Now I am trying to use SELinux (targeted policy) in a brand new Gentoo
stage3 (Kernel 2.6.32-hardened-r9), I tried all versions of
selinux-base-policy available, but relabeling the file system always
fails with the same error: "filespec_add: Conflicting specifications
for ...".
Am I still doing something wrong? The only thing that I can do to run
SELinux in Gentoo is try to make my own ebuild?

# rlpkg -a -r
Relabeling filesystem types: ext2 ext3 jfs xfs
filespec_add:  conflicting specifications for /usr/bin/getconf and
/usr/lib/misc/glibc/getconf/POSIX_V6_ILP32_OFFBIG, using
system_u:object_r:lib_t.
filespec_eval:  hash table stats: 251923 elements, 63077/65536 buckets
used, longest chain length 8
Scanning for shared libraries with text relocations...
0 libraries with text relocations, 0 not relabeled.
Scanning for PIE binaries with text relocations...
0 binaries with text relocations detected.

# sestatus -v
SELinux status:                 enabled
SELinuxfs mount:                /selinux
Current mode:                   permissive
Mode from config file:          enforcing
Policy version:                 24
Policy from config file:        targeted

Process contexts:
Current context:                unconfined_u:unconfined_r:unconfined_t
Init context:                   system_u:system_r:init_t
/sbin/agetty                    system_u:system_r:getty_t
/usr/sbin/sshd                  system_u:system_r:sshd_t

File contexts:
Controlling term:               unconfined_u:object_r:user_devpts_t
/sbin/init                      system_u:object_r:init_exec_t
/sbin/agetty                    system_u:object_r:getty_exec_t
/bin/login                      system_u:object_r:login_exec_t
/sbin/rc                        system_u:object_r:initrc_exec_t
/sbin/runscript.sh              system_u:object_r:initrc_exec_t
/usr/sbin/sshd                  system_u:object_r:sshd_exec_t
/sbin/unix_chkpwd               system_u:object_r:chkpwd_exec_t
/etc/passwd                     system_u:object_r:etc_t
/etc/shadow                     system_u:object_r:shadow_t
/bin/sh                         system_u:object_r:bin_t ->
system_u:object_r:shell_exec_t
/bin/bash                       system_u:object_r:shell_exec_t
/usr/bin/newrole                system_u:object_r:newrole_exec_t
/lib/libc.so.6                  system_u:object_r:lib_t ->
system_u:object_r:lib_t
/lib/ld-linux.so.2              system_u:object_r:lib_t ->
system_u:object_r:ld_so_t

# eselect profile list
Available profile symlink targets:
  [1]   default/linux/x86/10.0
  [2]   default/linux/x86/10.0/desktop
  [3]   default/linux/x86/10.0/desktop/gnome
  [4]   default/linux/x86/10.0/desktop/kde
  [5]   default/linux/x86/10.0/developer
  [6]   default/linux/x86/10.0/server
  [7]   hardened/linux/x86/10.0
  [8]   selinux/2007.0/x86
  [9]   selinux/2007.0/x86/hardened
  [10]  selinux/v2refpolicy/x86
  [11]  selinux/v2refpolicy/x86/desktop
  [12]  selinux/v2refpolicy/x86/developer
  [13]  selinux/v2refpolicy/x86/hardened *
  [14]  selinux/v2refpolicy/x86/server

# equery list -p selinux-base-policy
[ Searching for package 'selinux-base-policy' in all categories among: ]
 * installed packages
[I--] [ ~] sec-policy/selinux-base-policy-2.20091215 (0)
 * Portage tree (/usr/portage)
[-P-] [ ~] sec-policy/selinux-base-policy-2.20090730 (0)
[-P-] [ ~] sec-policy/selinux-base-policy-2.20090814 (0)
[-P-] [M ] sec-policy/selinux-base-policy-20080525 (0)
[-P-] [ ~] sec-policy/selinux-base-policy-20080525-r1 (0)

# semodule -l
apache  2.1.0
bind    1.10.0
gpg     2.2.1
java    2.2.0
local   1.0
mono    1.6.0
mozilla 2.1.1
mplayer 2.1.0
wine    1.6.0
xfs     1.6.0
xserver 3.3.1


On Mon, Nov 15, 2010 at 02:14, Chris Richards <gi...@giz-works.com> wrote:
> Ok, first and foremost, I haven't tested targeted policy (I'm still sorting
> strict policy).
> Second, the handbook states that you should use v2refpolicy.  You are
> running the 20070928 policy, which is v1 policy and is very very old.  I'm
> guessing you are working with an old system that hasn't been converted to
> v2refpolicy.
> Third, even with v2refpolicy, the current version in the tree is now almost
> a year old and has issues (which is part of what I'm working to sort out).
>  TBH, I'm not entirely certain it will boot in enforcing mode, although
> targeted policy will stand a better chance of working than strict policy.
>
> I'm working as fast as I can.  Unfortunately, my spare time is pretty, well,
> 'spare' and has been for some time.  If you want to make your own ebuild,
> you can find where to pull the latest release policy from
> http://oss.tresys.com/projects/refpolicy/wiki/DownloadRelease, or get the
> current development policy from the git repository at
> http://oss.tresys.com/git/refpolicy.git.
>
> Later,
> Gizmo
>
>

Reply via email to