此内容没有您所选择的语言版本。
Managing Confined Services
Red Hat Enterprise Linux 6
Guide to configuring services under control of SELinux
Abstract
This book provides assistance to advanced users and administrators when using and configuring Security-Enhanced Linux (SELinux). It focuses on Red Hat Enterprise Linux and describes the components of SELinux as they pertain to services an advanced user or administrator might need to configure. Also included are real-world examples of configuring those services and demonstrations of how SELinux complements their operation.
Chapter 1. Introduction 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Security-Enhanced Linux (SELinux) is an implementation of a mandatory access control mechanism in the Linux kernel, checking for allowed operations after standard discretionary access controls are checked. It was created by the National Security Agency and can enforce rules on files and processes in a Linux system, and on their actions, based on defined policy.
Security-Enhanced Linux (SELinux) refers to files, such as directories and devices, as objects. Processes, such as a user running a command or the Mozilla Firefox application, are referred to as subjects. Most operating systems use a Discretionary Access Control (DAC) system that controls how subjects interact with objects, and how subjects interact with each other. On operating systems using DAC, users control the permissions of files (objects) that they own. For example, on Linux operating systems, users could make their home directories world-readable, inadvertently giving other users and processes (subjects) access to potentially sensitive information.
DAC access decisions are only based on user identity and ownership, ignoring other security-relevant information such as the role of the user, the function and trustworthiness of the program, and the sensitivity and integrity of the data. Each user usually has complete discretion over their files, making it difficult to enforce a system-wide security policy. Furthermore, every program run by a user inherits all of the permissions granted to the user and is free to change access to the user's files, so minimal protection is provided against malicious software. Many system services and privileged programs must run with coarse-grained privileges that far exceed their requirements, so that a flaw in any one of these programs might be exploited to obtain further system access. [1]
The following is an example of permissions used on Linux operating systems that do not run Security-Enhanced Linux (SELinux). The permissions in these examples may differ from your system. Use the
ls -l command to view file permissions:
ls -l file1 -rwxrw-r-- 1 user1 group1 0 2010-01-29 09:17 file1
$ ls -l file1
-rwxrw-r-- 1 user1 group1 0 2010-01-29 09:17 file1
The first three permission bits,
rwx, control the access rights that the Linux user1 user (in this case, the owner) has to file1. The next three permission bits, rw-, control the access rights that the Linux group1 group has to file1. The last three permission bits, r--, control the access rights that everyone else has to file1, which includes all users and processes.
Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Red Hat Enterprise Linux. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. When properly implemented, it enables a system to adequately defend itself and offers critical support for application security by protecting against the tampering with, and bypassing of, secured applications. MAC provides strong separation of applications that permits the safe execution of untrustworthy applications. Its ability to limit the privileges associated with executing processes limits the scope of potential damage that can result from the exploitation of vulnerabilities in applications and system services. MAC enables information to be protected from legitimate users with limited authorization as well as from authorized users who have unwittingly executed malicious applications.[2]
The following is an example of the labels containing security-relevant information that are applied to processes, Linux users, and files, on Linux operating systems that run SELinux. This information is called the SELinux context, and is viewed using the
ls -Z command:
ls -Z file1 -rwxrw-r-- user1 group1 unconfined_u:object_r:user_home_t:s0 file1
$ ls -Z file1
-rwxrw-r-- user1 group1 unconfined_u:object_r:user_home_t:s0 file1
In this example, SELinux provides a user (
unconfined_u), a role (object_r), a type (user_home_t), and a level (s0) for the file1 file. This information is used to make access control decisions. This example also displays the DAC rules, which are shown in the SELinux context via the ls -Z command. SELinux policy rules are checked after DAC rules. SELinux policy rules are not applied if DAC rules deny access first.
Targeted Policy
When SELinux is in enforcing mode, the default policy used in Red Hat Enterprise Linux, is the targeted policy. Processes that are targeted run in a confined domain, and processes that are not targeted run in an unconfined domain. Refer to the Targeted Policy chapter in the Security-Enhanced Linux guide for more information about targeted policy and confined and unconfined processes.
[1]
"Integrating Flexible Support for Security Policies into the Linux Operating System", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is, consequently, in the public domain. Refer to the original paper for details.
[2]
"Meeting Critical Security Objectives with Security-Enhanced Linux", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is in the public domain. Refer to the original paper for details.
Chapter 2. The Apache HTTP Server 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The Apache HTTP Server provides an open-source HTTP server with the current HTTP standards.[3]
In Red Hat Enterprise Linux, the httpd package provides the Apache HTTP Server. Run the
rpm -q httpd command to see if the httpd package is installed. If it is not installed and you want to use the Apache HTTP Server, run the following command as the root user to install it:
yum install httpd
~]# yum install httpd
2.1. The Apache HTTP Server and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When SELinux is enabled, the Apache HTTP Server (
httpd) runs confined by default. Confined processes run in their own domains, and are separated from other confined processes. If a confined process is compromised by an attacker, depending on SELinux policy configuration, an attacker's access to resources and the possible damage they can do is limited. The following example demonstrates the httpd processes running in their own domain. This example assumes the httpd, setroubleshoot, setroubleshoot-server and policycoreutils-python packages are installed:
- Run the
getenforcecommand to confirm SELinux is running in enforcing mode:getenforce Enforcing
~]$ getenforce EnforcingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Thegetenforcecommand returnsEnforcingwhen SELinux is running in enforcing mode. - Run the
service httpd startcommand as the root user to starthttpd:service httpd start Starting httpd: [ OK ]
~]# service httpd start Starting httpd: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ps -eZ | grep httpdcommand to view thehttpdprocesses:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The SELinux context associated with thehttpdprocesses isunconfined_u:system_r:httpd_t:s0. The second last part of the context,httpd_t, is the type. A type defines a domain for processes and a type for files. In this case, thehttpdprocesses are running in thehttpd_tdomain.
SELinux policy defines how processes running in confined domains (such as
httpd_t) interact with files, other processes, and the system in general. Files must be labeled correctly to allow httpd access to them. For example, httpd can read files labeled with the httpd_sys_content_t type, but cannot write to them, even if Linux (DAC) permissions allow write access. Booleans must be enabled to allow certain behavior, such as allowing scripts network access, allowing httpd access to NFS and CIFS volumes, and httpd being allowed to execute Common Gateway Interface (CGI) scripts.
When
/etc/httpd/conf/httpd.conf is configured so httpd listens on a port other than TCP ports 80, 443, 488, 8008, 8009, or 8443, the semanage port command must be used to add the new port number to SELinux policy configuration. The following example demonstrates configuring httpd to listen on a port that is not already defined in SELinux policy configuration for httpd, and, as a consequence, httpd failing to start. This example also demonstrates how to then configure the SELinux system to allow httpd to successfully listen on a non-standard port that is not already defined in the policy. This example assumes the httpd package is installed. Run each command in the example as the root user:
- Run the
service httpd statuscommand to confirmhttpdis not running:service httpd status httpd is stopped
~]# service httpd status httpd is stoppedCopy to Clipboard Copied! Toggle word wrap Toggle overflow If the output differs, run theservice httpd stopcommand to stop the process:service httpd stop Stopping httpd: [ OK ]
~]# service httpd stop Stopping httpd: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
semanage port -l | grep -w http_port_tcommand to view the ports SELinux allowshttpdto listen on:semanage port -l | grep -w http_port_t http_port_t tcp 80, 443, 488, 8008, 8009, 8443
~]# semanage port -l | grep -w http_port_t http_port_t tcp 80, 443, 488, 8008, 8009, 8443Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Edit
/etc/httpd/conf/httpd.confas the root user. Configure theListenoption so it lists a port that is not configured in SELinux policy configuration forhttpd. In this example,httpdis configured to listen on port 12345:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
service httpd startcommand to starthttpd:service httpd start Starting httpd: (13)Permission denied: make_sock: could not bind to address 127.0.0.1:12345 no listening sockets available, shutting down Unable to open logs [FAILED]
~]# service httpd start Starting httpd: (13)Permission denied: make_sock: could not bind to address 127.0.0.1:12345 no listening sockets available, shutting down Unable to open logs [FAILED]Copy to Clipboard Copied! Toggle word wrap Toggle overflow An SELinux denial similar to the following is logged:setroubleshoot: SELinux is preventing the httpd (httpd_t) from binding to port 12345. For complete SELinux messages. run sealert -l f18bca99-db64-4c16-9719-1db89f0d8c77
setroubleshoot: SELinux is preventing the httpd (httpd_t) from binding to port 12345. For complete SELinux messages. run sealert -l f18bca99-db64-4c16-9719-1db89f0d8c77Copy to Clipboard Copied! Toggle word wrap Toggle overflow - For SELinux to allow
httpdto listen on port 12345, as used in this example, the following command is required:semanage port -a -t http_port_t -p tcp 12345
~]# semanage port -a -t http_port_t -p tcp 12345Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run
service httpd startagain to starthttpdand have it listen on the new port:service httpd start Starting httpd: [ OK ]
~]# service httpd start Starting httpd: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Now that SELinux has been configured to allow
httpdto listen on a non-standard port (TCP 12345 in this example),httpdstarts successfully on this port. - To prove that
httpdis listening and communicating on TCP port 12345, open a telnet connection to the specified port and issue a HTTP GET command, as follows:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following example creates a new file in the
/var/www/html/ directory, and shows the file inheriting the httpd_sys_content_t type from its parent directory (/var/www/html/):
- Run the
ls -dZ /var/www/htmlcommand to view the SELinux context of/var/www/html/:ls -dZ /var/www/html drwxr-xr-x root root system_u:object_r:httpd_sys_content_t:s0 /var/www/html
~]$ ls -dZ /var/www/html drwxr-xr-x root root system_u:object_r:httpd_sys_content_t:s0 /var/www/htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow This shows/var/www/html/is labeled with thehttpd_sys_content_ttype. - Run the
touch /var/www/html/file1command as the root user to create a new file. - Run the
ls -Z /var/www/html/file1command to view the SELinux context:ls -Z /var/www/html/file1 -rw-r--r-- root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/file1
~]$ ls -Z /var/www/html/file1 -rw-r--r-- root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/file1Copy to Clipboard Copied! Toggle word wrap Toggle overflow
The
ls -Z command shows file1 labeled with the httpd_sys_content_t type. SELinux allows httpd to read files labeled with this type, but not write to them, even if Linux permissions allow write access. SELinux policy defines what types a process running in the httpd_t domain (where httpd runs) can read and write to. This helps prevent processes from accessing files intended for use by another process.
For example,
httpd can access files labeled with the httpd_sys_content_t type (intended for the Apache HTTP Server), but by default, cannot access files labeled with the samba_share_t type (intended for Samba). Also, files in user home directories are labeled with the user_home_t type: by default, this prevents httpd from reading or writing to files in user home directories.
The following lists some of the types used with
httpd. Different types allow you to configure flexible access:
httpd_sys_content_t- Use this type for static web content, such as
.htmlfiles used by a static website. Files labeled with this type are accessible (read only) tohttpdand scripts executed byhttpd. By default, files and directories labeled with this type cannot be written to or modified byhttpdor other processes. Note that by default, files created in or copied into/var/www/html/are labeled with thehttpd_sys_content_ttype. httpd_sys_script_exec_t- Use this type for scripts you want
httpdto execute. This type is commonly used for Common Gateway Interface (CGI) scripts in/var/www/cgi-bin/. By default, SELinux policy preventshttpdfrom executing CGI scripts. To allow this, label the scripts with thehttpd_sys_script_exec_ttype and enable thehttpd_enable_cgiBoolean. Scripts labeled withhttpd_sys_script_exec_trun in thehttpd_sys_script_tdomain when executed byhttpd. Thehttpd_sys_script_tdomain has access to other system domains, such aspostgresql_tandmysqld_t. httpd_sys_rw_content_t- Files labeled with this type can be written to by scripts labeled with the
httpd_sys_script_exec_ttype, but cannot be modified by scripts labeled with any other type. You must use thehttpd_sys_rw_content_ttype to label files that will be read from and written to by scripts labeled with thehttpd_sys_script_exec_ttype. httpd_sys_ra_content_t- Files labeled with this type can be appended to by scripts labeled with the
httpd_sys_script_exec_ttype, but cannot be modified by scripts labeled with any other type. You must use thehttpd_sys_ra_content_ttype to label files that will be read from and appended to by scripts labeled with thehttpd_sys_script_exec_ttype. httpd_unconfined_script_exec_t- Scripts labeled with this type run without SELinux protection. Only use this type for complex scripts, after exhausting all other options. It is better to use this type instead of disabling SELinux protection for
httpd, or for the entire system.
Note
To see more of the available types for httpd, run the following command:
Copy to Clipboard
Copied!
Toggle word wrap
Toggle overflow
grep httpd /etc/selinux/targeted/contexts/files/file_contexts
~]$ grep httpd /etc/selinux/targeted/contexts/files/file_contexts
Procedure 2.1. Changing the SELinux Context
The type for files and directories can be changed with the
chcon command. Changes made with chcon do not survive a file system relabel or the restorecon command. SELinux policy controls whether users are able to modify the SELinux context for any given file. The following example demonstrates creating a new directory and an index.html file for use by httpd, and labeling that file and directory to allow httpd access to them:
- Run the
mkdir -p /my/websitecommand as the root user to create a top-level directory structure to store files to be used byhttpd. - Files and directories that do not match a pattern in file-context configuration may be labeled with the
default_ttype. This type is inaccessible to confined services:ls -dZ /my drwxr-xr-x root root unconfined_u:object_r:default_t:s0 /my
~]$ ls -dZ /my drwxr-xr-x root root unconfined_u:object_r:default_t:s0 /myCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
chcon -R -t httpd_sys_content_t /my/command as the root user to change the type of the/my/directory and subdirectories, to a type accessible tohttpd. Now, files created under/my/website/inherit thehttpd_sys_content_ttype, rather than thedefault_ttype, and are therefore accessible to httpd:chcon -R -t httpd_sys_content_t /my/ touch /my/website/index.html ls -Z /my/website/index.html -rw-r--r-- root root unconfined_u:object_r:httpd_sys_content_t:s0 /my/website/index.html
~]# chcon -R -t httpd_sys_content_t /my/ ~]# touch /my/website/index.html ~]# ls -Z /my/website/index.html -rw-r--r-- root root unconfined_u:object_r:httpd_sys_content_t:s0 /my/website/index.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Refer to the Temporary Changes: chcon section of the Red Hat Enterprise Linux 6 SELinux User Guide for further information about
chcon.
Use the
semanage fcontext command (semanage is provided by the policycoreutils-python package) to make label changes that survive a relabel and the restorecon command. This command adds changes to file-context configuration. Then, run restorecon, which reads file-context configuration, to apply the label change. The following example demonstrates creating a new directory and an index.html file for use by httpd, and persistently changing the label of that directory and file to allow httpd access to them:
- Run the
mkdir -p /my/websitecommand as the root user to create a top-level directory structure to store files to be used byhttpd. - Run the following command as the root user to add the label change to file-context configuration:
semanage fcontext -a -t httpd_sys_content_t "/my(/.*)?"
