diff options
author | Dave Sugar <dsugar100@gmail.com> | 2022-08-23 22:22:41 -0400 |
---|---|---|
committer | Jason Zaman <perfinion@gentoo.org> | 2022-09-03 12:07:49 -0700 |
commit | 2a0d52aa43e15264642fcfacc8996adfd02a0724 (patch) | |
tree | 6209de2040702f74cf437e48666d4305861a2a48 | |
parent | hypervkvp: Port updated module from Fedora policy. (diff) | |
download | hardened-refpolicy-2a0d52aa43e15264642fcfacc8996adfd02a0724.tar.gz hardened-refpolicy-2a0d52aa43e15264642fcfacc8996adfd02a0724.tar.bz2 hardened-refpolicy-2a0d52aa43e15264642fcfacc8996adfd02a0724.zip |
ssh: allow ssh_keygen to read /usr/share/crypto-policies/
With RHEL9 /etc/crypto-policies/back-ends are symlinks to /usr/share/crypto-policies/*/*
node=localhost type=AVC msg=audit(1661303919.946:335): avc: denied { getattr } for pid=1025 comm="ssh-keygen" path="/usr/share/crypto-policies/FIPS/opensslcnf.txt" dev="dm-0" ino=396589 scontext=system_u:system_r:ssh_keygen_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1661303919.946:336): avc: denied { read } for pid=1025 comm="ssh-keygen" name="opensslcnf.txt" dev="dm-0" ino=396589 scontext=system_u:system_r:ssh_keygen_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1661303919.946:336): avc: denied { open } for pid=1025 comm="ssh-keygen" path="/usr/share/crypto-policies/FIPS/opensslcnf.txt" dev="dm-0" ino=396589 scontext=system_u:system_r:ssh_keygen_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=1
Signed-off-by: Dave Sugar <dsugar100@gmail.com>
Signed-off-by: Jason Zaman <perfinion@gentoo.org>
-rw-r--r-- | policy/modules/services/ssh.te | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te index ce320c6af..aa0766bbf 100644 --- a/policy/modules/services/ssh.te +++ b/policy/modules/services/ssh.te @@ -354,6 +354,7 @@ term_dontaudit_use_console(ssh_keygen_t) domain_use_interactive_fds(ssh_keygen_t) files_read_etc_files(ssh_keygen_t) +files_read_usr_files(ssh_keygen_t) init_use_fds(ssh_keygen_t) init_use_script_ptys(ssh_keygen_t) |