httpd newbie / access denied, no permission to ~userid

Tim ignored_mailbox at yahoo.com.au
Tue Aug 16 12:31:44 UTC 2005


Tim:

>> For instance, I'd tried using some CGI (and other languages) scripts to
>> do various things, such as show a man page in the browser.  To do so
>> with SELinux would require changing lots of permissions in various
>> places.  It's tedious to do, and not intuitive (there's some damn awful
>> labelling involved with SELinux).


Rahul Sundaram wrote:

> should be easy enough to enable httpd_enable_cgi if it isnt already. The 
> following Apache related booleans are available
> 
> allow_httpd_anon_write --> inactive
> allow_httpd_sys_script_anon_write --> inactive
> httpd_builtin_scripting --> active
> httpd_can_network_connect --> inactive
> httpd_disable_trans --> inactive
> httpd_enable_cgi --> active
> httpd_enable_homedirs --> active
> httpd_ssi_exec --> active
> httpd_suexec_disable_trans --> inactive
> httpd_tty_comm --> inactive
> httpd_unified --> active

That wasn't the problem.  The real problem (i.e. horrible mess to deal
with), is when your script wants to read from other files on the system
(e.g. man files, fortune cookie files, etc.).  You have to change their
permissions to be HTTP servable, even if they were already
world-readable.

> You can use system-config-securitylevel or setsebool

There isn't a correspondingly simple way to change the restrictions on
files and directories, SELinux labels still aren't even just *displayed*
in file property dialogues.  You've got to type in really arcane
labelnames to adjust SELinux restrictions on files.

Really, how difficult would it have been for WORLD READABLE file
permissions to be treated as such by SELinux?

> http://www.nsa.gov/selinux/papers/inevit-abs.cfm

                                (Inevitable-angst from BS?)  :-\

I've had a look through their site before.  It's not something that
leaves a good impression on me.

-- 
Don't send private replies to my address, the mailbox is ignored.
I read messages from the public lists.




More information about the fedora-list mailing list