~]# semanage fcontext -a -t httpd_sys_content_t "/my(/.*)?"Copy to Clipboard Copied! Toggle word wrap Toggle overflow The"/my(/.*)?"expression means the label change applies to the/my/directory and all files and directories under it. - Run the
touch /my/website/index.htmlcommand as the root user to create a new file. - Run the
restorecon -R -v /my/command as the root user to apply the label changes (restoreconreads file-context configuration, which was modified by thesemanagecommand in step 2):restorecon -R -v /my/ restorecon reset /my context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0 restorecon reset /my/website context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0 restorecon reset /my/website/index.html context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0
~]# restorecon -R -v /my/ restorecon reset /my context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0 restorecon reset /my/website context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0 restorecon reset /my/website/index.html context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Refer to the Persistent Changes: semanage fcontext section of the Red Hat Enterprise Linux SELinux User Guide for further information on semanage.
2.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. This can be achieved via Booleans that allow parts of SELinux policy to be changed at runtime, without any knowledge of SELinux policy writing. This allows changes, such as allowing services access to NFS volumes, without reloading or recompiling SELinux policy.
To modify the state of a Boolean, use the
setsebool command. For example, to enable the allow_httpd_anon_write Boolean, run the following command as the root user:
setsebool -P allow_httpd_anon_write on
~]# setsebool -P allow_httpd_anon_write on
To disable a Boolean, using the same example, simply change
on to off in the command, as shown below:
setsebool -P allow_httpd_anon_write off
~]# setsebool -P allow_httpd_anon_write off
Note
Do not use the
-P option if you do not want setsebool changes to persist across reboots.
Below is a description of common Booleans available that cater for the way
httpd is running:
allow_httpd_anon_write- When disabled, this Boolean allows
httpdto only have read access to files labeled with thepublic_content_rw_ttype. Enabling this Boolean will allowhttpdto write to files labeled with thepublic_content_rw_ttype, such as a public directory containing files for a public file transfer service. allow_httpd_mod_auth_ntlm_winbind- Enabling this Boolean allows access to NTLM and Winbind authentication mechanisms via the
mod_auth_ntlm_winbindmodule inhttpd. allow_httpd_mod_auth_pam- Enabling this Boolean allows access to PAM authentication mechanisms via the
mod_auth_pammodule inhttpd. allow_httpd_sys_script_anon_write- This Boolean defines whether or not HTTP scripts are allowed write access to files labeled with the
public_content_rw_ttype, as used in a public file transfer service. httpd_builtin_scripting- This Boolean defines access to
httpdscripting. Having this Boolean enabled is often required for PHP content. httpd_can_network_connect- When disabled, this Boolean prevents HTTP scripts and modules from initiating a connection to a network or remote port. Enable this Boolean to allow this access.
httpd_can_network_connect_db- When disabled, this Boolean prevents HTTP scripts and modules from initiating a connection to database servers. Enable this Boolean to allow this access.
httpd_can_network_relay- Enable this Boolean when
httpdis being used as a forward or reverse proxy. httpd_can_sendmail- When disabled, this Boolean prevents HTTP modules from sending mail. This can prevent spam attacks should a vulnerability be found in
httpd. Enable this Boolean to allow HTTP modules to send mail. httpd_dbus_avahi- When off, this Boolean denies
httpdaccess to theavahiservice viaD-Bus. Enable this Boolean to allow this access. httpd_enable_cgi- When disabled, this Boolean prevents
httpdfrom executing CGI scripts. Enable this Boolean to allowhttpdto execute CGI scripts (CGI scripts must be labeled with thehttpd_sys_script_exec_ttype). httpd_enable_ftp_server- Enabling this Boolean will allow
httpdto listen on the FTP port and act as an FTP server. httpd_enable_homedirs- When disabled, this Boolean prevents
httpdfrom accessing user home directories. Enable this Boolean to allowhttpdaccess to user home directories; for example, content in/home/*/. httpd_execmem- When enabled, this Boolean allows
httpdto execute programs that require memory addresses that are both executable and writable. Enabling this Boolean is not recommended from a security standpoint as it reduces protection against buffer overflows, however certain modules and applications (such as Java and Mono applications) require this privilege. httpd_ssi_exec- This Boolean defines whether or not server side include (SSI) elements in a web page can be executed.
httpd_tty_comm- This Boolean defines whether or not
httpdis allowed access to the controlling terminal. Usually this access is not required, however in cases such as configuring an SSL certificate file, terminal access is required to display and process a password prompt. httpd_unified- When enabled, this Boolean allows
httpd_tcomplete access to all of thehttpdtypes (that is to execute, read, or write sys_content_t). When disabled, there is separation in place between web content that is read-only, writable or executable. Disabling this Boolean ensures an extra level of security but adds the administrative overhead of having to individually label scripts and other web content based on the file access that each should have. httpd_use_cifs- Enable this Boolean to allow
httpdaccess to files on CIFS volumes that are labeled with thecifs_ttype, such as file systems mounted via Samba. httpd_use_nfs- Enable this Boolean to allow
httpdaccess to files on NFS volumes that are labeled with thenfs_ttype, such as file systems mounted via NFS.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
2.4. Configuration examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The following examples provide real-world demonstrations of how SELinux complements the Apache HTTP Server and how full function of the Apache HTTP Server can be maintained.
2.4.1. Running a static site 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
To create a static website, label the
.html files for that website with the httpd_sys_content_t type. By default, the Apache HTTP Server cannot write to files that are labeled with the httpd_sys_content_t type. The following example creates a new directory to store files for a read-only website:
- Run the
mkdir /mywebsitecommand as the root user to create a top-level directory. - As the root user, create a
/mywebsite/index.htmlfile. Copy and paste the following content into/mywebsite/index.html:<html> <h2>index.html from /mywebsite/</h2> </html>
<html> <h2>index.html from /mywebsite/</h2> </html>Copy to Clipboard Copied! Toggle word wrap Toggle overflow - To allow the Apache HTTP Server read only access to
/mywebsite/, as well as files and subdirectories under it, label/mywebsite/with thehttpd_sys_content_ttype. Run the following command as the root user to add the label change to file-context configuration:semanage fcontext -a -t httpd_sys_content_t "/mywebsite(/.*)?"
~]# semanage fcontext -a -t httpd_sys_content_t "/mywebsite(/.*)?"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
restorecon -R -v /mywebsitecommand as the root user to make the label changes:restorecon -R -v /mywebsite restorecon reset /mywebsite context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0 restorecon reset /mywebsite/index.html context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0
~]# restorecon -R -v /mywebsite restorecon reset /mywebsite context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0 restorecon reset /mywebsite/index.html context unconfined_u:object_r:default_t:s0->system_u:object_r:httpd_sys_content_t:s0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - For this example, edit
/etc/httpd/conf/httpd.confas the root user. Comment out the existingDocumentRootoption. Add aDocumentRoot "/mywebsite"option. After editing, these options should look as follows:#DocumentRoot "/var/www/html" DocumentRoot "/mywebsite"
#DocumentRoot "/var/www/html" DocumentRoot "/mywebsite"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
service httpd statuscommand as the root user to see the status of the Apache HTTP Server. If the server is stopped, run theservice httpd startcommand as the root user to start it. If the server is running, run theservice httpd restartcommand as the root user to restart the service (this also applies any changes made tohttpd.conf). - Use a web browser to navigate to
http://localhost/index.html. The following is displayed:index.html from /mywebsite/
index.html from /mywebsite/Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.4.2. Sharing NFS and CIFS volumes 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
By default, NFS mounts on the client side are labeled with a default context defined by policy for NFS volumes. In common policies, this default context uses the
nfs_t type. Also, by default, Samba shares mounted on the client side are labeled with a default context defined by policy. In common policies, this default context uses the cifs_t type.
Depending on policy configuration, services may not be able to read files labeled with the
nfs_t or cifs_t types. This may prevent file systems labeled with these types from being mounted and then read or exported by other services. Booleans can be enabled or disabled to control which services are allowed to access the nfs_t and cifs_t types.
Enable the
httpd_use_nfs Boolean to allow httpd to access and share NFS volumes (labeled with the nfs_t type). Run the setsebool command as the root user to enable the Boolean:
setsebool -P httpd_use_nfs on
~]# setsebool -P httpd_use_nfs on
Enable the
httpd_use_cifs Boolean to allow httpd to access and share CIFS volumes (labeled with the cifs_t type). Run the setsebool command as the root user to enable the Boolean:
setsebool -P httpd_use_cifs on
~]# setsebool -P httpd_use_cifs on
Note
Do not use the
-P option if you do not want setsebool changes to persist across reboots.
2.4.3. Sharing files between services 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Type Enforcement helps prevent processes from accessing files intended for use by another process. For example, by default, Samba cannot read files labeled with the
httpd_sys_content_t type, which are intended for use by the Apache HTTP Server. Files can be shared between the Apache HTTP Server, FTP, rsync, and Samba, if the desired files are labeled with the public_content_t or public_content_rw_t type.
The following example creates a directory and files, and allows that directory and files to be shared (read only) through the Apache HTTP Server, FTP, rsync, and Samba:
- Run the
mkdir /sharescommand as the root user to create a new top-level directory to share files between multiple services. - Files and directories that do not match a pattern in file-context configuration may be labeled with the
default_ttype. This type is inaccessible to confined services:ls -dZ /shares drwxr-xr-x root root unconfined_u:object_r:default_t:s0 /shares
~]$ ls -dZ /shares drwxr-xr-x root root unconfined_u:object_r:default_t:s0 /sharesCopy to Clipboard Copied! Toggle word wrap Toggle overflow - As the root user, create a
/shares/index.htmlfile. Copy and paste the following content into/shares/index.html:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Labeling
/shares/with thepublic_content_ttype allows read-only access by the Apache HTTP Server, FTP, rsync, and Samba. Run the following command as the root user to add the label change to file-context configuration:semanage fcontext -a -t public_content_t "/shares(/.*)?"
~]# semanage fcontext -a -t public_content_t "/shares(/.*)?"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
restorecon -R -v /shares/command as the root user to apply the label changes:restorecon -R -v /shares/ restorecon reset /shares context unconfined_u:object_r:default_t:s0->system_u:object_r:public_content_t:s0 restorecon reset /shares/index.html context unconfined_u:object_r:default_t:s0->system_u:object_r:public_content_t:s0
~]# restorecon -R -v /shares/ restorecon reset /shares context unconfined_u:object_r:default_t:s0->system_u:object_r:public_content_t:s0 restorecon reset /shares/index.html context unconfined_u:object_r:default_t:s0->system_u:object_r:public_content_t:s0Copy to Clipboard Copied! Toggle word wrap Toggle overflow
To share
/shares/ through Samba:
- Run the
rpm -q samba samba-common samba-clientcommand to confirm the samba, samba-common, and samba-client packages are installed (version numbers may differ):rpm -q samba samba-common samba-client samba-3.4.0-0.41.el6.3.i686 samba-common-3.4.0-0.41.el6.3.i686 samba-client-3.4.0-0.41.el6.3.i686
~]$ rpm -q samba samba-common samba-client samba-3.4.0-0.41.el6.3.i686 samba-common-3.4.0-0.41.el6.3.i686 samba-client-3.4.0-0.41.el6.3.i686Copy to Clipboard Copied! Toggle word wrap Toggle overflow If any of these packages are not installed, install them by running theyum install package-namecommand as the root user. - Edit
/etc/samba/smb.confas the root user. Add the following entry to the bottom of this file to share the/shares/directory through Samba:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - A Samba account is required to mount a Samba file system. Run the
smbpasswd -a usernamecommand as the root user to create a Samba account, where username is an existing Linux user. For example,smbpasswd -a testusercreates a Samba account for the Linuxtestuseruser:smbpasswd -a testuser New SMB password: Enter a password Retype new SMB password: Enter the same password again Added user testuser.
~]# smbpasswd -a testuser New SMB password: Enter a password Retype new SMB password: Enter the same password again Added user testuser.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Runningsmbpasswd -a username, where username is the user name of a Linux account that does not exist on the system, causes aCannot locate Unix account for 'username'!error. - Run the
service smb startcommand as the root user to start the Samba service:service smb start Starting SMB services: [ OK ]
~]# service smb start Starting SMB services: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
smbclient -U username -L localhostcommand to list the available shares, where username is the Samba account added in step 3. When prompted for a password, enter the password assigned to the Samba account in step 3 (version numbers may differ):Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
mkdir /test/command as the root user to create a new directory. This directory will be used to mount thesharesSamba share. - Run the following command as the root user to mount the
sharesSamba share to/test/, replacing username with the user name from step 3:mount //localhost/shares /test/ -o user=username
~]# mount //localhost/shares /test/ -o user=usernameCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enter the password for username, which was configured in step 3. - Run the
cat /test/index.htmlcommand to view the file, which is being shared through Samba:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
To share
/shares/ through the Apache HTTP Server:
- Run the
rpm -q httpdcommand to confirm the httpd package is installed (version number may differ):rpm -q httpd httpd-2.2.11-6.i386
~]$ rpm -q httpd httpd-2.2.11-6.i386Copy to Clipboard Copied! Toggle word wrap Toggle overflow If this package is not installed, run theyum install httpdcommand as the root user to install it. - Change into the
/var/www/html/directory. Run the following command as the root user to create a link (namedshares) to the/shares/directory:ln -s /shares/ shares
~]# ln -s /shares/ sharesCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
service httpd startcommand as the root user to start the Apache HTTP Server:service httpd start Starting httpd: [ OK ]
~]# service httpd start Starting httpd: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Use a web browser to navigate to
http://localhost/shares. The/shares/index.htmlfile is displayed.
By default, the Apache HTTP Server reads an
index.html file if it exists. If /shares/ did not have index.html, and instead had file1, file2, and file3, a directory listing would occur when accessing http://localhost/shares:
- Run the
rm -i /shares/index.htmlcommand as the root user to remove theindex.htmlfile. - Run the
touch /shares/file{1,2,3}command as the root user to create three files in/shares/:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
service httpd statuscommand as the root user to see the status of the Apache HTTP Server. If the server is stopped, runservice httpd startas the root user to start it. - Use a web browser to navigate to
http://localhost/shares. A directory listing is displayed:
2.4.4. Changing port numbers 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Depending on policy configuration, services may only be allowed to run on certain port numbers. Attempting to change the port a service runs on without changing policy may result in the service failing to start. Run the
semanage port -l | grep -w "http_port_t" command as the root user to list the ports SELinux allows httpd to listen on:
semanage port -l | grep -w http_port_t http_port_t tcp 80, 443, 488, 8008, 8009, 8443
~]# semanage port -l | grep -w http_port_t
http_port_t tcp 80, 443, 488, 8008, 8009, 8443
By default, SELinux allows
http to listen on TCP ports 80, 443, 488, 8008, 8009, or 8443. If /etc/httpd/conf/httpd.conf is configured so that httpd listens on any port not listed for http_port_t, httpd fails to start.
