<feed xmlns='http://www.w3.org/2005/Atom'>
<title>ds.git/selinux, branch master</title>
<subtitle>Unnamed repository; edit this file to name it for gitweb.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/'/>
<entry>
<title>Bug 594745 - Get rid of dirsrv_lib_t label</title>
<updated>2010-08-03T17:34:47+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2010-07-29T22:16:44+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=b0b88c2096d02821060bd1b69c9ba675cd26adc3'/>
<id>b0b88c2096d02821060bd1b69c9ba675cd26adc3</id>
<content type='text'>
The dirsrv_lib_t label used to label the dirsrv libraries is causing
AVCs to occur from prelink.  It turns out that the dirsrv_lib_t
label is not really necessary.  We can just allow our libraries to
use the default label of lib_t.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The dirsrv_lib_t label used to label the dirsrv libraries is causing
AVCs to occur from prelink.  It turns out that the dirsrv_lib_t
label is not really necessary.  We can just allow our libraries to
use the default label of lib_t.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 613833 - Allow dirsrv_t to bind to rpc ports</title>
<updated>2010-07-13T18:28:07+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2010-07-13T18:28:07+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=b7a93e6ba4e5c11585399078efd8ec67230afdbc'/>
<id>b7a93e6ba4e5c11585399078efd8ec67230afdbc</id>
<content type='text'>
The slapi-nis plug-in needs the dirsrv SELinux policy to allow
ns-slapd to bind to rpc ports.  This adds the appropriate macros
to the dirsrv policy.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The slapi-nis plug-in needs the dirsrv SELinux policy to allow
ns-slapd to bind to rpc ports.  This adds the appropriate macros
to the dirsrv policy.
</pre>
</div>
</content>
</entry>
<entry>
<title>609256  - Selinux: pwdhash fails if called via Admin Server CGI</title>
<updated>2010-06-29T19:11:46+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-06-29T19:11:46+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=1a47871230d6cd088e08b8af42072e2560b423ec'/>
<id>1a47871230d6cd088e08b8af42072e2560b423ec</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=609256

Description by nkinder@redhat.com:
Our CGIs are very restricted in what they can access/run.  Most of
the CGIs are self contained programs (they may use libraries, which
is fine).  In this case, it looks like pwdhash-bin is called from
the SELinux context used by CGIs (httpd_dirsrvadmin_script_t).  The
pwdhash-bin program then tries to load libslapd.so.0, which is labeled
as dirsrv_lib_t.  This should be allowed by our SELinux policy since
we call this macro with the httpd_dirsrvadmin_script_t contex.  What
seems to be the issue here is that libslapd.so.0 is a symlink, not a
regular file.  SELinux considers this to be a class of "lnk_file",
as can be seen in the raw AVC from /var/log/audit/audit.  We need to
expand the dirsrv_exec_lib macro to cover link_file.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=609256

Description by nkinder@redhat.com:
Our CGIs are very restricted in what they can access/run.  Most of
the CGIs are self contained programs (they may use libraries, which
is fine).  In this case, it looks like pwdhash-bin is called from
the SELinux context used by CGIs (httpd_dirsrvadmin_script_t).  The
pwdhash-bin program then tries to load libslapd.so.0, which is labeled
as dirsrv_lib_t.  This should be allowed by our SELinux policy since
we call this macro with the httpd_dirsrvadmin_script_t contex.  What
seems to be the issue here is that libslapd.so.0 is a symlink, not a
regular file.  SELinux considers this to be a class of "lnk_file",
as can be seen in the raw AVC from /var/log/audit/audit.  We need to
expand the dirsrv_exec_lib macro to cover link_file.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 570912 - Avoid selinux context conflict with httpd</title>
<updated>2010-04-01T19:00:58+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2010-04-01T18:37:21+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=6f4d92143892524fe55e1a80e8ca58fd708872ae'/>
<id>6f4d92143892524fe55e1a80e8ca58fd708872ae</id>
<content type='text'>
One of the dirsrv selinux module interfaces used by the admin
server creates a conflict with the httpd policy.  This change
pulls out the conflicting rule from the interface used to extend
the httpd policy.  A new interface is available with the rule that
was pulled out for use by the admin server CGIs (which causes no
conflict for httpd).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
One of the dirsrv selinux module interfaces used by the admin
server creates a conflict with the httpd policy.  This change
pulls out the conflicting rule from the interface used to extend
the httpd policy.  A new interface is available with the rule that
was pulled out for use by the admin server CGIs (which causes no
conflict for httpd).
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix syntax error in selinux interface.</title>
<updated>2010-01-18T19:37:18+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2010-01-18T19:37:18+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=f6d937e8189a5ebc2d096731bf811f3b370db612'/>
<id>f6d937e8189a5ebc2d096731bf811f3b370db612</id>
<content type='text'>
There was a simple syntax error in the dirsrv SELinux interface
file.  This would cause issues building the admin server SELinux
policy.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
There was a simple syntax error in the dirsrv SELinux interface
file.  This would cause issues building the admin server SELinux
policy.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 518084 - Fix out of order retro changelog entries</title>
<updated>2009-12-15T22:16:04+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2009-12-15T22:16:04+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=cf0fcc51746c7e280ada377d37cdab318fd231e9'/>
<id>cf0fcc51746c7e280ada377d37cdab318fd231e9</id>
<content type='text'>
When using the retro changelog plugin, post-op plugins that perform
internal operations (such as memberOf) can result in the internal
operation preceeding the original operation in the changelog.

