1 |
The policy file for passwd (passwd.fc) has this: |
2 |
|
3 |
/usrbin/passwd -- system_u:object_r:passwd_exec_t |
4 |
|
5 |
However, in shadow-4.0.5-r2, the real passwd is in /bin and |
6 |
/usr/bin/passwd is a symlink. /bin/passwd has a |
7 |
system_u:object_r:bin_t context (hope I'm getting the terminology |
8 |
right here). As a result, you get "token manipulation errors". The |
9 |
denial is for /etc/.pwd.lock, which is system_u:object_r:shadow_t. |
10 |
|
11 |
Changing the above entry from /usr/bin/passwd to /bin/passwd, doing a |
12 |
make load, and relabeling /bin so that /bin/passwd has |
13 |
system_u:object_r:passwd_exec_t fixes the problem. |
14 |
|
15 |
Is this the correct fix? I feel like I am still stumbling in the dark |
16 |
with SELinux, but this looks like a problem in selinux-base-policy. I |
17 |
have sec-policy/selinux-base-policy-20040906. |
18 |
|
19 |
-- |
20 |
Computer interfaces should never be made of meat. |
21 |
|
22 |
Using GMail? Setting Reply-to address to <> disables this annoying feature. |
23 |
|
24 |
-- |
25 |
gentoo-hardened@g.o mailing list |