To configure
httpd to run on a port other than TCP ports 80, 443, 488, 8008, 8009, or 8443:
- Edit
/etc/httpd/conf/httpd.confas the root user so theListenoption lists a port that is not configured in SELinux policy forhttpd. The following example configureshttpdto listen on the 10.0.0.1 IP address, and on TCP port 12345:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
semanage port -a -t http_port_t -p tcp 12345command as the root user to add the port to SELinux policy configuration. - Run the
semanage port -l | grep -w http_port_tcommand as the root user to confirm the port is added:semanage port -l | grep -w http_port_t http_port_t tcp 12345, 80, 443, 488, 8008, 8009, 8443
~]# semanage port -l | grep -w http_port_t http_port_t tcp 12345, 80, 443, 488, 8008, 8009, 8443Copy to Clipboard Copied! Toggle word wrap Toggle overflow
If you no longer run
httpd on port 12345, run the semanage port -d -t http_port_t -p tcp 12345 command as the root user to remove the port from policy configuration.
Chapter 3. Samba 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Samba is an open-source implementation of the Server Message Block (SMB) and Common Internet File System (CIFS) protocols that provides file and print services between clients across various operating systems.[4]
In Red Hat Enterprise Linux, the samba package provides the Samba server. Run the
rpm -q samba command to see if the samba package is installed. If it is not installed and you want to use Samba, run the following command as the root user to install it:
yum install samba
~]# yum install samba
3.1. Samba and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When SELinux is enabled, the Samba server (
smbd) runs confined by default. Confined services run in their own domains, and are separated from other confined services. The following example demonstrates the smbd process running in its own domain. This example assumes the samba package is installed:
- Run the
getenforcecommand to confirm SELinux is running in enforcing mode:getenforce Enforcing
~]$ getenforce EnforcingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Thegetenforcecommand returnsEnforcingwhen SELinux is running in enforcing mode. - Run the
service smbd startcommand as the root user to startsmbd:service smb start Starting SMB services: [ OK ]
~]# service smb start Starting SMB services: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ps -eZ | grep smbcommand to view thesmbdprocesses:ps -eZ | grep smb unconfined_u:system_r:smbd_t:s0 16420 ? 00:00:00 smbd unconfined_u:system_r:smbd_t:s0 16422 ? 00:00:00 smbd
~]$ ps -eZ | grep smb unconfined_u:system_r:smbd_t:s0 16420 ? 00:00:00 smbd unconfined_u:system_r:smbd_t:s0 16422 ? 00:00:00 smbdCopy to Clipboard Copied! Toggle word wrap Toggle overflow The SELinux context associated with thesmbdprocesses isunconfined_u:system_r:smbd_t:s0. The second last part of the context,smbd_t, is the type. A type defines a domain for processes and a type for files. In this case, thesmbdprocesses are running in the smbd_t domain.
Files must be labeled correctly to allow
smbd to access and share them. For example, smbd can read and write to files labeled with the samba_share_t type, but by default, cannot access files labeled with the httpd_sys_content_t type, which is intended for use by the Apache HTTP Server. Booleans must be enabled to allow certain behavior, such as allowing home directories and NFS volumes to be exported through Samba, as well as to allow Samba to act as a domain controller.
3.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
Label files with the
samba_share_t type to allow Samba to share them. Only label files you have created, and do not relabel system files with the samba_share_t type: Booleans can be enabled to share such files and directories. SELinux allows Samba to write to files labeled with the samba_share_t type, as long as /etc/samba/smb.conf and Linux permissions are set accordingly.
The
samba_etc_t type is used on certain files in /etc/samba/, such as smb.conf. Do not manually label files with the samba_etc_t type. If files in /etc/samba/ are not labeled correctly, run the restorecon -R -v /etc/samba command as the root user to restore such files to their default contexts. If /etc/samba/smb.conf is not labeled with the samba_etc_t type, the service smb start command may fail and an SELinux denial may be logged. The following is an example denial when /etc/samba/smb.conf was labeled with the httpd_sys_content_t type:
setroubleshoot: SELinux is preventing smbd (smbd_t) "read" to ./smb.conf (httpd_sys_content_t). For complete SELinux messages. run sealert -l deb33473-1069-482b-bb50-e4cd05ab18af
setroubleshoot: SELinux is preventing smbd (smbd_t) "read" to ./smb.conf (httpd_sys_content_t). For complete SELinux messages. run sealert -l deb33473-1069-482b-bb50-e4cd05ab18af
3.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
allow_smbd_anon_write- Having this Boolean enabled allows
smbdto write to a public directory, such as an area reserved for common files that otherwise has no special access restrictions. samba_create_home_dirs- Having this Boolean enabled allows Samba to create new home directories independently. This is often done by mechanisms such as PAM.
samba_domain_controller- When enabled, this Boolean allows Samba to act as a domain controller, as well as giving it permission to execute related commands such as
useradd,groupaddandpasswd. samba_enable_home_dirs- Enabling this Boolean allows Samba to share users' home directories.
samba_export_all_ro- Export any file or directory, allowing read-only permissions. This allows files and directories that are not labeled with the
samba_share_ttype to be shared through Samba. When thesamba_export_all_roBoolean is on, but thesamba_export_all_rwBoolean is off, write access to Samba shares is denied, even if write access is configured in/etc/samba/smb.conf, as well as Linux permissions allowing write access. samba_export_all_rw- Export any file or directory, allowing read and write permissions. This allows files and directories that are not labeled with the
samba_share_ttype to be exported through Samba. Permissions in/etc/samba/smb.confand Linux permissions must be configured to allow write access. samba_run_unconfined- Having this Boolean enabled allows Samba to run unconfined scripts in the
/var/lib/samba/scripts/directory. samba_share_fusefs- This Boolean must be enabled for Samba to share fusefs file systems.
samba_share_nfs- Disabling this Boolean prevents
smbdfrom having full access to NFS shares via Samba. Enabling this Boolean will allow Samba to share NFS volumes. use_samba_home_dirs- Enable this Boolean to use a remote server for Samba home directories.
virt_use_samba- Allow virtual machine access to CIFS files.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
3.4. Configuration examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The following examples provide real-world demonstrations of how SELinux complements the Samba server and how full function of the Samba server can be maintained.
3.4.1. Sharing directories you create 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The following example creates a new directory, and shares that directory through Samba:
- Run the
rpm -q samba samba-common samba-clientcommand to confirm the samba, samba-common, and samba-client packages are installed. If any of these packages are not installed, install them by running theyum install package-namecommand as the root user. - Run the
mkdir /mysharecommand as the root user to create a new top-level directory to share files through Samba. - Run the
touch /myshare/file1command as the root user to create an empty file. This file is used later to verify the Samba share mounted correctly. - SELinux allows Samba to read and write to files labeled with the
samba_share_ttype, as long as/etc/samba/smb.confand Linux permissions are set accordingly. Run the following command as the root user to add the label change to file-context configuration:semanage fcontext -a -t samba_share_t "/myshare(/.*)?"
~]# semanage fcontext -a -t samba_share_t "/myshare(/.*)?"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
restorecon -R -v /mysharecommand as the root user to apply the label changes:restorecon -R -v /myshare restorecon reset /myshare context unconfined_u:object_r:default_t:s0->system_u:object_r:samba_share_t:s0 restorecon reset /myshare/file1 context unconfined_u:object_r:default_t:s0->system_u:object_r:samba_share_t:s0
~]# restorecon -R -v /myshare restorecon reset /myshare context unconfined_u:object_r:default_t:s0->system_u:object_r:samba_share_t:s0 restorecon reset /myshare/file1 context unconfined_u:object_r:default_t:s0->system_u:object_r:samba_share_t:s0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Edit
/etc/samba/smb.confas the root user. Add the following to the bottom of this file to share the/myshare/directory through Samba:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - A Samba account is required to mount a Samba file system. Run the
smbpasswd -a usernamecommand as the root user to create a Samba account, where username is an existing Linux user. For example,smbpasswd -a testusercreates a Samba account for the Linuxtestuseruser:smbpasswd -a testuser New SMB password: Enter a password Retype new SMB password: Enter the same password again Added user testuser.
~]# smbpasswd -a testuser New SMB password: Enter a password Retype new SMB password: Enter the same password again Added user testuser.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Runningsmbpasswd -a username, where username is the user name of a Linux account that does not exist on the system, causes aCannot locate Unix account for 'username'!error. - Run the
service smb startcommand as the root user to start the Samba service:service smb start Starting SMB services: [ OK ]
~]# service smb start Starting SMB services: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
smbclient -U username -L localhostcommand to list the available shares, where username is the Samba account added in step 7. When prompted for a password, enter the password assigned to the Samba account in step 7 (version numbers may differ):Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
mkdir /test/command as the root user to create a new directory. This directory will be used to mount themyshareSamba share. - Run the following command as the root user to mount the
myshareSamba share to/test/, replacing username with the user name from step 7:mount //localhost/myshare /test/ -o user=username
~]# mount //localhost/myshare /test/ -o user=usernameCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enter the password for username, which was configured in step 7. - Run the
ls /test/command to view thefile1file created in step 3:ls /test/ file1
~]$ ls /test/ file1Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.4.2. Sharing a website 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
It may not be possible to label files with the
samba_share_t type, for example, when wanting to share a website in /var/www/html/. For these cases, use the samba_export_all_ro Boolean to share any file or directory (regardless of the current label), allowing read only permissions, or the samba_export_all_rw Boolean to share any file or directory (regardless of the current label), allowing read and write permissions.
The following example creates a file for a website in
/var/www/html/, and then shares that file through Samba, allowing read and write permissions. This example assumes the httpd, samba, samba-common, samba-client, and wget packages are installed:
- As the root user, create a
/var/www/html/file1.htmlfile. Copy and paste the following content into/var/www/html/file1.html:<html> <h2>File being shared through the Apache HTTP Server and Samba.</h2> </html>
<html> <h2>File being shared through the Apache HTTP Server and Samba.</h2> </html>Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ls -Z /var/www/html/file1.htmlcommand to view the SELinux context offile1.html:ls -Z /var/www/html/file1.html -rw-r--r--. root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/file1.html
~]$ ls -Z /var/www/html/file1.html -rw-r--r--. root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/file1.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow file1.index.htmlis labeled with thehttpd_sys_content_t. By default, the Apache HTTP Server can access this type, but Samba cannot. - Run the
service httpd startcommand as the root user to start the Apache HTTP Server:service httpd start Starting httpd: [ OK ]
~]# service httpd start Starting httpd: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Change into a directory your user has write access to, and run the
wget http://localhost/file1.htmlcommand. Unless there are changes to the default configuration, this command succeeds:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Edit
/etc/samba/smb.confas the root user. Add the following to the bottom of this file to share the/var/www/html/directory through Samba:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - The
/var/www/html/directory is labeled with thehttpd_sys_content_ttype. By default, Samba cannot access files and directories labeled with thehttpd_sys_content_ttype, even if Linux permissions allow it. To allow Samba access, run the following command as the root user to enable thesamba_export_all_roBoolean:setsebool -P samba_export_all_ro on
~]# setsebool -P samba_export_all_ro onCopy to Clipboard Copied! Toggle word wrap Toggle overflow Do not use the-Poption if you do not want the change to persist across reboots. Note that enabling thesamba_export_all_roBoolean allows Samba to access any type. - Run
service smb startas the root user to startsmbd:service smb start Starting SMB services: [ OK ]
~]# service smb start Starting SMB services: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 4. File Transfer Protocol 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
File Transfer Protocol (FTP) is one of the oldest and most commonly used protocols found on the Internet today. Its purpose is to reliably transfer files between computer hosts on a network without requiring the user to log directly into the remote host or have knowledge of how to use the remote system. It allows users to access files on remote systems using a standard set of simple commands.
The Very Secure FTP Daemon (
vsftpd) is designed from the ground up to be fast, stable, and, most importantly, secure. Its ability to handle large numbers of connections efficiently and securely is why vsftpd is the only stand-alone FTP distributed with Red Hat Enterprise Linux.
In Red Hat Enterprise Linux, the vsftpd package provides the Very Secure FTP daemon. Run the
rpm -q vsftpd command to see if vsftpd is installed:
rpm -q vsftpd
~]$ rpm -q vsftpd
If you want an FTP server and the vsftpd package is not installed, run the following command as the root user to install it:
yum install vsftpd
~]# yum install vsftpd
4.1. FTP and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The
vsftpd FTP daemon runs confined by default. SELinux policy defines how vsftpd interacts with files, processes, and with the system in general. For example, when an authenticated user logs in via FTP, they cannot read from or write to files in their home directories: SELinux prevents vsftpd from accessing user home directories by default. Also, by default, vsftpd does not have access to NFS or CIFS volumes, and anonymous users do not have write access, even if such write access is configured in /etc/vsftpd/vsftpd.conf. Booleans can be enabled to allow the previously mentioned access.
The following example demonstrates an authenticated user logging in, and an SELinux denial when trying to view files in their home directory:
- Run the
rpm -q ftpcommand to see if the ftp package is installed. If it is not, run theyum install ftpcommand as the root user to install it. - Run the
rpm -q vsftpdcommand to see if the vsftpd package is installed. If it is not, run theyum install vsftpdcommand as the root user to install it. - In Red Hat Enterprise Linux,
vsftpdonly allows anonymous users to log in by default. To allow authenticated users to log in, edit/etc/vsftpd/vsftpd.confas the root user. Make sure thelocal_enable=YESoption is uncommented:# Uncomment this to allow local users to log in. local_enable=YES
# Uncomment this to allow local users to log in. local_enable=YESCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
service vsftpd startcommand as the root user to startvsftpd. If the service was running before editingvsftpd.conf, run theservice vsftpd restartcommand as the root user to apply the configuration changes:service vsftpd start Starting vsftpd for vsftpd: [ OK ]
~]# service vsftpd start Starting vsftpd for vsftpd: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ftp localhostcommand as the user you are currently logged in with. When prompted for your name, make sure your user name is displayed. If the correct user name is displayed, press Enter, otherwise, enter the correct user name:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - An SELinux denial similar to the following is logged:
setroubleshoot: SELinux is preventing the ftp daemon from reading users home directories (username). For complete SELinux messages. run sealert -l c366e889-2553-4c16-b73f-92f36a1730ce
setroubleshoot: SELinux is preventing the ftp daemon from reading users home directories (username). For complete SELinux messages. run sealert -l c366e889-2553-4c16-b73f-92f36a1730ceCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Access to home directories has been denied by SELinux. This can be fixed by activating the
ftp_home_dirBoolean. Enable thisftp_home_dirBoolean by running the following command as the root user:setsebool -P ftp_home_dir=1
~]# setsebool -P ftp_home_dir=1Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note
Do not use the -P option if you do not want changes to persist across reboots.Try to log in again. Now that SELinux is allowing access to home directories via theftp_home_dirBoolean, logging in will succeed.
