1 |
On Tue, 2004-03-30 at 17:10, Bill McCarty wrote: |
2 |
> neverallow ~{ auth auth_write } shadow_t:file ~getattr; |
3 |
|
4 |
This forces shadow access to only be through PAM, with few exceptions. |
5 |
|
6 |
> To log in via SSH and become the system administrator, I find that I must |
7 |
> add the following permissions, which contradict the constraint: |
8 |
> |
9 |
> allow sshd_t shadow_t:file { getattr read }; |
10 |
> allow sysadm_su_t shadow_t:file { getattr read }; |
11 |
|
12 |
I've not seen this. It seems like you don't have >=pam-0.77 installed, |
13 |
since it affects sshd and su. |
14 |
|
15 |
> I tried to investigate the auth type, but can't find where it's defined. |
16 |
|
17 |
It is an attribute, see attrib.te. |
18 |
|
19 |
> I also find that I must: |
20 |
> |
21 |
> 1. enable reading of random_device_t:chr_file for a variety of subjects. |
22 |
|
23 |
This is most likely related to the glibc SSP __guard_setup issue, and is |
24 |
probably ok to leave denied or dontaudited if you don't use SSP. |
25 |
|
26 |
> 2. enable i/o to device_t:chr_file and *tty_device_t:chr file for a variety |
27 |
> of subjects. |
28 |
|
29 |
This is too broad to make any suggestions. |
30 |
|
31 |
-- |
32 |
Chris PeBenito |
33 |
<pebenito@g.o> |
34 |
Developer, |
35 |
Hardened Gentoo Linux |
36 |
Embedded Gentoo Linux |
37 |
|
38 |
Public Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xE6AF9243 |
39 |
Key fingerprint = B0E6 877A 883F A57A 8E6A CB00 BC8E E42D E6AF 9243 |