Open paulraines68 opened 3 years ago
Paul Raines notifications@github.com writes:
I my samba config I have
idmap config MYDOMAIN : script = /etc/samba/idmap_script.sh
In the past this just required
semanage fcontext -a -t winbind_exec_t /etc/samba/idmap_script.sh
Looking at the history of that module I cannot identify that ever being allowed. Nevertheless , accorcing to the policy you should be able to use type bin_t instead:
semanage fcontext -d -t winbind_exec_t /etc/samba/idmap_script.sh
semanage fcontext -d -t bin_t "/etc/samba/idmap_script.sh"
restorecon -vF /etc/samba/idmap_script.sh
That should address the issue
However, I am getting permission denied failures now with calling of the script. It works with SELINUX disabled. The audit log has
type=AVC msg=audit(1611357144.362:11289): avc: denied { execute_no_trans } for pid=298160 comm="winbindd" path="/etc/samba/idmap_script.sh" dev="nvme0n1p5" ino=2098041 scontext=system_u:system_r:winbind_t:s0 tcontext=unconfined_u:object_r:winbind_exec_t:s0 tclass=file permissive=1
which means I need
allow winbind_t winbind_exec_t:file execute_no_trans;
Am I missing something or is this something that should be added to default selinux-policy files now?
I have CentOS 8.2.2004 with samba 4.11.2-13 and selinux-policy 3.14.3-41
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub, or unsubscribe.
-- gpg --locate-keys dominick.grift@defensec.nl Key fingerprint = FCD2 3660 5D6B 9D27 7FC6 E0FF DA7E 521F 10F6 4098 https://sks-keyservers.net/pks/lookup?op=get&search=0xDA7E521F10F64098 Dominick Grift
Dominick Grift dominick.grift@defensec.nl writes:
Paul Raines notifications@github.com writes:
I my samba config I have
idmap config MYDOMAIN : script = /etc/samba/idmap_script.sh
In the past this just required
semanage fcontext -a -t winbind_exec_t /etc/samba/idmap_script.sh
Looking at the history of that module I cannot identify that ever being allowed. Nevertheless , accorcing to the policy you should be able to use type bin_t instead:
remove existing spec
semanage fcontext -d -t winbind_exec_t /etc/samba/idmap_script.sh
add new spec
semanage fcontext -d -t bin_t "/etc/samba/idmap_script.sh"
err, make that: semanage fcontext -a -t bin_t "/etc/samba/idmap_script.sh"
reset
restorecon -vF /etc/samba/idmap_script.sh
That should address the issue
However, I am getting permission denied failures now with calling of the script. It works with SELINUX disabled. The audit log has
type=AVC msg=audit(1611357144.362:11289): avc: denied { execute_no_trans } for pid=298160 comm="winbindd" path="/etc/samba/idmap_script.sh" dev="nvme0n1p5" ino=2098041 scontext=system_u:system_r:winbind_t:s0 tcontext=unconfined_u:object_r:winbind_exec_t:s0 tclass=file permissive=1
which means I need
allow winbind_t winbind_exec_t:file execute_no_trans;
Am I missing something or is this something that should be added to default selinux-policy files now?
I have CentOS 8.2.2004 with samba 4.11.2-13 and selinux-policy 3.14.3-41
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub, or unsubscribe.
-- gpg --locate-keys dominick.grift@defensec.nl Key fingerprint = FCD2 3660 5D6B 9D27 7FC6 E0FF DA7E 521F 10F6 4098 https://sks-keyservers.net/pks/lookup?op=get&search=0xDA7E521F10F64098 Dominick Grift
I received a similar report from another Centos8 user on IRC but in his case for shorewall. I think some policy bug did creep in rhel8 where the execute_no_trans permission was removed from some permission set, pattern or otherwise lower level macro.
So now it seems that callers of that macro blow up all over the place because they relied on "execute_no_trans"
I couldnt quite find that change in this repository though so maybe its rhel8 specific (not sure where those sources are hosted). Probably best to file bug report using the appropriate channels
never mind that was a slightly different issue...
I my samba config I have
idmap config MYDOMAIN : script = /etc/samba/idmap_script.sh
In the past this just required
semanage fcontext -a -t winbind_exec_t /etc/samba/idmap_script.sh
However, I am getting permission denied failures now with calling of the script. It works with SELINUX disabled. The audit log has
which means I need
Am I missing something or is this something that should be added to default selinux-policy files now?
I have CentOS 8.2.2004 with samba 4.11.2-13 and selinux-policy 3.14.3-41