4.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
By default, anonymous users have read access to files in
/var/ftp/ when they log in via FTP. This directory is labeled with the public_content_t type, allowing only read access, even if write access is configured in /etc/vsftpd/vsftpd.conf. The public_content_t type is accessible to other services, such as Apache HTTP Server, Samba, and NFS.
Use one of the following types to share files through FTP:
public_content_t- Label files and directories you have created with the
public_content_ttype to share them read-only through vsftpd. Other services, such as Apache HTTP Server, Samba, and NFS, also have access to files labeled with this type. Files labeled with thepublic_content_ttype cannot be written to, even if Linux permissions allow write access. If you require write access, use thepublic_content_rw_ttype. public_content_rw_t- Label files and directories you have created with the
public_content_rw_ttype to share them with read and write permissions throughvsftpd. Other services, such as Apache HTTP Server, Samba, and NFS, also have access to files labeled with this type. Remember that Booleans for each service must be enabled before they can write to files labeled with this type.
4.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
allow_ftpd_anon_write- When disabled, this Boolean prevents
vsftpdfrom writing to files and directories labeled with thepublic_content_rw_ttype. Enable this Boolean to allow users to upload files via FTP. The directory where files are uploaded to must be labeled with thepublic_content_rw_ttype and Linux permissions set accordingly. allow_ftpd_full_access- When this Boolean is on, only Linux (DAC) permissions are used to control access, and authenticated users can read and write to files that are not labeled with the
public_content_torpublic_content_rw_ttypes. allow_ftpd_use_cifs- Having this Boolean enabled allows
vsftpdto access files and directories labeled with thecifs_ttype; therefore, having this Boolean enabled allows you to share file systems mounted via Samba throughvsftpd. allow_ftpd_use_nfs- Having this Boolean enabled allows
vsftpdto access files and directories labeled with thenfs_ttype; therefore, having this Boolean enabled allows you to share file systems mounted via NFS throughvsftpd. ftp_home_dir- Having this Boolean enabled allows authenticated users to read and write to files in their home directories. When this Boolean is off, attempting to download a file from a home directory results in an error such as
550 Failed to open file. An SELinux denial is logged. ftpd_connect_db- Allow FTP daemons to initiate a connection to a database.
httpd_enable_ftp_server- Allow
httpdto listen on the FTP port and act as a FTP server. tftp_anon_write- Having this Boolean enabled allows TFTP access to a public directory, such as an area reserved for common files that otherwise has no special access restrictions.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
4.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
4.4.1. Uploading to an FTP site 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The following example creates an FTP site that allows a dedicated user to upload files. It creates the directory structure and the required SELinux configuration changes:
- Run the
setsebool ftp_home_dir=1command as the root user to enable access to FTP home directories. - Run the
mkdir -p /myftp/pubcommand as the root user to create a new top-level directory. - Set Linux permissions on the
/myftp/pub/directory to allow a Linux user write access. This example changes the owner and group from root to owneruser1and group root. Replaceuser1with the user you want to give write access to:chown user1:root /myftp/pub chmod 775 /myftp/pub
~]# chown user1:root /myftp/pub ~]# chmod 775 /myftp/pubCopy to Clipboard Copied! Toggle word wrap Toggle overflow Thechowncommand changes the owner and group permissions. Thechmodcommand changes the mode, allowing theuser1user read, write, and execute permissions, and members of the root group read, write, and execute permissions. Everyone else has read and execute permissions, which allows the Apache HTTP Server to read files from this directory. - When running SELinux, files and directories must be labeled correctly to allow access. Setting Linux permissions is not enough. Files labeled with the
public_content_ttype allow them to be read by FTP, Apache HTTP Server, Samba, and rsync. Files labeled with thepublic_content_rw_ttype can be written to by FTP. Other services, such as Samba, require Booleans to be set before they can write to files labeled with thepublic_content_rw_ttype. Label the top-level directory (/myftp/) with thepublic_content_ttype, to prevent copied or newly-created files under/myftp/from being written to or modified by services. Run the following command as the root user to add the label change to file-context configuration:semanage fcontext -a -t public_content_t /myftp
~]# semanage fcontext -a -t public_content_t /myftpCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
restorecon -R -v /myftp/command to apply the label change:restorecon -R -v /myftp/ restorecon reset /myftp context unconfined_u:object_r:default_t:s0->system_u:object_r:public_content_t:s0
~]# restorecon -R -v /myftp/ restorecon reset /myftp context unconfined_u:object_r:default_t:s0->system_u:object_r:public_content_t:s0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Confirm
/myftpis labeled with thepublic_content_ttype, and/myftp/pub/is labeled with thedefault_ttype:ls -dZ /myftp/ drwxr-xr-x. root root system_u:object_r:public_content_t:s0 /myftp/ ls -dZ /myftp/pub/ drwxrwxr-x. user1 root unconfined_u:object_r:default_t:s0 /myftp/pub/
~]$ ls -dZ /myftp/ drwxr-xr-x. root root system_u:object_r:public_content_t:s0 /myftp/ ~]$ ls -dZ /myftp/pub/ drwxrwxr-x. user1 root unconfined_u:object_r:default_t:s0 /myftp/pub/Copy to Clipboard Copied! Toggle word wrap Toggle overflow - FTP must be allowed to write to a directory before users can upload files via FTP. SELinux allows FTP to write to directories labeled with the
public_content_rw_ttype. This example uses/myftp/pub/as the directory FTP can write to. Run the following command as the root user to add the label change to file-context configuration:semanage fcontext -a -t public_content_rw_t "/myftp/pub(/.*)?"
~]# semanage fcontext -a -t public_content_rw_t "/myftp/pub(/.*)?"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
restorecon -R -v /myftp/pubcommand as the root user to apply the label change:restorecon -R -v /myftp/pub restorecon reset /myftp/pub context system_u:object_r:default_t:s0->system_u:object_r:public_content_rw_t:s0
~]# restorecon -R -v /myftp/pub restorecon reset /myftp/pub context system_u:object_r:default_t:s0->system_u:object_r:public_content_rw_t:s0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - The
allow_ftpd_anon_writeBoolean must be on to allowvsftpdto write to files that are labeled with thepublic_content_rw_ttype. Run the following command as the root user to enable this Boolean:setsebool -P allow_ftpd_anon_write on
~]# setsebool -P allow_ftpd_anon_write onCopy to Clipboard Copied! Toggle word wrap Toggle overflow Do not use the-Poption if you do not want changes to persist across reboots.
The following example demonstrates logging in via FTP and uploading a file. This example uses the
user1 user from the previous example, where user1 is the dedicated owner of the /myftp/pub/ directory:
- Run the
cd ~/command to change into your home directory. Then, run themkdir myftpcommand to create a directory to store files to upload via FTP. - Run the
cd ~/myftpcommand to change into the~/myftp/directory. In this directory, create anftpuploadfile. Copy the following contents into this file:File upload via FTP from a home directory.
File upload via FTP from a home directory.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
getsebool allow_ftpd_anon_writecommand to confirm theallow_ftpd_anon_writeBoolean is on:getsebool allow_ftpd_anon_write allow_ftpd_anon_write --> on
~]$ getsebool allow_ftpd_anon_write allow_ftpd_anon_write --> onCopy to Clipboard Copied! Toggle word wrap Toggle overflow If this Boolean is off, run thesetsebool -P allow_ftpd_anon_write oncommand as the root user to enable it. Do not use the-Poption if you do not want the change to persist across reboots. - Run the
service vsftpd startcommand as the root user to startvsftpd:service vsftpd start Starting vsftpd for vsftpd: [ OK ]
~]# service vsftpd start Starting vsftpd for vsftpd: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ftp localhostcommand. When prompted for a user name, enter the user name of the user who has write access, then, enter the correct password for that user:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The upload succeeds as theallow_ftpd_anon_writeBoolean is enabled.
Chapter 5. Network File System 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
A Network File System (NFS) allows remote hosts to mount file systems over a network and interact with those file systems as though they are mounted locally. This enables system administrators to consolidate resources onto centralized servers on the network.[5]
In Red Hat Enterprise Linux, the nfs-utils package is required for full NFS support. Run the
rpm -q nfs-utils command to see if the nfs-utils is installed. If it is not installed and you want to use NFS, run the following command as the root user to install it:
yum install nfs-utils
~]# yum install nfs-utils
5.1. NFS and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When running SELinux, the
NFS daemons are confined by default. SELinux policy allows NFS to share files by default.
5.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
By default, mounted NFS volumes on the client side are labeled with a default context defined by policy for NFS. In common policies, this default context uses the
nfs_t type. The following types are used with NFS. Different types allow you to configure flexible access:
var_lib_nfs_t- This type is used for existing and new files copied to or created in the
/var/lib/nfs/directory. This type should not need to be changed in normal operation. To restore changes to the default settings, run therestorecon -R -v /var/lib/nfscommand as the root user. nfsd_exec_t- The
/usr/sbin/rpc.nfsdfile is labeled with thenfsd_exec_t, as are other system executables and libraries related to NFS. Users should not label any files with this type.nfsd_exec_twill transition tonfsd_t.
5.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
allow_ftpd_use_nfs- When enabled, this Boolean allows the
ftpddaemon to access NFS volumes. cobbler_use_nfs- When enabled, this Boolean allows the
cobblerddaemon to access NFS volumes. git_system_use_nfs- When enabled, this Boolean allows the Git system daemon to read system shared repositories on NFS volumes.
httpd_use_nfs- When enabled, this Boolean allows the
httpddaemon to access files stored on NFS volumes. qemu_use_nfs- When enabled, this Boolean allows Qemu to use NFS volumes.
rsync_use_nfs- When enabled, this Boolean allows
rsyncservers to share NFS volumes. samba_share_nfs- When enabled, this Boolean allows the
smbddaemon to share NFS volumes. When disabled, this Boolean preventssmbdfrom having full access to NFS shares via Samba. sanlock_use_nfs- When enabled, this Boolean allows the
sanlockdaemon to manage NFS volumes. sge_use_nfs- When enabled, this Boolean allows the
sgescheduler to access NFS volumes. use_nfs_home_dirs- When enabled, this Boolean adds support for NFS home directories.
virt_use_nfs- When enabled, this Boolean allows confident virtual guests to manage files on NFS volumes.
xen_use_nfs- When enabled, this Boolean allows
Xento manage files on NFS volumes. git_cgi_use_nfs- When enabled, this Boolean allows the Git Common Gateway Interface (CGI) to access NFS volumes.
tftp_use_nfs- When enabled, this Boolean allows The Trivial File Transfer Protocol (TFTP) to read from NFS volumes for public file transfer services.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
Chapter 6. Berkeley Internet Name Domain 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
BIND performs name resolution services via the
named daemon. BIND lets users locate computer resources and services by name instead of numerical addresses.
In Red Hat Enterprise Linux, the bind package provides a DNS server. Run the
rpm -q bind command to see if the bind package is installed. If it is not installed, run the following command as the root user to install it:
yum install bind
~]# yum install bind
6.1. BIND and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The default permissions on the
/var/named/slaves/, /var/named/dynamic/ and /var/named/data/ directories allow zone files to be updated via zone transfers and dynamic DNS updates. Files in /var/named/ are labeled with the named_zone_t type, which is used for master zone files.
For a slave server, configure
/etc/named.conf to place slave zones in /var/named/slaves/. The following is an example of a domain entry in /etc/named.conf for a slave DNS server that stores the zone file for testdomain.com in /var/named/slaves/:
If a zone file is labeled
named_zone_t, the named_write_master_zones Boolean must be enabled to allow zone transfers and dynamic DNS to update the zone file. Also, the mode of the parent directory has to be changed to allow the named user or group read, write and execute access.
If zone files in
/var/named/ are labeled with the named_cache_t type, a file system relabel or running restorecon -R /var/ will change their type to named_zone_t.
6.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with BIND. Different types allow you to configure flexible access:
named_zone_t- Used for master zone files. Other services cannot modify files of this type.
namedcan only modify files of this type if thenamed_write_master_zonesBoolean is enabled. named_cache_t- By default,
namedcan write to files labeled with this type, without additional Booleans being set. Files copied or created in the/var/named/slaves/,/var/named/dynamic/and/var/named/data/directories are automatically labeled with thenamed_cache_ttype. named_var_run_t- Files copied or created in the
/var/run/bind/,/var/run/named/, and/var/run/unbound/directories are automatically labeled with thenamed_var_run_ttype. named_conf_t- BIND-related configuration files, usually stored in the
/etc/directory, are automatically labeled with thenamed_conf_ttype. named_exec_t- BIND-related executable files, usually stored in the
/usr/sbin/directory, are automatically labeled with thenamed_exec_ttype. named_log_t- BIND-related log files, usually stored in the
/var/log/directory, are automatically labeled with thenamed_log_ttype. named_initrc_exec_t- Executable BIND-related files in the
/etc/rc.d/init.d/directory are automatically labeled with thenamed_initrc_exec_ttype.
6.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
named_write_master_zones- When disabled, this Boolean prevents
namedfrom writing to zone files or directories labeled with thenamed_zone_ttype.nameddoes not usually need to write to zone files; but in the case that it needs to, or if a secondary server needs to write to zone files, enable this Boolean to allow this action. named_bind_http_port- When enabled, this Boolean allows BIND to bind an Apache port.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
6.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
6.4.1. Dynamic DNS 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
BIND allows hosts to update their records in DNS and zone files dynamically. This is used when a host computer's IP address changes frequently and the DNS record requires real-time modification.
Use the
/var/named/dynamic/ directory for zone files you want updated via dynamic DNS. Files created in or copied into /var/named/dynamic/ inherit Linux permissions that allow named to write to them. As such files are labeled with the named_cache_t type, SELinux allows named to write to them.
If a zone file in
/var/named/dynamic/ is labeled with the named_zone_t type, dynamic DNS updates may not be successful for a certain period of time as the update needs to be written to a journal first before being merged. If the zone file is labeled with the named_zone_t type when the journal attempts to be merged, an error such as the following is logged:
named[PID]: dumping master file: rename: /var/named/dynamic/zone-name: permission denied
named[PID]: dumping master file: rename: /var/named/dynamic/zone-name: permission denied
Also, the following SELinux denial is logged:
setroubleshoot: SELinux is preventing named (named_t) "unlink" to zone-name (named_zone_t)
setroubleshoot: SELinux is preventing named (named_t) "unlink" to zone-name (named_zone_t)
To resolve this labeling issue, run the
restorecon -R -v /var/named/dynamic command as the Linux root user.
Chapter 7. Concurrent Versioning System 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The Concurrent Versioning System (CVS) is a free revision-control system. It is used to monitor and keep track of modifications to a central set of files which are usually accessed by several different users. It is commonly used by programmers to manage a source code repository and is widely used by open source programmers.
