-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable SELinux for tendrl #241
Comments
TimothyAsirJeyasing
added a commit
to TimothyAsirJeyasing/specifications
that referenced
this issue
Aug 18, 2017
tendrl-bug-id: Tendrl#241 Signed-off-by: Timothy Asir J <[email protected]>
TimothyAsirJeyasing
added a commit
to TimothyAsirJeyasing/specifications
that referenced
this issue
Aug 21, 2017
tendrl-bug-id: Tendrl#241 Signed-off-by: Timothy Asir J <[email protected]>
TimothyAsirJeyasing
added a commit
to TimothyAsirJeyasing/specifications
that referenced
this issue
Sep 7, 2017
tendrl-bug-id: Tendrl#241 Signed-off-by: Timothy Asir J <[email protected]>
5 tasks
What is the summary of this, where do we stand today? |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The following are the identified security issues should be fixed in tendrl.
Currently tendrl does not work with selinux enabled. A SELinux-enabled system that runs in permissive mode is not protected by SELinux. which will leads to privilege escalation issue. This allows the system to be attacked if it does not managed by Selinux completely. A normal user with no specific privileges on the system who is trying to interact with one of the root-running processes that can suddenly misbehave and give the user root access or allows the user to launch root access commands.
Currently tendrl services like gluster-integration, node-agent, api, monitoring-integration services are running as unconfined services.
ex1: system_u:system_r:unconfined_service_t:s0 18240 ? 02:51:40 tendrl-node-age
ex2: system_u:system_r:unconfined_service_t:s0 18240 ? 02:51:40 tendrl-api
…
Unconfined Service issue:- This will leads the 'privileges of the process' being attacked easily. Tendrl process that run as root are prone to be attacked to get root access on the system.
From the (Ex1, ex2) tendrl-node-agent, tendrl-api or tendrl-monitoring-integration service and its spawns, it is clear that it does not belong to any selinux domain. Proper selinux domain should be assigned to every tendrl services to identify what is allowed for this service.
Currently tendrl does not have enough confined rules for files being used by its process. Contexts for files used by tendrl should also be specified clearly. So that the resource can be used with the restricted gated privilege. The file or directory created in a directory should also acquire same context.
Currently, tendrl needs SElinux in permissive mode, It can not be left to see later. Because
When the system runs SELinux in permissive mode, users are able to label files incorrectly. Files created with SELinux in permissive mode are not labeled correctly while files created while SELinux is disabled are not labeled at all. This behavior causes problems when changing to enforcing mode.
The text was updated successfully, but these errors were encountered: