Gentoo Archives: gentoo-hardened

From: Chris PeBenito <pebenito@g.o>
To: Bill McCarty <bmccarty@××××××.net>
Cc: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] SELinux policy rules concerning access to /etc/shadow
Date: Fri, 02 Apr 2004 01:52:34
Message-Id: 1080870744.3195.7.camel@gorn.pebenito.net
In Reply to: [gentoo-hardened] SELinux policy rules concerning access to /etc/shadow by Bill McCarty
1 On Tue, 2004-03-30 at 17:10, Bill McCarty wrote:
2 > neverallow ~{ auth auth_write } shadow_t:file ~getattr;
3
4 This forces shadow access to only be through PAM, with few exceptions.
5
6 > To log in via SSH and become the system administrator, I find that I must
7 > add the following permissions, which contradict the constraint:
8 >
9 > allow sshd_t shadow_t:file { getattr read };
10 > allow sysadm_su_t shadow_t:file { getattr read };
11
12 I've not seen this. It seems like you don't have >=pam-0.77 installed,
13 since it affects sshd and su.
14
15 > I tried to investigate the auth type, but can't find where it's defined.
16
17 It is an attribute, see attrib.te.
18
19 > I also find that I must:
20 >
21 > 1. enable reading of random_device_t:chr_file for a variety of subjects.
22
23 This is most likely related to the glibc SSP __guard_setup issue, and is
24 probably ok to leave denied or dontaudited if you don't use SSP.
25
26 > 2. enable i/o to device_t:chr_file and *tty_device_t:chr file for a variety
27 > of subjects.
28
29 This is too broad to make any suggestions.
30
31 --
32 Chris PeBenito
33 <pebenito@g.o>
34 Developer,
35 Hardened Gentoo Linux
36 Embedded Gentoo Linux
37
38 Public Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xE6AF9243
39 Key fingerprint = B0E6 877A 883F A57A 8E6A CB00 BC8E E42D E6AF 9243

Attachments

File name MIME type
signature.asc application/pgp-signature

Replies

Subject Author
Re: [gentoo-hardened] SELinux policy rules concerning access to /etc/shadow Bill McCarty <bmccarty@××××××.net>