In Red Hat Enterprise Linux, the cvs package provides CVS. Run the
rpm -q cvs command to see if the cvs package is installed. If it is not installed and you want to use CVS, run the following command as the root user to install it:
yum install cvs
~]# yum install cvs
7.1. CVS and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The
cvs daemon runs as cvs_t. By default in Red Hat Enterprise Linux, CVS is only allowed to read and write certain directories. The label cvs_data_t defines which areas the cvs daemon has read and write access to. When using CVS with SELinux, assigning the correct label is essential for clients to have full access to the area reserved for CVS data.
7.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with CVS. Different types allow you to configure flexible access:
cvs_data_t- This type is used for data in a CVS repository. CVS can only gain full access to data if it has this type.
cvs_exec_t- This type is used for the
/usr/bin/cvsbinary.
7.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
allow_cvs_read_shadow- This Boolean allows the
cvsdaemon to access the/etc/shadowfile for user authentication.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
7.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
7.4.1. Setting up CVS 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
This example describes a simple CVS setup and an SELinux configuration which allows remote access. Two hosts are used in this example; a CVS server with a host name of
cvs-srv with an IP address of 192.168.1.1 and a client with a host name of cvs-client and an IP address of 192.168.1.100. Both hosts are on the same subnet (192.168.1.0/24). This is an example only and assumes that the cvs and xinetd packages are installed, that the SELinux targeted policy is used, and that SELinux is running in enforced mode.
This example will show that even with full DAC permissions, SELinux can still enforce policy rules based on file labels and only allow access to certain areas that have been specifically labeled for access by CVS.
Note
Steps 1-9 should be performed on the CVS server,
cvs-srv.
- This example requires the cvs and xinetd packages. Run the
rpm -q cvscommand to see if the cvs package is installed. If it is not installed, run the following command as the root user to install cvs:yum install cvs
~]# yum install cvsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run therpm -q xinetdcommand to see if the xinetd package is installed. If it is not installed, run the following command as the root user to install xinetd:yum install xinetd
~]# yum install xinetdCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Create a group named
CVS. This can be done via thegroupadd CVScommand as the root user, or by using thesystem-config-userstool. - Create a user with a user name of
cvsuserand make this user a member of the CVS group. This can be done using thesystem-config-userstool. - Edit the
/etc/servicesfile and make sure that the CVS server has uncommented entries looking similar to the following:cvspserver 2401/tcp # CVS client/server operations cvspserver 2401/udp # CVS client/server operations
cvspserver 2401/tcp # CVS client/server operations cvspserver 2401/udp # CVS client/server operationsCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Create the CVS repository in the root area of the file system. When using SELinux, it is best to have the repository in the root file system so that recursive labels can be given to it without affecting any other subdirectories. For example, as the root user, create a
/cvs/directory to house the repository:mkdir /cvs
[root@cvs-srv]# mkdir /cvsCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Give full permissions to the
/cvs/directory to all users:chmod -R 777 /cvs
[root@cvs-srv]# chmod -R 777 /cvsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Warning
This is an example only and these permissions should not be used in a production system. - Edit the
/etc/xinetd.d/cvsfile and make sure that the CVS section is uncommented and configured to use the/cvs/directory. The file should look similar to:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Start the
xinetddaemon by running theservice xinetd startcommand as the root user. - Add a rule which allows inbound connections using TCP on port 2401 by using the
system-config-firewalltool. - As the
cvsuseruser, run the following command:cvs -d /cvs init
[cvsuser@cvs-client]$ cvs -d /cvs initCopy to Clipboard Copied! Toggle word wrap Toggle overflow - At this point, CVS has been configured but SELinux will still deny logins and file access. To demonstrate this, set the
$CVSROOTvariable oncvs-clientand try to log in remotely. The following step should be performed oncvs-client:Copy to Clipboard Copied! Toggle word wrap Toggle overflow SELinux has blocked access. In order to get SELinux to allow this access, the following step should be performed oncvs-srv: - Change the context of the
/cvs/directory as the root user in order to recursively label any existing and new data in the/cvs/directory, giving it thecvs_data_ttype:semanage fcontext -a -t cvs_data_t '/cvs(/.*)?' restorecon -R -v /cvs
[root@cvs-srv]# semanage fcontext -a -t cvs_data_t '/cvs(/.*)?' [root@cvs-srv]# restorecon -R -v /cvsCopy to Clipboard Copied! Toggle word wrap Toggle overflow - The client,
cvs-clientshould now be able to log in and access all CVS resources in this repository:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 8. Squid Caching Proxy 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages.[6]
In Red Hat Enterprise Linux, the squid package provides the Squid Caching Proxy. Run the
rpm -q squid command to see if the squid package is installed. If it is not installed and you want to use squid, run the following command as the root user to install it:
yum install squid
~]# yum install squid
8.1. Squid Caching Proxy and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When SELinux is enabled, squid runs confined by default. Confined processes run in their own domains, and are separated from other confined processes. If a confined process is compromised by an attacker, depending on SELinux policy configuration, an attacker's access to resources and the possible damage they can do is limited. The following example demonstrates the squid processes running in their own domain. This example assumes the squid package is installed:
- Run the
getenforcecommand to confirm SELinux is running in enforcing mode:getenforce Enforcing
~]$ getenforce EnforcingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Thegetenforcecommand returnsEnforcingwhen SELinux is running in enforcing mode. - Run the
service squid startcommand as the root user to startsquid:service squid start Starting squid: [ OK ]
~]# service squid start Starting squid: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ps -eZ | grep squidcommand to view thesquidprocesses:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The SELinux context associated with thesquidprocesses isunconfined_u:system_r:squid_t:s0. The second last part of the context,squid_t, is the type. A type defines a domain for processes and a type for files. In this case, thesquidprocesses are running in thesquid_tdomain.
SELinux policy defines how processes running in confined domains, such as
squid_t, interact with files, other processes, and the system in general. Files must be labeled correctly to allow squid access to them.
When
/etc/squid/squid.conf is configured so squid listens on a port other than the default TCP ports 3128, 3401 or 4827, the semanage port command must be used to add the required port number to the SELinux policy configuration. The following example demonstrates configuring squid to listen on a port that is not initially defined in SELinux policy configuration for squid, and, as a consequence, squid failing to start. This example also demonstrates how to then configure the SELinux system to allow squid to successfully listen on a non-standard port that is not already defined in the policy. This example assumes the squid package is installed. Run each command in the example as the root user:
- Run the
service squid statuscommand to confirmsquidis not running:service squid status squid is stopped
~]# service squid status squid is stoppedCopy to Clipboard Copied! Toggle word wrap Toggle overflow If the output differs, run theservice squid stopcommand to stop the process:service squid stop Stopping squid: [ OK ]
~]# service squid stop Stopping squid: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
semanage port -l | grep -w squid_port_tcommand to view the ports SELinux allowssquidto listen on:semanage port -l | grep -w -i squid_port_t squid_port_t tcp 3401, 4827 squid_port_t udp 3401, 4827
~]# semanage port -l | grep -w -i squid_port_t squid_port_t tcp 3401, 4827 squid_port_t udp 3401, 4827Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Edit
/etc/squid/squid.confas the root user. Configure thehttp_portoption so it lists a port that is not configured in SELinux policy configuration forsquid. In this example,squidis configured to listen on port 10000:# Squid normally listens to port 3128 http_port 10000
# Squid normally listens to port 3128 http_port 10000Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
setseboolcommand to make sure thesquid_connect_anyBoolean is set to off. This ensures squid is only permitted to operate on specific ports:setsebool -P squid_connect_any 0
~]# setsebool -P squid_connect_any 0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
service squid startcommand to startsquid:service squid start Starting squid: .................... [FAILED]
~]# service squid start Starting squid: .................... [FAILED]Copy to Clipboard Copied! Toggle word wrap Toggle overflow An SELinux denial similar to the following is logged:localhost setroubleshoot: SELinux is preventing the squid (squid_t) from binding to port 10000. For complete SELinux messages. run sealert -l 97136444-4497-4fff-a7a7-c4d8442db982
localhost setroubleshoot: SELinux is preventing the squid (squid_t) from binding to port 10000. For complete SELinux messages. run sealert -l 97136444-4497-4fff-a7a7-c4d8442db982Copy to Clipboard Copied! Toggle word wrap Toggle overflow - For SELinux to allow
squidto listen on port 10000, as used in this example, the following command is required:semanage port -a -t squid_port_t -p tcp 10000
~]# semanage port -a -t squid_port_t -p tcp 10000Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run
service squid startagain to startsquidand have it listen on the new port:service squid start Starting squid: [ OK ]
~]# service squid start Starting squid: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Now that SELinux has been configured to allow
squidto listen on a non-standard port (TCP 10000 in this example),squidstarts successfully on this port.
8.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with
squid. Different types allow you to configure flexible access:
httpd_squid_script_exec_t- This type is used for utilities such as
cachemgr.cgi, which provides a variety of statistics about squid and its configuration. squid_cache_t- Use this type for data that is cached by squid, as defined by the
cache_dirdirective in/etc/squid/squid.conf. By default, files created in or copied into/var/cache/squid/and/var/spool/squid/are labeled with thesquid_cache_ttype. Files for the squidGuard URL redirector plugin forsquidcreated in or copied to/var/squidGuard/are also labeled with thesquid_cache_ttype. Squid is only able to use files and directories that are labeled with this type for its cached data. squid_conf_t- This type is used for the directories and files that
squiduses for its configuration. Existing files, or those created in or copied to/etc/squid/and/usr/share/squid/are labeled with this type, including error messages and icons. squid_exec_t- This type is used for the squid binary,
/usr/sbin/squid. squid_log_t- This type is used for logs. Existing files, or those created in or copied to
/var/log/squid/or/var/log/squidGuard/must be labeled with this type. squid_initrc_exec_t- This type is used for the initialization file required to start
squidwhich is located at/etc/rc.d/init.d/squid. squid_var_run_t- This type is used by files in
/var/run/, especially the process id (PID) named/var/run/squid.pidwhich is created by squid when it runs.
8.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
squid_connect_any- When enabled, this Boolean permits squid to initiate a connection to a remote host on any port.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
8.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
8.4.1. Squid Connecting to Non-Standard Ports 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The following example provides a real-world demonstration of how SELinux complements Squid by enforcing the above Boolean and by default only allowing access to certain ports. This example will then demonstrate how to change the Boolean and show that access is then allowed.
Note that this is an example only and demonstrates how SELinux can affect a simple configuration of Squid. Comprehensive documentation of Squid is beyond the scope of this document. Refer to the official Squid documentation for further details. This example assumes that the Squid host has two network interfaces, Internet access, and that any firewall has been configured to allow access on the internal interface using the default TCP port on which Squid listens (TCP 3128).
- As the root user, install the squid package. Run the
rpm -q squidcommand to see if the squid package is installed. If it is not installed, run theyum install squidcommand as the root user to install it. - Edit the main configuration file,
/etc/squid/squid.confand confirm that thecache_dirdirective is uncommented and looks similar to the following:cache_dir ufs /var/spool/squid 100 16 256
cache_dir ufs /var/spool/squid 100 16 256Copy to Clipboard Copied! Toggle word wrap Toggle overflow This line specifies the default settings for thecache_dirdirective to be used in this example; it consists of the Squid storage format (ufs), the directory on the system where the cache resides (/var/spool/squid), the amount of disk space in megabytes to be used for the cache (100), and finally the number of first-level and second-level cache directories to be created (16 and 256 respectively). - In the same configuration file, make sure the
http_access allow localnetdirective is uncommented. This allows traffic from thelocalnetACL which is automatically configured in a default installation of Squid on Red Hat Enterprise Linux. It will allow client machines on any existing RFC1918 network to have access through the proxy, which is sufficient for this simple example. - In the same configuration file, make sure the
visible_hostnamedirective is uncommented and is configured to the host name of the machine. The value should be the fully qualified domain name (FQDN) of the host:visible_hostname squid.example.com
visible_hostname squid.example.comCopy to Clipboard Copied! Toggle word wrap Toggle overflow - As the root user, run the
service squid startcommand to startsquid. As this is the first timesquidhas started, this command will initialise the cache directories as specified above in thecache_dirdirective and will then start thesquiddaemon. The output is as follows ifsquidstarts successfully:/sbin/service squid start init_cache_dir /var/spool/squid... Starting squid: . [ OK ]
~]# /sbin/service squid start init_cache_dir /var/spool/squid... Starting squid: . [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Confirm that the
squidprocess ID (PID) has started as a confined service, as seen here by thesquid_var_run_tvalue:ls -lZ /var/run/squid.pid -rw-r--r--. root squid unconfined_u:object_r:squid_var_run_t:s0 /var/run/squid.pid
~]# ls -lZ /var/run/squid.pid -rw-r--r--. root squid unconfined_u:object_r:squid_var_run_t:s0 /var/run/squid.pidCopy to Clipboard Copied! Toggle word wrap Toggle overflow - At this point, a client machine connected to the
localnetACL configured earlier is successfully able to use the internal interface of this host as its proxy. This can be configured in the settings for all common web browsers, or system-wide. Squid is now listening on the default port of the target machine (TCP 3128), but the target machine will only allow outgoing connections to other services on the Internet via common ports. This is a policy defined by SELinux itself. SELinux will deny access to non-standard ports, as shown in the next step: - When a client makes a request using a non-standard port through the Squid proxy such as a website listening on TCP port 10000, a denial similar to the following is logged:
SELinux is preventing the squid daemon from connecting to network port 10000
SELinux is preventing the squid daemon from connecting to network port 10000Copy to Clipboard Copied! Toggle word wrap Toggle overflow - To allow this access, the
squid_connect_anyBoolean must be modified, as it is disabled by default. To enable thesquid_connect_anyBoolean, run the following command as the root user:setsebool -P squid_connect_any on
~]# setsebool -P squid_connect_any onCopy to Clipboard Copied! Toggle word wrap Toggle overflow Note
Do not use the-Poption if you do not wantsetseboolchanges to persist across reboots. - The client will now be able to access non-standard ports on the Internet as Squid is now permitted to initiate connections to any port, on behalf of its clients.
Chapter 9. MySQL 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The MySQL database is a multi-user, multi-threaded SQL database server that consists of the MySQL server daemon (
mysqld) and many client programs and libraries.[7]
In Red Hat Enterprise Linux, the mysql-server package provides MySQL. Run the
rpm -q mysql-server command to see if the mysql-server package is installed. If it is not installed, run the following command as the root user to install it:
yum install mysql-server
~]# yum install mysql-server
9.1. MySQL and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When MySQL is enabled, it runs confined by default. Confined processes run in their own domains, and are separated from other confined processes. If a confined process is compromised by an attacker, depending on SELinux policy configuration, an attacker's access to resources and the possible damage they can do is limited. The following example demonstrates the MySQL processes running in their own domain. This example assumes the mysql package is installed:
- Run the
getenforcecommand to confirm SELinux is running in enforcing mode:getenforce Enforcing
~]$ getenforce EnforcingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Thegetenforcecommand returnsEnforcingwhen SELinux is running in enforcing mode. - Run the
service mysqld startcommand as the root user to startmysqld:service mysqld start Initializing MySQL database: Installing MySQL system tables... [ OK ] Starting MySQL: [ OK ]
~]# service mysqld start Initializing MySQL database: Installing MySQL system tables... [ OK ] Starting MySQL: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ps -eZ | grep mysqldcommand to view themysqldprocesses:ps -eZ | grep mysqld unconfined_u:system_r:mysqld_safe_t:s0 6035 pts/1 00:00:00 mysqld_safe unconfined_u:system_r:mysqld_t:s0 6123 pts/1 00:00:00 mysqld
~]$ ps -eZ | grep mysqld unconfined_u:system_r:mysqld_safe_t:s0 6035 pts/1 00:00:00 mysqld_safe unconfined_u:system_r:mysqld_t:s0 6123 pts/1 00:00:00 mysqldCopy to Clipboard Copied! Toggle word wrap Toggle overflow The SELinux context associated with themysqldprocesses isunconfined_u:system_r:mysqld_t:s0. The second last part of the context,mysqld_t, is the type. A type defines a domain for processes and a type for files. In this case, themysqldprocesses are running in themysqld_tdomain.
