Skip to content

Conversation

@ngutlhtej
Copy link

As per sympa-community/sympa#799

/var/run/sympa(/.*)? requires httpd_var_run_t SELinux label

This is for the mailing list manager "sympa" currently in Fedora and EPEL.

@zpytela
Copy link
Contributor

zpytela commented May 14, 2020

@BenjaminLefoul, this commit as such looks good, even a file transition is not needed if the runtime files are only managed by httpd. However, it looks sympa has a few services; without a particular context for the executables, all of the services run in the unconfined_service_t domain. Did you think about confining the services to improve security of the package?

In particular, the following permission is unlikely to be allowed in selinux-policy:

allow httpd_t unconfined_service_t:unix_stream_socket connectto;

@ngutlhtej
Copy link
Author

Thanks for that quick reply @zpytela

Yes we need to set the contexts on the executable sympa files.
Note however that that permission is not needed on RHEL8 (which I admit is my main concern right now). I assume this is because RHEL8 has the following permission and Fedora doesn't:

allow domain unconfined_service_t:unix_stream_socket connectto;

...but I am not sure, there may be another reason?

@wrabcak wrabcak requested a review from zpytela May 14, 2020 13:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants