mirror of
https://github.com/SELinuxProject/selinux
synced 2024-12-11 08:35:01 +00:00
42b4a44b74
Add support for extended permissions to audit2allow. Extend AuditParser to parse the 'ioctlcmd' field in AVC message. Extend PolicyGenerator to generate allowxperm rules. Add the '-x'/'--xperms' option to audit2allow to turn on generating of extended permission AV rules. AVCMessage parses the ioctlcmd field in AVC messages. AuditParser converts the ioctlcmd values into generic representation of extended permissions that is stored in access vectors. Extended permissions are represented by operations (currently only 'ioctl') and values associated to the operations. Values (for example '~{ 0x42 1234 23-34 }') are stored in the XpermSet class. PolicyGenerator contains new method to turn on generating of xperms. When turned on, for each access vector, standard AV rule and possibly several xperm AV rules are generated. Xperm AV rules are represented by the AVExtRule class. With xperm generating turned off, PolicyGenerator provides comments about extended permissions in certain situations. When the AVC message contains the ioctlcmd field and the access would be allowed according to the policy, PolicyGenerator warns about xperm rules being the possible cause of the denial. Signed-off-by: Jan Zarsky <jzarsky@redhat.com>
244 lines
14 KiB
Python
244 lines
14 KiB
Python
# Authors: Karl MacMillan <kmacmillan@mentalrootkit.com>
|
|
#
|
|
# Copyright (C) 2006 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License as
|
|
# published by the Free Software Foundation; version 2 only
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
#
|
|
|
|
import unittest
|
|
import sepolgen.audit
|
|
import sepolgen.refpolicy
|
|
|
|
# syslog message
|
|
audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
|
|
|
|
# audit daemon messages
|
|
audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability"""
|
|
|
|
log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
|
|
type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
|
|
type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
|
|
type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=SYSCALL msg=audit(1158584780.793:711): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0ba38 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
|
|
type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=SYSCALL msg=audit(1158584780.797:712): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
|
|
type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=AVC msg=audit(1158584780.801:713): avc: denied { dac_read_search } for pid=8146 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
|
|
type=AVC_PATH msg=audit(1162850461.778:1113): path="/etc/rc.d/init.d/innd"
|
|
"""
|
|
|
|
granted1 = """type=AVC msg=audit(1188833848.190:34): avc: granted { getattr } for pid=4310 comm="ls" name="foo.pp" dev=sda5 ino=295171 scontext=user_u:system_r:unconfined_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file"""
|
|
|
|
path1 = """type=AVC_PATH msg=audit(1162852201.019:1225): path="/usr/lib/sa/sa1"
|
|
"""
|
|
|
|
log2 = """type=AVC_PATH msg=audit(1162852201.019:1225): path="/usr/lib/sa/sa1"
|
|
type=SYSCALL msg=audit(1162852201.019:1225): arch=40000003 syscall=11 success=yes exit=0 a0=87271b0 a1=8727358 a2=8727290 a3=8727008 items=0 ppid=6973 pid=6974 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null)
|
|
type=AVC msg=audit(1162852201.019:1225): avc: denied { execute_no_trans } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file
|
|
type=AVC msg=audit(1162852201.019:1225): avc: denied { execute } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file"""
|
|
|
|
xperms1 = """type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=0x42 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0
|
|
"""
|
|
xperms2 = """type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=0x42 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0
|
|
type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=0x1234 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0
|
|
type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=0xdead scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0
|
|
type=AVC msg=audit(1516626657.910:4461): avc: denied { getattr } for pid=4310 comm="test" path="/root/test" ino=8619937 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=dir permissive=0
|
|
"""
|
|
xperms_invalid = """type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 ioctlcmd=asdf scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0
|
|
"""
|
|
xperms_without = """type=AVC msg=audit(1516626657.910:4461): avc: denied { ioctl } for pid=4310 comm="test" path="/root/test" ino=8619937 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:test_file_t:s0 tclass=file permissive=0
|
|
"""
|
|
|
|
class TestAVCMessage(unittest.TestCase):
|
|
def test_defs(self):
|
|
avc = sepolgen.audit.AVCMessage(audit1)
|
|
sc = sepolgen.refpolicy.SecurityContext()
|
|
self.assertEqual(avc.scontext, sc)
|
|
self.assertEqual(avc.tcontext, sc)
|
|
self.assertEqual(avc.tclass, "")
|
|
self.assertEqual(avc.accesses, [])
|
|
self.assertEqual(avc.ioctlcmd, None)
|
|
|
|
def test_granted(self):
|
|
avc = sepolgen.audit.AVCMessage(granted1)
|
|
avc.from_split_string(granted1.split())
|
|
|
|
self.assertEqual(avc.scontext.user, "user_u")
|
|
self.assertEqual(avc.scontext.role, "system_r")
|
|
self.assertEqual(avc.scontext.type, "unconfined_t")
|
|
self.assertEqual(avc.scontext.level, "s0")
|
|
|
|
self.assertEqual(avc.tcontext.user, "user_u")
|
|
self.assertEqual(avc.tcontext.role, "object_r")
|
|
self.assertEqual(avc.tcontext.type, "user_home_t")
|
|
self.assertEqual(avc.tcontext.level, "s0")
|
|
|
|
self.assertEqual(avc.tclass, "file")
|
|
self.assertEqual(avc.accesses, ["getattr"])
|
|
|
|
self.assertEqual(avc.denial, False)
|
|
|
|
def test_xperms(self):
|
|
"""Test that the ioctlcmd field is parsed"""
|
|
avc = sepolgen.audit.AVCMessage(xperms1)
|
|
recs = xperms1.split()
|
|
avc.from_split_string(recs)
|
|
|
|
self.assertEqual(avc.ioctlcmd, 66)
|
|
|
|
def test_xperms_invalid(self):
|
|
"""Test message with invalid value in the ioctlcmd field"""
|
|
avc = sepolgen.audit.AVCMessage(xperms_invalid)
|
|
recs = xperms_invalid.split()
|
|
avc.from_split_string(recs)
|
|
|
|
self.assertIsNone(avc.ioctlcmd)
|
|
|
|
def test_xperms_without(self):
|
|
"""Test message without the ioctlcmd field"""
|
|
avc = sepolgen.audit.AVCMessage(xperms_without)
|
|
recs = xperms_without.split()
|
|
avc.from_split_string(recs)
|
|
|
|
self.assertIsNone(avc.ioctlcmd)
|
|
|
|
def test_from_split_string(self):
|
|
# syslog message
|
|
avc = sepolgen.audit.AVCMessage(audit1)
|
|
recs = audit1.split()
|
|
avc.from_split_string(recs)
|
|
|
|
self.assertEqual(avc.header, "audit(1158064002.046:4):")
|
|
self.assertEqual(avc.scontext.user, "user_u")
|
|
self.assertEqual(avc.scontext.role, "system_r")
|
|
self.assertEqual(avc.scontext.type, "bluetooth_helper_t")
|
|
self.assertEqual(avc.scontext.level, "s0-s0:c0")
|
|
|
|
self.assertEqual(avc.tcontext.user, "system_u")
|
|
self.assertEqual(avc.tcontext.role, "object_r")
|
|
self.assertEqual(avc.tcontext.type, "xdm_tmp_t")
|
|
self.assertEqual(avc.tcontext.level, "s0")
|
|
|
|
self.assertEqual(avc.tclass, "file")
|
|
self.assertEqual(avc.accesses, ["read"])
|
|
|
|
self.assertEqual(avc.comm, "bluez-pin")
|
|
|
|
|
|
self.assertEqual(avc.denial, True)
|
|
|
|
# audit daemon message
|
|
avc = sepolgen.audit.AVCMessage(audit2)
|
|
recs = audit2.split()
|
|
avc.from_split_string(recs)
|
|
|
|
self.assertEqual(avc.header, "audit(1158584779.745:708):")
|
|
self.assertEqual(avc.scontext.user, "user_u")
|
|
self.assertEqual(avc.scontext.role, "system_r")
|
|
self.assertEqual(avc.scontext.type, "vpnc_t")
|
|
self.assertEqual(avc.scontext.level, "s0")
|
|
|
|
self.assertEqual(avc.tcontext.user, "user_u")
|
|
self.assertEqual(avc.tcontext.role, "system_r")
|
|
self.assertEqual(avc.tcontext.type, "vpnc_t")
|
|
self.assertEqual(avc.tcontext.level, "s0")
|
|
|
|
self.assertEqual(avc.tclass, "capability")
|
|
self.assertEqual(avc.accesses, ["dac_read_search"])
|
|
|
|
self.assertEqual(avc.comm, "sh")
|
|
|
|
self.assertEqual(avc.denial, True)
|
|
|
|
class TestPathMessage(unittest.TestCase):
|
|
def test_from_split_string(self):
|
|
path = sepolgen.audit.PathMessage(path1)
|
|
recs = path1.split()
|
|
path.from_split_string(recs)
|
|
self.assertEqual(path.path, "/usr/lib/sa/sa1")
|
|
|
|
# TODO - add tests for the other message types
|
|
|
|
|
|
# TODO - these tests need a lot of expansion and more examples of
|
|
# different types of log files
|
|
class TestAuditParser(unittest.TestCase):
|
|
def test_parse_string(self):
|
|
a = sepolgen.audit.AuditParser()
|
|
a.parse_string(log1)
|
|
self.assertEqual(len(a.avc_msgs), 11)
|
|
self.assertEqual(len(a.compute_sid_msgs), 0)
|
|
self.assertEqual(len(a.invalid_msgs), 0)
|
|
self.assertEqual(len(a.policy_load_msgs), 0)
|
|
self.assertEqual(len(a.path_msgs), 1)
|
|
|
|
def test_post_process(self):
|
|
a = sepolgen.audit.AuditParser()
|
|
a.parse_string(log2)
|
|
self.assertEqual(len(a.avc_msgs), 2)
|
|
self.assertEqual(a.avc_msgs[0].path, "/usr/lib/sa/sa1")
|
|
self.assertEqual(a.avc_msgs[1].path, "/usr/lib/sa/sa1")
|
|
|
|
def test_parse_file(self):
|
|
f = open("audit.txt")
|
|
a = sepolgen.audit.AuditParser()
|
|
a.parse_file(f)
|
|
f.close()
|
|
self.assertEqual(len(a.avc_msgs), 21)
|
|
self.assertEqual(len(a.compute_sid_msgs), 0)
|
|
self.assertEqual(len(a.invalid_msgs), 0)
|
|
self.assertEqual(len(a.policy_load_msgs), 0)
|
|
|
|
def test_parse_xperms(self):
|
|
""" Test that correct access vectors are generated from a set of AVC
|
|
denial messages. """
|
|
a = sepolgen.audit.AuditParser()
|
|
a.parse_string(xperms2)
|
|
av_set = a.to_access()
|
|
|
|
self.assertEqual(len(av_set), 2)
|
|
av_list = list(sorted(av_set))
|
|
self.assertEqual(av_list[0].xperms, {})
|
|
self.assertEqual(list(av_list[1].xperms), ["ioctl"])
|
|
self.assertEqual(av_list[1].xperms["ioctl"].ranges, [(66,66),
|
|
(4660,4660), (57005,57005)])
|
|
|
|
class TestGeneration(unittest.TestCase):
|
|
def test_generation(self):
|
|
parser = sepolgen.audit.AuditParser()
|
|
parser.parse_string(log1)
|
|
avs = parser.to_access()
|
|
|
|
self.assertEqual(len(avs), 1)
|
|
|
|
def test_genaration_granted(self):
|
|
parser = sepolgen.audit.AuditParser()
|
|
parser.parse_string(granted1)
|
|
avs = parser.to_access()
|
|
|
|
self.assertEqual(len(avs), 0)
|
|
|
|
avs = parser.to_access(only_denials=False)
|
|
|
|
self.assertEqual(len(avs), 1)
|
|
|