9.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with
mysql. Different types allow you to configure flexible access:
mysqld_db_t- This type is used for the location of the MySQL database. In Red Hat Enterprise Linux, the default location for the database is
/var/lib/mysql/, however this can be changed. If the location for the MySQL database is changed, the new location must be labeled with this type. Refer to the following example for instructions on how to change the default database location and how to label the new section appropriately. mysqld_etc_t- This type is used for the MySQL main configuration file
/etc/my.cnfand any other configuration files in the/etc/mysql/directory. mysqld_exec_t- This type is used for the
mysqldbinary located at/usr/libexec/mysqld, which is the default location for the MySQL binary on Red Hat Enterprise Linux. Other systems may locate this binary at/usr/sbin/mysqldwhich should also be labeled with this type. mysqld_initrc_exec_t- This type is used for the initialization file for MySQL, located at
/etc/rc.d/init.d/mysqldby default in Red Hat Enterprise Linux. mysqld_log_t- Logs for MySQL need to be labeled with this type for proper operation. All log files in
/var/log/matching themysql.*wildcard must be labeled with this type. mysqld_var_run_t- This type is used by files in
/var/run/mysqld/, specifically the process id (PID) named/var/run/mysqld/mysqld.pidwhich is created by themysqlddaemon when it runs. This type is also used for related socket files such as/var/lib/mysql/mysql.sock. Files such as these must be labeled correctly for proper operation as a confined service.
9.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
allow_user_mysql_connect- When enabled, this Boolean allows users to connect to MySQL.
exim_can_connect_db- When enabled, this Boolean allows the
eximmailer to initiate connections to a database server. ftpd_connect_db- When enabled, this Boolean allows
ftpdaemons to initiate connections to a database server. httpd_can_network_connect_db- Enabling this Boolean is required for a web server to communicate with a database server.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
9.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
9.4.1. MySQL Changing Database Location 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When using Red Hat Enterprise Linux 6, the default location for MySQL to store its database is
/var/lib/mysql/. This is where SELinux expects it to be by default, and hence this area is already labeled appropriately for you, using the mysqld_db_t type.
The location where the database is stored can be changed depending on individual environment requirements or preferences, however it is important that SELinux is aware of this new location; that it is labeled accordingly. This example explains how to change the location of a MySQL database and then how to label the new location so that SELinux can still provide its protection mechanisms to the new area based on its contents.
Note that this is an example only and demonstrates how SELinux can affect MySQL. Comprehensive documentation of MySQL is beyond the scope of this document. Refer to the official MySQL documentation for further details. This example assumes that the mysql-server and setroubleshoot-server packages are installed, that the
auditd service is running, and that there is a valid database in the default location of /var/lib/mysql/.
- Run the
ls -lZ /var/lib/mysqlcommand to view the SELinux context of the default database location formysql:ls -lZ /var/lib/mysql drwx------. mysql mysql unconfined_u:object_r:mysqld_db_t:s0 mysql
~]# ls -lZ /var/lib/mysql drwx------. mysql mysql unconfined_u:object_r:mysqld_db_t:s0 mysqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow This showsmysqld_db_twhich is the default context element for the location of database files. This context will have to be manually applied to the new database location that will be used in this example in order for it to function properly. - Enter
mysqlshow -u root -pand enter themysqldroot password to show the available databases:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Shut down the
mysqlddaemon with theservice mysqld stopcommand as the root user:service mysqld stop Stopping MySQL: [ OK ]
~]# service mysqld stop Stopping MySQL: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Create a new directory for the new location of the database(s). In this example,
/mysql/is used:mkdir -p /mysql
~]# mkdir -p /mysqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Copy the database files from the old location to the new location:
cp -R /var/lib/mysql/* /mysql/
~]# cp -R /var/lib/mysql/* /mysql/Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Change the ownership of this location to allow access by the mysql user and group. This sets the traditional Unix permissions which SELinux will still observe.
chown -R mysql:mysql /mysql
~]# chown -R mysql:mysql /mysqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ls -lZ /optcommand to see the initial context of the new directory:ls -lZ /opt drwxr-xr-x. mysql mysql unconfined_u:object_r:usr_t:s0 mysql
~]# ls -lZ /opt drwxr-xr-x. mysql mysql unconfined_u:object_r:usr_t:s0 mysqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow The contextusr_tof this newly created directory is not currently suitable to SELinux as a location for MySQL database files. Once the context has been changed, MySQL will be able to function properly in this area. - Open the main MySQL configuration file
/etc/my.cnfwith a text editor and modify thedatadiroption so that it refers to the new location. In this example the value that should be entered is/mysql.[mysqld] datadir=/mysql
[mysqld] datadir=/mysqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Save this file and exit. - Run the
service mysqld startcommand as the root user to startmysqld. The service should fail to start, and a denial will be logged to the/var/log/messagesfile. However, if theauditdaemon is running alongside thesetroubleshootservice, the denial will be logged to the/var/log/audit/audit.logfile instead:SELinux is preventing /usr/libexec/mysqld "write" access on /mysql. For complete SELinux messages. run sealert -l b3f01aff-7fa6-4ebe-ad46-abaef6f8ad71
SELinux is preventing /usr/libexec/mysqld "write" access on /mysql. For complete SELinux messages. run sealert -l b3f01aff-7fa6-4ebe-ad46-abaef6f8ad71Copy to Clipboard Copied! Toggle word wrap Toggle overflow The reason for this denial is that/mysql/is not labeled correctly for MySQL data files. SELinux is stopping MySQL from having access to the content labeled asusr_t. Perform the following steps to resolve this problem: - Run the following
semanagecommand to add a context mapping for/mysql. Note thatsemanageis not installed by default. If it is missing on your system, install the policycoreutils-python package.semanage fcontext -a -t mysqld_db_t "/mysql(/.*)?"
~]# semanage fcontext -a -t mysqld_db_t "/mysql(/.*)?"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - This mapping is written to the
/etc/selinux/targeted/contexts/files/file_contexts.localfile:grep -i mysql /etc/selinux/targeted/contexts/files/file_contexts.local /mysql(/.*)? system_u:object_r:mysqld_db_t:s0
~]# grep -i mysql /etc/selinux/targeted/contexts/files/file_contexts.local /mysql(/.*)? system_u:object_r:mysqld_db_t:s0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Now use the
restoreconcommand to apply this context mapping to the running system:restorecon -R -v /mysql
~]# restorecon -R -v /mysqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Now that the
/mysql/location has been labeled with the correct context for MySQL, themysqlddaemon starts:service mysqld start Starting MySQL: [ OK ]
~]# service mysqld start Starting MySQL: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Confirm the context has changed for
/mysql/:ls -lZ /opt drwxr-xr-x. mysql mysql system_u:object_r:mysqld_db_t:s0 mysql
~]$ ls -lZ /opt drwxr-xr-x. mysql mysql system_u:object_r:mysqld_db_t:s0 mysqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow - The location has been changed and labeled, and the
mysqlddaemon has started successfully. At this point all running services should be tested to confirm normal operation.
Chapter 10. PostgreSQL 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
PostgreSQL is an Object-Relational database management system (DBMS).[8]
In Red Hat Enterprise Linux 6, the postgresql-server package provides PostgreSQL. Run the
rpm -q postgresql-server command to see if the postgresql-server package is installed. If it is not installed, run the following command as the root user to install it:
yum install postgresql-server
~]# yum install postgresql-server
10.1. PostgreSQL and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When PostgreSQL is enabled, it runs confined by default. Confined processes run in their own domains, and are separated from other confined processes. If a confined process is compromised by an attacker, depending on SELinux policy configuration, an attacker's access to resources and the possible damage they can do is limited. The following example demonstrates the PostgreSQL processes running in their own domain. This example assumes the postgresql-server package is installed:
- Run the
getenforcecommand to confirm SELinux is running in enforcing mode:getenforce Enforcing
~]$ getenforce EnforcingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Thegetenforcecommand returnsEnforcingwhen SELinux is running in enforcing mode. - Run the
service postgresql startcommand as the root user to startpostgresql:service postgresql start Starting postgresql service: [ OK ]
~]# service postgresql start Starting postgresql service: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ps -eZ | grep postgrescommand to view thepostgresqlprocesses:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The SELinux context associated with thepostgresqlprocesses isunconfined_u:system_r:postgresql_t:s0. The second last part of the context,postgresql_t, is the type. A type defines a domain for processes and a type for files. In this case, thepostgresqlprocesses are running in thepostgresql_tdomain.
10.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with
postgresql. Different types allow you to configure flexible access:
postgresql_db_t- This type is used for several locations. The locations labeled with this type are used for data files for PostgreSQL:
/usr/lib/pgsql/test/regres/usr/share/jonas/pgsql/var/lib/pgsql/data/var/lib/postgres(ql)?
postgresql_etc_t- This type is used for configuration files in
/etc/postgresql/. postgresql_exec_t- This type is used for several locations. The locations labeled with this type are used for binaries for PostgreSQL:
/usr/bin/initdb(.sepgsql)?/usr/bin/(se)?postgres/usr/lib(64)?/postgresql/bin/.*/usr/lib/phsql/test/regress/pg_regress
postgresql_initrc_exec_t- This type is used for the PostgreSQL initialization file located at
/etc/rc.d/init.d/postgresql. postgresql_log_t- This type is used for several locations. The locations labeled with this type are used for log files:
/var/lib/pgsql/logfile/var/lib/pgsql/pgstartup.log/var/lib/sepgsql/pgstartup.log/var/log/postgresql/var/log/postgres.log.*/var/log/rhdb/rhdb/var/log/sepostgresql.log.*
postgresql_var_run_t- This type is used for run-time files for PostgreSQL, such as the process id (PID) in
/var/run/postgresql/.
10.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
allow_user_postgresql_connect- Having this Boolean enabled allows any user domain (as defined by PostgreSQL) to make connections to the database server.
postgresql_can_rsync- When enabled, this Boolean allows PostgreSQL to use the SSH protocol and the
rsyncutility.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
10.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
10.4.1. PostgreSQL Changing Database Location 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When using Red Hat Enterprise Linux 6, the default location for PostgreSQL to store its database is
/var/lib/pgsql/data. This is where SELinux expects it to be by default, and hence this area is already labeled appropriately for you, using the postgresql_db_t type.
The area where the database is located can be changed depending on individual environment requirements or preferences, however it is important that SELinux is aware of this new location; that it is labeled accordingly. This example explains how to change the location of a PostgreSQL database and then how to label the new location so that SELinux can still provide its protection mechanisms to the new area based on its contents.
Note that this is an example only and demonstrates how SELinux can affect PostgreSQL. Comprehensive documentation of PostgreSQL is beyond the scope of this document. Refer to the official PostgreSQL documentation for further details. This example assumes that the postgresql-server package is installed.
- Run the
ls -lZ /var/lib/pgsqlcommand to view the SELinux context of the default database location forpostgresql:ls -lZ /var/lib/pgsql drwx------. postgres postgres system_u:object_r:postgresql_db_t:s0 data
~]# ls -lZ /var/lib/pgsql drwx------. postgres postgres system_u:object_r:postgresql_db_t:s0 dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow This showspostgresql_db_twhich is the default context element for the location of database files. This context will have to be manually applied to the new database location that will be used in this example in order for it to function properly. - Create a new directory for the new location of the database(s). In this example,
/opt/postgresql/data/is used. If you use a different location, replace the text in the following steps with your location:mkdir -p /opt/postgresql/data
~]# mkdir -p /opt/postgresql/dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Perform a directory listing of the new location. Note that the initial context of the new directory is usr_t. This context is not sufficient for SELinux to offer its protection mechanisms to PostgreSQL. Once the context has been changed, it will be able to function properly in the new area.
ls -lZ /opt/postgresql/ drwxr-xr-x. root root unconfined_u:object_r:usr_t:s0 data
~]# ls -lZ /opt/postgresql/ drwxr-xr-x. root root unconfined_u:object_r:usr_t:s0 dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Change the ownership of the new location to allow access by the postgres user and group. This sets the traditional Unix permissions which SELinux will still observe.
chown -R postgres:postgres /opt/postgresql
~]# chown -R postgres:postgres /opt/postgresqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Open the PostgreSQL init file
/etc/rc.d/init.d/postgresqlwith a text editor and modify thePGDATAandPGLOGvariables to point to the new location:vi /etc/rc.d/init.d/postgresql PGDATA=/opt/postgresql/data PGLOG=/opt/postgresql/data/pgstartup.log
~]# vi /etc/rc.d/init.d/postgresql PGDATA=/opt/postgresql/data PGLOG=/opt/postgresql/data/pgstartup.logCopy to Clipboard Copied! Toggle word wrap Toggle overflow Save this file and exit the text editor. - Initialize the database in the new location.
su - postgres -c "initdb -D /opt/postgresql/data"
~]$ su - postgres -c "initdb -D /opt/postgresql/data"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Having changed the database location, starting the service will fail at this point:
service postgresql start Starting postgresql service: [FAILED]
~]# service postgresql start Starting postgresql service: [FAILED]Copy to Clipboard Copied! Toggle word wrap Toggle overflow SELinux has caused the service to not start. This is because the new location is not properly labelled. The following steps explain how to label the new location (/opt/postgresql/) and start the postgresql service properly: - Run the
semanagecommand to add a context mapping for/opt/postgresql/and any other directories/files within it:semanage fcontext -a -t postgresql_db_t "/opt/postgresql(/.*)?"