The fix is to give the retro changelog a higher precedence than the
other post-op plugins.  This required some core server changes to
be made around the plugin precedence to allow an object plugin to
pass it's precedence into it's calls to slapi_register_plugin()
when it registers other plugin types.

I added an update LDIF to set the plugin precedence when running
"setup-ds.pl -u".  I also noticed an AVC when restarting after the
update due to the schema.bak directory that is created.  I've
adjusted the dirsrv SELinux policy to deal with this AVC.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When using the retro changelog plugin, post-op plugins that perform
internal operations (such as memberOf) can result in the internal
operation preceeding the original operation in the changelog.

The fix is to give the retro changelog a higher precedence than the
other post-op plugins.  This required some core server changes to
be made around the plugin precedence to allow an object plugin to
pass it's precedence into it's calls to slapi_register_plugin()
when it registers other plugin types.

I added an update LDIF to set the plugin precedence when running
"setup-ds.pl -u".  I also noticed an AVC when restarting after the
update due to the schema.bak directory that is created.  I've
adjusted the dirsrv SELinux policy to deal with this AVC.
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow dirsrv_t to have fsetid capability</title>
<updated>2009-12-11T18:04:36+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2009-12-11T18:04:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=24e6ca2262e1fa9114fb80b5d2f32205379d3a97'/>
<id>24e6ca2262e1fa9114fb80b5d2f32205379d3a97</id>
<content type='text'>
I ran into an SELinux violation during some testing.  This patch
allows ns-slapd to have the fsetid capability on itself, which
eliminates the AVC.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
I ran into an SELinux violation during some testing.  This patch
allows ns-slapd to have the fsetid capability on itself, which
eliminates the AVC.
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow dirsrv_t to log to a fifo in SELinux policy.</title>
<updated>2009-11-24T18:35:30+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2009-11-23T17:48:50+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=b2e2a3f5294707e1ccf2b25fd281ce3653dac819'/>
<id>b2e2a3f5294707e1ccf2b25fd281ce3653dac819</id>
<content type='text'>
This patch changes the SELinux dirsrv policy to allow ns-slapd to
log to a fifo file.
Author: nkinder (Thanks!)
Tested on RHEL5 i386
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This patch changes the SELinux dirsrv policy to allow ns-slapd to
log to a fifo file.
Author: nkinder (Thanks!)
Tested on RHEL5 i386
</pre>
</div>
</content>
</entry>
<entry>
<title>529909 - Update SELinux policy for SASL GSSAPI</title>
<updated>2009-10-30T15:44:34+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2009-10-30T15:44:34+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=027e8a4fbd4761a5c7ae4a9cc82befe4741e2dd5'/>
<id>027e8a4fbd4761a5c7ae4a9cc82befe4741e2dd5</id>
<content type='text'>
The dirsrv SELinux policy needs some changes to allow SASL GSSAPI
authentication to work.  We need to allow ns-slapd to read the
krb5.conf file and to create the in memory credentials cache.  The
kerberos libraries also attempt to open the krb5.conf in write mode,
so we need to prevent those attempts from being audited.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The dirsrv SELinux policy needs some changes to allow SASL GSSAPI
authentication to work.  We need to allow ns-slapd to read the
krb5.conf file and to create the in memory credentials cache.  The
kerberos libraries also attempt to open the krb5.conf in write mode,
so we need to prevent those attempts from being audited.
</pre>
</div>
</content>
</entry>
<entry>
<title>Extend dirsrv SELinux policy interface.</title>
<updated>2009-10-22T21:56:06+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2009-10-22T21:56:06+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/edewata/public_git/ds.git/commit/?id=41fa124aeec3b6bc86f28d69aeccb0e02f382aeb'/>
<id>41fa124aeec3b6bc86f28d69aeccb0e02f382aeb</id>
<content type='text'>
The dirsrv SELinux policy interface needed to be extended to
allow the confined Admin Server the proper permissions to
interact with the Directory Server.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The dirsrv SELinux policy interface needed to be extended to
allow the confined Admin Server the proper permissions to
interact with the Directory Server.
</pre>
</div>
</content>
</entry>
</feed>
