/services/clamav.te  |  1 +
 policy/modules/services/xserver.te |  1 +
 policy/modules/system/miscfiles.if | 20 ++++++++++++++++++++
 3 files changed, 22 insertions(+)

diff --git a/policy/modules/services/clamav.te b/policy/modules/services/clamav.te
index 622453e3..ad19cc7b 100644
--- a/policy/modules/services/clamav.te
+++ b/policy/modules/services/clamav.te
@@ -147,6 +147,7 @@ auth_use_nsswitch(clamd_t)
 
 logging_send_syslog_msg(clamd_t)
 
+miscfiles_dontaudit_search_generic_certs(clamd_t)
 miscfiles_read_localization(clamd_t)
 
 tunable_policy(`clamd_use_jit',`
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index a2b08a89..da1c0c7d 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -804,6 +804,7 @@ locallogin_use_fds(xserver_t)
 logging_send_syslog_msg(xserver_t)
 logging_send_audit_msgs(xserver_t)
 
+miscfiles_dontaudit_search_generic_certs(xserver_t)
 miscfiles_read_localization(xserver_t)
 miscfiles_read_fonts(xserver_t)
 
diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if
index 93c1f9c1..cecdb406 100644
--- a/policy/modules/system/miscfiles.if
+++ b/policy/modules/system/miscfiles.if
@@ -131,6 +131,26 @@ interface(`miscfiles_read_generic_certs',`
 	read_lnk_files_pattern($1, cert_t, cert_t)
 ')
 
+########################################
+## <summary>
+##	Do not audit attempts to search
+##	on a generic certs directory.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain to not audit.
+##	</summary>
+## </param>
+## <rolecap/>
+#
+interface(`miscfiles_dontaudit_search_generic_certs',`
+	gen_require(`
+		type cert_t;
+	')
+
+	dontaudit $1 cert_t:dir search;
+')
+
 ########################################
 ## <summary>
 ##	Manage generic SSL/TLS certificates.
-- 
2.20.1


^ permalink raw reply related	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2019-02-20  3:33 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-02-12 13:05 [PATCH] New interface to dontaudit access to cert_t Sugar, David
2019-02-13 23:42 ` Chris PeBenito
2019-02-14 13:56   ` Sugar, David
2019-02-16 19:40     ` Chris PeBenito
2019-02-17 16:34       ` Sugar, David
2019-02-20  3:33         ` Chris PeBenito

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).