~]# semanage fcontext -a -t postgresql_db_t "/opt/postgresql(/.*)?"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - This mapping is written to the
/etc/selinux/targeted/contexts/files/file_contexts.localfile:grep -i postgresql /etc/selinux/targeted/contexts/files/file_contexts.local /opt/postgresql(/.*)? system_u:object_r:postgresql_db_t:s0
~]# grep -i postgresql /etc/selinux/targeted/contexts/files/file_contexts.local /opt/postgresql(/.*)? system_u:object_r:postgresql_db_t:s0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Now use the
restoreconcommand to apply this context mapping to the running system:restorecon -R -v /opt/postgresql
~]# restorecon -R -v /opt/postgresqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Now that the
/opt/postgresql/location has been labeled with the correct context for PostgreSQL, thepostgresqlservice will start successfully:service postgresql start Starting postgreSQL service: [ OK ]
~]# service postgresql start Starting postgreSQL service: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Confirm the context is correct for
/opt/postgresql/:ls -lZ /opt drwxr-xr-x. root root system_u:object_r:postgresql_db_t:s0 postgresql
~]$ ls -lZ /opt drwxr-xr-x. root root system_u:object_r:postgresql_db_t:s0 postgresqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Check with the
pscommand that thepostgresqlprocess displays the new location:ps aux | grep -i postmaster postgres 21564 0.3 0.3 42308 4032 ? S 10:13 0:00 /usr/bin/postmaster -p 5432 -D /opt/postgresql/data/
~]# ps aux | grep -i postmaster postgres 21564 0.3 0.3 42308 4032 ? S 10:13 0:00 /usr/bin/postmaster -p 5432 -D /opt/postgresql/data/Copy to Clipboard Copied! Toggle word wrap Toggle overflow - The location has been changed and labeled, and the
postgresqldaemon has started successfully. At this point all running services should be tested to confirm normal operation.
Chapter 11. rsync 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The
rsync utility performs fast file transfer and it is used for synchronizing data between systems. [9]
When using Red Hat Enterprise Linux, the rsync package provides rsync. Run the
rpm -q rsync command to see if the rsync package is installed. If it is not installed, run the following command as the root user to install it:
yum install rsync
~]# yum install rsync
11.1. rsync and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux requires files to have an extended attribute to define the file type. Policy governs the access daemons have to these files. If you want to share files using the
rsync daemon, you must label the files and directories with the public_content_t type. Like most services, correct labeling is required for SELinux to perform its protection mechanisms over rsync.[10]
11.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with
rsync. Different types all you to configure flexible access:
public_content_t- This is a generic type used for the location of files (and the actual files) to be shared via
rsync. If a special directory is created to house files to be shared withrsync, the directory and its contents need to have this label applied to them. rsync_exec_t- This type is used for the
/usr/bin/rsyncsystem binary. rsync_log_t- This type is used for the
rsynclog file, located at/var/log/rsync.logby default. To change the location of the file rsync logs to, use the--log-file=FILEoption to thersynccommand at run-time. rsync_var_run_t- This type is used for the
rsyncdlock file, located at/var/run/rsyncd.lock. This lock file is used by thersyncserver to manage connection limits. rsync_data_t- This type is used for files and directories which you want to use as rsync domains and isolate them from the access scope of other services. Also, the
public_content_tis a general SELinux context type, which can be used when a file or a directory interacts with multiple services (for example, FTP and NFS directory as an rsync domain). rsync_etc_t- This type is used for rsync-related files in the
/etc/directory.
11.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
allow_rsync_anon_write- Having this Boolean enabled allows
rsyncin the rsync_t domain to manage files, links and directories that have a type of public_content_rw_t. Often these are public files used for public file transfer services. Files and directories must be labeledpublic_content_rw_t. rsync_client- Having this Boolean enabled allows
rsyncto initiate connections to ports defined as rsync_port_t, as well as allowingrsyncto manage files, links and directories that have a type of rsync_data_t. Note that thersyncdaemon must be in the rsync_t domain in order for SELinux to enact its control overrsync. The configuration example in this chapter demonstratesrsyncrunning in the rsync_t domain. rsync_export_all_ro- Having this Boolean enabled allows
rsyncin the rsync_t domain to export NFS and CIFS volumes with read-only access to clients.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
11.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
11.4.1. Rsync as a daemon 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When using Red Hat Enterprise Linux, rsync can be used as a daemon, so that multiple clients can directly communicate with it as a central server in order to house centralized files and keep them synchronized. The following example demonstrates running rsync as a daemon over a network socket in the correct domain, and how SELinux expects this daemon to be running on a pre-defined (in SELinux policy) TCP port. This example then shows how to modify SELinux policy to allow the
rsync daemon to run normally on a non-standard port.
This example is performed on a single system to demonstrate SELinux policy and its control over local daemons and processes. Note that this is an example only and demonstrates how SELinux can affect rsync. Comprehensive documentation of rsync is beyond the scope of this document. See the official rsync documentation for further details. This example assumes that the rsync, setroubleshoot-server and audit packages are installed, that the SELinux targeted policy is used, and that SELinux is running in enforcing mode.
Procedure 11.1. Getting rsync to launch as rsync_t
- Run the
getenforcecommand to confirm SELinux is running in enforcing mode:getenforce Enforcing
~]$ getenforce EnforcingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Thegetenforcecommand returnsEnforcingwhen SELinux is running in enforcing mode. - Run the
whichcommand to confirm that the rsync binary is in the system path:which rsync /usr/bin/rsync
~]$ which rsync /usr/bin/rsyncCopy to Clipboard Copied! Toggle word wrap Toggle overflow - When running
rsyncas a daemon, a configuration file should be used and saved as/etc/rsyncd.conf. Note that the following configuration file used in this example is very simple and is not indicative of all the possible options that are available, rather it is just enough to demonstrate thersyncdaemon:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Now that a simple configuration file exists for rsync to operate in daemon mode, this step demonstrates that simply running the
rsync --daemoncommand is not sufficient for SELinux to offer its protection over rsync. See the following output:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note that in the output from the finalpscommand, the context shows thersyncdaemon running in theunconfined_tdomain. This indicates that rsync has not transitioned to thersync_tdomain as it was launched by thersync --daemoncommand. At this point, SELinux cannot enforce its rules and policy over this daemon. See the following steps to see how to fix this problem.In the following steps,rsynctransitions to thersync_tdomain because it launched it from a properly-labeled init script. Only then can SELinux and its protection mechanisms have an effect overrsync. Thisrsyncprocess should be killed before proceeding to the next step. - A custom init script for rsync is needed for this step. Save the following to
/etc/rc.d/init.d/rsyncd.Copy to Clipboard Copied! Toggle word wrap Toggle overflow The following steps show how to label this script asinitrc_exec_t: - Run the
semanagecommand to add a context mapping for/etc/rc.d/init.d/rsyncd:semanage fcontext -a -t initrc_exec_t "/etc/rc.d/init.d/rsyncd"
~]# semanage fcontext -a -t initrc_exec_t "/etc/rc.d/init.d/rsyncd"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - This mapping is written to the
/etc/selinux/targeted/contexts/files/file_contexts.localfile:grep rsync /etc/selinux/targeted/contexts/files/file_contexts.local /etc/rc.d/init.d/rsyncd system_u:object_r:initrc_exec_t:s0
~]# grep rsync /etc/selinux/targeted/contexts/files/file_contexts.local /etc/rc.d/init.d/rsyncd system_u:object_r:initrc_exec_t:s0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Now use the
restoreconcommand to apply this context mapping to the running system:restorecon -R -v /etc/rc.d/init.d/rsyncd
~]# restorecon -R -v /etc/rc.d/init.d/rsyncdCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ls -lZcommand to confirm the script has been labeled appropriately. Note that in the following output, the script has been labeled asinitrc_exec_t:ls -lZ /etc/rc.d/init.d/rsyncd -rwxr-xr-x. root root system_u:object_r:initrc_exec_t:s0 /etc/rc.d/init.d/rsyncd
~]$ ls -lZ /etc/rc.d/init.d/rsyncd -rwxr-xr-x. root root system_u:object_r:initrc_exec_t:s0 /etc/rc.d/init.d/rsyncdCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Turn on the
rsync_serverSELinux boolean:setsebool rsync_server on
~]# setsebool rsync_server onCopy to Clipboard Copied! Toggle word wrap Toggle overflow Note that this setting is not permanent and as such, it will revert to its original state after a reboot. To make the setting permanent, use the-Poption with thesetseboolcommand. - Launch
rsyncdvia the new script. Now that rsync has started from an init script that had been appropriately labeled, the process has started asrsync_t:service rsyncd start Starting rsyncd: [ OK ] $ ps -eZ | grep rsync unconfined_u:system_r:rsync_t:s0 9794 ? 00:00:00 rsync
~]# service rsyncd start Starting rsyncd: [ OK ] $ ps -eZ | grep rsync unconfined_u:system_r:rsync_t:s0 9794 ? 00:00:00 rsyncCopy to Clipboard Copied! Toggle word wrap Toggle overflow SELinux can now enforce its protection mechanisms over thersyncdaemon as it is now runing in thersync_tdomain.
This example demonstrated how to get
rsyncd running in the rsync_t domain. The next example shows how to get this daemon successfully running on a non-default port. TCP port 10000 is used in the next example.
Procedure 11.2. Running the rsync daemon on a non-default port
- Modify the
/etc/rsyncd.conffile and add theport = 10000line at the top of the file in the global configuration area (that is, before any file areas are defined). The new configuration file will look like:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - After launching rsync from the init script with this new setting, a denial similar to the following is logged by SELinux:
Jul 22 10:46:59 localhost setroubleshoot: SELinux is preventing the rsync (rsync_t) from binding to port 10000. For complete SELinux messages, run sealert -l c371ab34-639e-45ae-9e42-18855b5c2de8
Jul 22 10:46:59 localhost setroubleshoot: SELinux is preventing the rsync (rsync_t) from binding to port 10000. For complete SELinux messages, run sealert -l c371ab34-639e-45ae-9e42-18855b5c2de8Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run
semanageto add TCP port 10000 to SELinux policy inrsync_port_t:semanage port -a -t rsync_port_t -p tcp 10000
~]# semanage port -a -t rsync_port_t -p tcp 10000Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Now that TCP port 10000 has been added to SELinux policy for
rsync_port_t,rsyncdwill start and operate normally on this port:service rsyncd start Starting rsyncd: [ OK ]
~]# service rsyncd start Starting rsyncd: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow netstat -lnp | grep 10000 tcp 0 0 0.0.0.0:10000 0.0.0.0:* LISTEN 9910/rsync
~]# netstat -lnp | grep 10000 tcp 0 0 0.0.0.0:10000 0.0.0.0:* LISTEN 9910/rsyncCopy to Clipboard Copied! Toggle word wrap Toggle overflow
SELinux has had its policy modified and is now permitting
rsyncd to operate on TCP port 10000.
Chapter 12. Postfix 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Postfix is an open-source Mail Transport Agent (MTA), which supports protocols like LDAP, SMTP AUTH (SASL), and TLS.[11]
In Red Hat Enterprise Linux, the postfix package provides postfix. Run the
rpm -q postfix command to see if the postfix package is installed. If it is not installed, run the following command as the root user to install it:
yum install postfix
~]# yum install postfix
12.1. Postfix and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When Postfix is enabled, it runs confined by default. Confined processes run in their own domains, and are separated from other confined processes. If a confined process is compromised by an attacker, depending on SELinux policy configuration, an attacker's access to resources and the possible damage they can do is limited. The following example demonstrates the Postfix and related processes running in their own domain. This example assumes the postfix package is installed and that the Postfix service has been started:
- Run the
getenforcecommand to confirm SELinux is running in enforcing mode:getenforce Enforcing
~]$ getenforce EnforcingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Thegetenforcecommand returnsEnforcingwhen SELinux is running in enforcing mode. - Run the
service postfix startcommand as the root user to startpostfix:service postfix start Starting postfix: [ OK ]
~]# service postfix start Starting postfix: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ps -eZ | grep postfixcommand to view thepostfixprocesses:ps -eZ | grep postfix system_u:system_r:postfix_master_t:s0 1651 ? 00:00:00 master system_u:system_r:postfix_pickup_t:s0 1662 ? 00:00:00 pickup system_u:system_r:postfix_qmgr_t:s0 1663 ? 00:00:00 qmgr
~]$ ps -eZ | grep postfix system_u:system_r:postfix_master_t:s0 1651 ? 00:00:00 master system_u:system_r:postfix_pickup_t:s0 1662 ? 00:00:00 pickup system_u:system_r:postfix_qmgr_t:s0 1663 ? 00:00:00 qmgrCopy to Clipboard Copied! Toggle word wrap Toggle overflow In the output above, the SELinux context associated with the Postfixmasterprocess issystem_u:system_r:postfix_master_t:s0. The second last part of the context,postfix_master_t, is the type for this process. A type defines a domain for processes and a type for files. In this case, themasterprocess is running in thepostfix_master_tdomain.
12.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with Postfix. Different types all you to configure flexible access:
postfix_etc_t- This type is used for configuration files for Postfix in the
/etc/postfix/directory. postfix_data_t- This type is used for Postfix data files in the
/var/lib/postfix/directory. postfix_var_run_t- This type is used for Postfix files stored in the
/run/directory. postfix_initrc_exec_t- This type is used for transition of Postfix executable files to the
postfix_initrc_tdomain. postfix_spool_t- This type is used for Postfix files stored in the
/var/spool/directory.
Note
To see the full list of files and their types for Postfix, run the following command:
grep postfix /etc/selinux/targeted/contexts/files/file_contexts
~]$ grep postfix /etc/selinux/targeted/contexts/files/file_contexts
12.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
allow_postfix_local_write_mail_spool- Having this Boolean enables Postfix to write to the local mail spool on the system. Postfix requires this Boolean to be enabled for normal operation when local spools are used.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
12.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
12.4.1. SpamAssassin and Postfix 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SpamAssasin is an open-source mail filter that provides a way to filter unsolicited email (spam messages) from incoming email.[12]
When using Red Hat Enterprise Linux, the spamassassin package provides SpamAssassin. Run the
rpm -q spamassassin command to see if the spamassassin package is installed. If it is not installed, run the following command as the root user to install it:
yum install spamassassin
~]# yum install spamassassin
SpamAssassin operates in tandom with a mailer such as Postfix to provide spam-filtering capabilities. In order for SpamAssassin to effectively intercept, analyze and filter mail, it must listen on a network interface. The default port for SpamAssassin is TCP/783, however this can be changed. The following example provides a real-world demonstration of how SELinux complements SpamAssassin by only allowing it access to a certain port by default. This example will then demonstrate how to change the port and have SpamAssassin operate on a non-default port.
Note that this is an example only and demonstrates how SELinux can affect a simple configuration of SpamAssassin. Comprehensive documentation of SpamAssassin is beyond the scope of this document. Refer to the official SpamAssassin documentation for further details. This example assumes the spamassassin is installed, that any firewall has been configured to allow access on the ports in use, that the SELinux targeted policy is used, and that SELinux is running in enforcing mode:
Procedure 12.1. Running SpamAssassin on a non-default port
- Run the
semanagecommand to show the port that SELinux allowsspamdto listen on by default:semanage port -l | grep spamd spamd_port_t tcp 783
~]# semanage port -l | grep spamd spamd_port_t tcp 783Copy to Clipboard Copied! Toggle word wrap Toggle overflow This output shows that TCP/783 is defined inspamd_port_tas the port for SpamAssassin to operate on. - Edit the
/etc/sysconfig/spamassassinconfiguration file and modify it so that it will start SpamAssassin on the example port TCP/10000:# Options to spamd SPAMDOPTIONS="-d -p 10000 -c m5 -H"
# Options to spamd SPAMDOPTIONS="-d -p 10000 -c m5 -H"Copy to Clipboard Copied! Toggle word wrap Toggle overflow This line now specifies that SpamAssassin will operate on port 10000. The rest of this example will show how to modify SELinux policy to allow this socket to be opened. - Start SpamAssassin and an error message similar to the following will appear:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow This output means that SELinux has blocked access to this port. - A denial similar to the following will be logged by SELinux:
SELinux is preventing the spamd (spamd_t) from binding to port 10000.
