[redhat-lspp] mls constraint issue in the java_t domain

Stephen Smalley sds at tycho.nsa.gov
Wed May 30 17:09:38 UTC 2007


On Tue, 2007-05-29 at 15:42 -0700, Clarkson, Mike R (US SSA) wrote:
> Thanks for the response.
> 
> I agree that using newrole would likely avoid this issue by relabeling
> the the pty, but I'm really interested in understanding why providing
> the following two things doesn't satisfy the security monitor:
> 	allow java_t devpts_t:chr_file write;
> 	mls_file_write_down(java_t)
> 
> I thought that because I have given the file write down privilege, I'd
> be able to write to the pty with a lower mls level. I'd like to be able
> to look at the audit log AVC messages and determine what rules are
> needed. I thought I was getting there, but this one has thrown me for a
> loop.
> 
> Can anyone explain why the above two rules don't satisfy the security
> monitor with respect to the below AVC denial message?

Not offhand.  Can you send me (off-list) a tar.bz2 file containing
your /etc/selinux/mls directory (or whatever policy you are actively
using, as defined by your /etc/selinux/config SELINUXTYPE= definition).

> 
> Thanks
> 
> -----Original Message-----
> From: Klaus Weidner [mailto:klaus at atsec.com] 
> Sent: Tuesday, May 29, 2007 2:47 PM
> To: Stephen Smalley
> Cc: Clarkson, Mike R (US SSA); redhat-lspp at redhat.com
> Subject: Re: [redhat-lspp] mls constraint issue in the java_t domain
> 
> On Tue, May 29, 2007 at 02:25:10PM -0400, Stephen Smalley wrote:
> > On Fri, 2007-05-25 at 17:26 -0700, Clarkson, Mike R (US SSA) wrote:
> > > I've got the following AVC denial message that I can't get past:
> > > 
> > > type=AVC msg=audit(1180136666.749:225351): avc:  denied  { write }
> for
> > > pid=6603 comm="java" name="3" dev=devpts ino=5
> > > scontext=m252_u:system_r:java_t:s15:c0.c255
> > > tcontext=m252_u:object_r:devpts_t:s0 tclass=chr_file
> [...]
> > > Any ideas for what I need to do to get past this AVC denial?
> > 
> > Use newrole -l, and it will relabel the pty for you.
> 
> If "newrole -l" doesn't work for you and it complains about an insecure
> terminal, you can make that work (for demo purposes) by adding the type
> of your terminal (as shown by "ls -lZ `tty`" to the
> /etc/selinux/mls/contexts/securetty_types file.
> 
> -Klaus
> 
-- 
Stephen Smalley
National Security Agency




More information about the redhat-lspp mailing list