On Mon, May 25, 2020 at 5:49 PM Corey Penford <coreypenford@live.com> wrote:
>
> This is happening on Fedora MATE, release 31. This workstation is domain joined via realm/sssd. Latest updates are all installed and workstation was rebooted.
>
> This only started happening recently enough, but it’s hard to tell if it was a regression in a selinux policy update, or if the behaviour is related to working from home.. I am running XRDP on the Linux workstation at the office, and using a Windows laptop using the Windows RDP client to connect to it from home.
>
> This seems to happen every time the screen locks via timeout on the Linux workstation over my RDP connection. I can’t reproduce it by locking manually, it seems to only happen when the screen locks via the 15 minute inactivity timer, and then goes black from no mouse movement.
>
> Any further info I can provide let me know
> ------------------------------------------------
>
> SELinux is preventing krb5_child from read access on the key labeled unconfined_service_t.
>
> ***** Plugin catchall (100. confidence) suggests **************************
>
> If you believe that krb5_child should be allowed read access on key labeled unconfined_service_t by default.
> Then you should report this as a bug.
> You can generate a local policy module to allow this access.
> Do
> allow this access for now by executing:
> # ausearch -c 'krb5_child' --raw | audit2allow -M my-krb5child
> # semodule -X 300 -i my-krb5child.pp
>
> Additional Information:
> Source Context system_u:system_r:sssd_t:s0
> Target Context system_u:system_r:unconfined_service_t:s0
> Target Objects Unknown [ key ]
> Source krb5_child
> Source Path krb5_child
> Port <Unknown>
> Host PW948
> Source RPM Packages
> Target RPM Packages
> SELinux Policy RPM selinux-policy-targeted-3.14.4-50.fc31.noarch
> Local Policy RPM selinux-policy-targeted-3.14.4-50.fc31.noarch
> Selinux Enabled True
> Policy Type targeted
> Enforcing Mode Enforcing
> Host Name PW948
> Platform Linux PW948 5.6.13-200.fc31.x86_64 #1 SMP Thu May
> 14 23:26:14 UTC 2020 x86_64 x86_64
> Alert Count 4
> First Seen 2020-05-25 14:57:27 EDT
> Last Seen 2020-05-25 14:57:27 EDT
> Local ID d1ee27bb-6ce3-401d-ba7f-45935ad0c3d2
>
> Raw Audit Messages
> type=AVC msg=audit(1590433047.446:422): avc: denied { read } for pid=12279 comm="krb5_child" scontext=system_u:system_r:sssd_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=0
>
>
> Hash: krb5_child,sssd_t,unconfined_service_t,key,read
Fedora selinux policy issues should be reported to the Fedora selinux
list, see https://lists.fedoraproject.org/admin/lists/selinux.lists.fedoraproject.org/,
and/or bugzilla.redhat.com against its policy.