SELinux is preventing the spamd (spamd_t) from binding to port 10000.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - As the root user, run
semanageto modify SELinux policy in order to allow SpamAssassin to operate on the example port (TCP/10000):semanage port -a -t spamd_port_t -p tcp 10000
~]# semanage port -a -t spamd_port_t -p tcp 10000Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Confirm that SpamAssassin will now start and is operating on TCP port 10000:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - At this point,
spamdis properly operating on TCP port 10000 as it has been allowed access to that port by SELinux policy.
Chapter 13. DHCP 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
DHCPD is the daemon used in Red Hat Enterprise Linux to dynamically deliver and configure Layer 3 TCP/IP details for clients.
The dhcp package provides the DHCP server,
dhcpd. Run the rpm -q dhcp command to see if the dhcp package is installed. If it is not installed, run the following command as the root user to install it:
yum install dhcp
~]# yum install dhcp
13.1. DHCP and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When DHCPD is enabled, it runs confined by default. Confined processes run in their own domains, and are separated from other confined processes. If a confined process is compromised by an attacker, depending on SELinux policy configuration, an attacker's access to resources and the possible damage they can do is limited. The following example demonstrates the DHCPD and related processes running in their own domain. This example assumes the dhcp package is installed and that the DHCPD service has been started:
- Run the
getenforcecommand to confirm SELinux is running in enforcing mode:getenforce Enforcing
~]$ getenforce EnforcingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Thegetenforcecommand returnsEnforcingwhen SELinux is running in enforcing mode. - Run the
service dhcpd startcommand as the root user to startDHCPD:service dhcpd start Starting dhcpd: [ OK ]
~]# service dhcpd start Starting dhcpd: [ OK ]Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the
ps -eZ | grep dhcpdcommand to view thedhcpdprocesses:ps -eZ | grep dhcpd unconfined_u:system_r:dhcpd_t:s0 5483 ? 00:00:00 dhcpd
~]$ ps -eZ | grep dhcpd unconfined_u:system_r:dhcpd_t:s0 5483 ? 00:00:00 dhcpdCopy to Clipboard Copied! Toggle word wrap Toggle overflow The SELinux context associated with the dhcpd process isunconfined_u:system_r:dhcpd_t:s0.
13.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with
dhcpd:
dhcp_etc_t- This type is mainly used for files in
/etc, including configuration files. dhcpd_var_run_t- This type is used for the PID file for dhcpd, in
/var/run. dhcpd_exec_t- This type is used for transition of DHCP executable files to the
dhcpd_tdomain. dhcpd_initrc_exec_t- This type is used for transition of DHCP executable files to the
dhcpd_initrc_tdomain.
Note
To see the full list of files and their types for dhcp, run the following command:
grep dhcp /etc/selinux/targeted/contexts/files/file_contexts
~]$ grep dhcp /etc/selinux/targeted/contexts/files/file_contexts
Chapter 14. OpenShift by Red Hat 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
OpenShift by Red Hat is a Platform as a Service (PaaS) that enables developers to build and deploy web applications. OpenShift provides a wide selection of programming languages and frameworks including Java, Ruby, and PHP. It also provides integrated developer tools to support the application life cycle, including Eclipse integration, JBoss Developer Studio, and Jenkins. OpenShift uses an open source ecosystem to provide a platform for mobile applications, database services, and more. [13]
14.1. OpenShift and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux provides better security control over applications that use OpenShift because all processes are labeled according to the SELinux policy. Therefore, SELinux protects OpenShift from possible malicious attacks within different gears running on the same node.
See the Dan Walsh's presentation for more information about SELinux and OpenShift.
14.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with OpenShift. Different types allow you to configure flexible access:
Process types
openshift_t- The OpenShift process is associated with the
openshift_tSELinux type.
Types on executables
openshift_cgroup_read_exec_t- SELinux allows files with this type to transition an executable to the
openshift_cgroup_read_tdomain. openshift_cron_exec_t- SELinux allows files with this type to transition an executable to the
openshift_cron_tdomain. openshift_initrc_exec_t- SELinux allows files with this type to transition an executable to the
openshift_initrc_tdomain.
Writable types
openshift_cgroup_read_tmp_t- This type allows OpenShift control groups (cgroup) read and access temporary files in the
/tmp/directory. openshift_cron_tmp_t- This type allows storing temporary files of the OpenShift cron jobs in
/tmp/. openshift_initrc_tmp_t- This type allows storing the OpenShift
initrctemporary files in/tmp/. openshift_log_t- Files with this type are treated as OpenShift log data, usually stored under the
/var/log/directory. openshift_rw_file_t- OpenShift have permission to read and to write to files labeled with this type.
openshift_tmp_t- This type is used for storing the OpenShift temporary files in
/tmp/. openshift_tmpfs_t- This type allows storing the OpenShift data on a tmpfs file system.
openshift_var_lib_t- This type allows storing the OpenShift files in the
/var/lib/directory. openshift_var_run_t- This type allows storing the OpenShift files in the
/run/or/var/run/directory.
14.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
openshift_use_nfs- Having this Boolean enabled allows installing OpenShift on an NFS share.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
14.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
14.4.1. Changing the Default OpenShift Directory 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
By default, OpenShift stores its data in the
/var/lib/openshift/ directory, which is labeled with the openshift_var_lib_t SELinux type. To allow OpenShift to store data in a different directory, label the new directory with the proper SELinux context.
The following procedure shows how to change the default OpenShift directory for storing data to
/srv/openshift/:
Procedure 14.1. Changing the Default OpenShift Directory for Storing Data
- As root, create a new
/openshift/directory within the/srv/directory. The new directory is labeled with thevar_ttype:mkdir /srv/openshift
~]# mkdir /srv/openshiftCopy to Clipboard Copied! Toggle word wrap Toggle overflow ls -Zd /srv/openshift drwxr-xr-x. root root unconfined_u:object_r:var_t:s0 openshift/
~]$ ls -Zd /srv/openshift drwxr-xr-x. root root unconfined_u:object_r:var_t:s0 openshift/Copy to Clipboard Copied! Toggle word wrap Toggle overflow - As root, use the
semanageutility to map/srv/openshift/to the proper SELinux context:semanage fcontext -a -e /var/lib/openshift /srv/openshift
~]# semanage fcontext -a -e /var/lib/openshift /srv/openshiftCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Then, use the
restoreconutility as root to apply the changes:restorecon -R -v /srv/openshift
~]# restorecon -R -v /srv/openshiftCopy to Clipboard Copied! Toggle word wrap Toggle overflow - The
/srv/openshift/directory is now labeled with the correctopenshift_var_lib_ttype:~]$ls -Zd /srv/openshift drwxr-xr-x. root root unconfined_u:object_r:openshift_var_lib_t:s0 openshift/
~]$ls -Zd /srv/openshift drwxr-xr-x. root root unconfined_u:object_r:openshift_var_lib_t:s0 openshift/Copy to Clipboard Copied! Toggle word wrap Toggle overflow
[13]
To learn more about OpenShift, see OpenShift Enterprise documentation and OpenShift Online documentation.
Chapter 15. Red Hat Gluster Storage 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Red Hat Gluster Storage provides flexible and affordable unstructured data storage for the enterprise. GlusterFS, a key building block of Gluster, is based on a stackable user-space design and aggregates various storage servers over a network and interconnects them into one large parallel network file system. The POSIX-compatible GlusterFS servers, which use the XFS file system format to store data on disks, can be accessed using industry standard access protocols including NFS and CIFS.
See the Red Hat Gluster Storage collection of guides for more information.
The glusterfs package provides Red Hat Gluster Storage. For detailed information about its installation process, see the Installation Guide for Red Hat Gluster Storage.
15.1. Red Hat Gluster Storage and SELinux 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
When enabled, SELinux serves as an additional security layer by providing flexible mandatory access control for the
glusterd (GlusterFS Management Service) and glusterfsd (NFS server) processes as a part of Red Hat Gluster Storage. These processes have advanced process isolation unbounded with the glusterd_t SELinux type.
15.2. Types 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with Red Hat Gluster Storage. Different types allow you to configure flexible access:
Process types
glusterd_t- The Gluster processes are associated with the
glusterd_tSELinux type.
Types on executables
glusterd_initrc_exec_t- The SELinux-specific script type context for the Gluster init script files.
glusterd_exec_t- The SELinux-specific executable type context for the Gluster executable files.
Port Types
gluster_port_t- This type is defined for
glusterd. By default,glusterduses 204007-24027, and 38465-38469 TCP ports.
File Contexts
glusterd_brick_t- This type is used for files threated as
glusterdbrick data. glusterd_conf_t- This type is associated with the
glusterdconfiguration data, usually stored in the/etc/directory. glusterd_log_t- Files with this type are treated as
glusterdlog data, usually stored under the/var/log/directory. glusterd_tmp_t- This type is used for storing the
glusterdtemporary files in the/tmp/directory. glusterd_var_lib_t- This type allows storing the
glusterdfiles in the/var/lib/directory. glusterd_var_run_t- This type allows storing the
glusterdfiles in the/run/or/var/run/directory.
15.3. Booleans 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
SELinux is based on the least level of access required for a service to run. Services can be run in a variety of ways; therefore, you need to specify how you run your services. Use the following Booleans to set up SELinux:
gluster_export_all_ro- Having this Boolean enabled allows
glusterfsdto share files and directory as read-only. This Boolean is disabled by default. gluster_export_all_rw- Having this Boolean enabled allows
glusterfsdto share files and directories with read and write access. This Boolean is enabled by default. gluster_anon_write- Having this Boolean enabled allows
glusterfsdto modify public files labeled with thepublic_content_rw_tSELinux type.
Note
Due to the continuous development of the SELinux policy, the list above might not contain all Booleans related to the service at all times. To list them, run the following command as root:
semanage boolean -l | grep service_name
~]# semanage boolean -l | grep service_name
15.4. Configuration Examples 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
15.4.1. Labeling Gluster Bricks 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
A Gluster brick is an export directory on a server in the trusted storage pool. In case that the brick is not labeled with the correct SELinux context,
glusterd_brick_t, SELinux denies certain file access operations and generates various AVC messages.
The following procedure shows how to label Gluster bricks with the correct SELinux context. The procedure assumes that you previously created and formatted a logical volume, for example
/dev/rhgs/gluster, to be used as the Gluster brick.
For detailed information about Gluster bricks, see the Red Hat Gluster Storage Volumes chapter in the Administration Guide for Red Hat Gluster Storage.
Procedure 15.1. How to Label a Gluster Brick
- Create a directory to mount the previously formatted logical volume. For example:
mkdir /mnt/brick1
~]# mkdir /mnt/brick1Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Mount the logical volume, in this case
/dev/vg-group/gluster, to the/mnt/brick1/directory created in the previous step.mount /dev/vg-group/gluster /mnt/brick1/
~]# mount /dev/vg-group/gluster /mnt/brick1/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note that themountcommand mounts devices only temporarily. To mount the device permanently, add an entry similar as the following one to the/etc/fstabfile:/dev/vg-group/gluster /mnt/brick1 xfs rw,inode64,noatime,nouuid 1 2
/dev/vg-group/gluster /mnt/brick1 xfs rw,inode64,noatime,nouuid 1 2Copy to Clipboard Copied! Toggle word wrap Toggle overflow For more information, see the fstab(5) manual page. - Check the SELinux context of
/mnt/brick1/:ls -lZd /mnt/brick1/ drwxr-xr-x. root root system_u:object_r:unlabeled_t:s0 /mnt/brick1/
~]$ ls -lZd /mnt/brick1/ drwxr-xr-x. root root system_u:object_r:unlabeled_t:s0 /mnt/brick1/Copy to Clipboard Copied! Toggle word wrap Toggle overflow The directory is labeled with theunlabeled_tSELinux type. - Change the SELinux type of
/mnt/brick1/to theglusterd_brick_tSELinux type:semanage fcontext -a -t glusterd_brick_t "/mnt/brick1(/.*)?"
~]# semanage fcontext -a -t glusterd_brick_t "/mnt/brick1(/.*)?"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Use the
restoreconutility to apply the changes:restorecon -Rv /mnt/brick1
~]# restorecon -Rv /mnt/brick1Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Finally, verify that the context has been successfully changed:
ls -lZd /mnt/brick1 drwxr-xr-x. root root system_u:object_r:glusterd_brick_t:s0 /mnt/brick1/
~]$ ls -lZd /mnt/brick1 drwxr-xr-x. root root system_u:object_r:glusterd_brick_t:s0 /mnt/brick1/Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 16. References 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
The following references are pointers to additional information that is relevant to SELinux but beyond the scope of this guide. Note that due to the rapid development of SELinux, some of this material may only apply to specific releases of Red Hat Enterprise Linux.
Books
- SELinux by Example
- Mayer, MacMillan, and CaplanPrentice Hall, 2007
- SELinux: NSA's Open Source Security Enhanced Linux
- Bill McCartyO'Reilly Media Inc., 2004
Tutorials and Help
- Tutorials and talks from Russell Coker
- Dan Walsh's Journal
- Red Hat Knowledgebase
General Information
- NSA SELinux main website
- NSA SELinux FAQ
Mailing Lists
- NSA SELinux mailing list
- Fedora SELinux mailing list
Community
- SELinux Project Wiki
- SELinux community page
- IRC
- irc.freenode.net, #selinux
Appendix A. Revision History 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
| Revision History | |||
|---|---|---|---|
| Revision 9-1 | Wed Mar 15 2017 | ||
| |||
| Revision 9-0 | Wed Dec 21 2016 | ||
| |||
| Revision 8-0 | Wed May 3 2016 | ||
| |||
| Revision 7-1 | Thu Jul 9 2015 | ||
| |||
| Revision 6-0 | Fri Oct 10 2014 | ||
| |||
| Revision 5-0 | Tue Nov 19 2013 | ||
| |||
| Revision 4-0 | Fri Feb 22 2013 | ||
| |||
| Revision 3-0 | Wed Jun 20 2012 | ||
| |||
| Revision 2-0 | Tue Dec 6 2011 | ||
| |||
| Revision 1-0 | Thu May 19 2011 | ||
| |||
| Revision 0-0 | Tue Nov 9 2010 | ||
| |||
Legal Notice 复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Copyright © 2016 Red Hat, Inc.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.