Re: [gentoo-hardened] Some Selinux questions on a fresh install

2013-02-24 Thread Luis Ressel
On Fri, 22 Feb 2013 19:27:00 + Sven Vermeulen wrote: > I also notice a lot of capability (mknod) requests in the denials - > again, without noticeable change in behavior. Very awkward to debug - > I can't just dontaudit it (not convinced they aren't needed) nor > allow (not convinced they are

Re: [gentoo-hardened] grsec warnings and segfaults during emerging world

2013-04-23 Thread Luis Ressel
Haven't looked into this specific message, but I guess you shouldn't worry about it too much. The denials (ulimits) would also occur on gentoo-sources (or every other kernel, for that matter), they just wouldn't be recorded. And most probably it's the same with the segfault. It happens always, you

Re: [gentoo-hardened] grsec warnings and segfaults during emerging world

2013-04-23 Thread Luis Ressel
By the way: If you value your mental health and are not one of those insanes^Wgeniuses, I'd recommend you to stay away from the toolchain build process. Far away. ;) -- Luis ara...@aixah.de signature.asc Description: PGP signature

Re: [gentoo-hardened] syslog-ng 3.4 config

2013-07-11 Thread Luis Ressel
Yes, these are the vanilla configs. See https://bugs.gentoo.org/show_bug.cgi?id=375853, it's also documented in the ChangeLog. The hardened config files can now be found at /usr/share/doc/syslog-ng-3.4.2/syslog-ng.{conf.gentoo,logrotate}.hardened.bz2 . signature.asc Description: PGP signature

Re: [gentoo-hardened] Running rc-service without run_init

2014-01-25 Thread Luis Ressel
o the correct domain (initrc_t) beforce execv()'ing the script. Are there any plans to change this? Regards, Luis -- Luis Ressel GPG fpr: F08D 2AF6 655E 25DE 52BC E53D 08F5 7F90 3029 B5BD signature.asc Description: PGP signature

[gentoo-hardened] sys-apps/pcsc-lite needs to access /sys

2014-02-09 Thread Luis Ressel
course of action be preferred? Regards, Luis Ressel -- Luis Ressel GPG fpr: F08D 2AF6 655E 25DE 52BC E53D 08F5 7F90 3029 B5BD signature.asc Description: PGP signature

Re: [gentoo-hardened] sys-apps/pcsc-lite needs to access /sys

2014-02-09 Thread Luis Ressel
ion. What do you think about this? Is it just overcomplicated or a good way to go? Also, do you know of other programs which have problems with GRKERNSEC_SYSFS_RESTRICT? I'd be willing to write the eclass if you like the idea. Regards, Luis Ressel -- Luis Ressel GPG fpr: F08D 2AF6 655E 25DE 52BC E5

Re: [gentoo-hardened] sys-apps/pcsc-lite needs to access /sys

2014-02-09 Thread Luis Ressel
hey are member > of said group without that group being the primary group, etc. I'll do that. Regards, Luis Ressel signature.asc Description: PGP signature

Re: [gentoo-hardened] sys-apps/pcsc-lite needs to access /sys

2014-02-15 Thread Luis Ressel
but that seems a bit messy.) Regards, Luis Ressel signature.asc Description: PGP signature

Re: [gentoo-hardened] sys-apps/pcsc-lite needs to access /sys

2014-02-17 Thread Luis Ressel
the sysfs gid configurable, let's see if grsecurity will incorporate it... Regards, Luis Ressel signature.asc Description: PGP signature

Re: [gentoo-hardened] Help testing full end-to-end xattr support in portage

2014-06-26 Thread Luis Ressel
, but still worse than the ~2 minutes in the good ol' days with vanilla install). I'll test more ebuilds in the next days. PS: I wonder if sys-apps/paxctl could be removed from the @system set now, as it's obsolete and superseded by elfix. Regards, Luis Ressel signature.asc Description: PGP signature

Re: [gentoo-hardened] Help testing full end-to-end xattr support in portage

2014-07-02 Thread Luis Ressel
t least not in a simple way. This doesn't work on systems like mine which don't respect PT_PAX flags. I'm currently working on a patch for sbcl (there are selinux-related issues as well), but please have a look at the other ebuilds. [1] $ echo /usr/portage/*/*/*.ebuild|xargs -n1000 grep -P 'paxctl(?!-ng)'|cut -d: -f1 Regards, Luis Ressel signature.asc Description: PGP signature

Re: [gentoo-hardened] Help testing full end-to-end xattr support in portage

2014-07-12 Thread Luis Ressel
isp/sbcl to work (there are SELinux issues as well), I'll file the bug about its paxctl usage in a short while. It's been helpful that you mentioned paxmark.sh, I didn't know about that script before. I'll see if I can have a look at more of the potentially problematic

Re: [gentoo-hardened] Help testing full end-to-end xattr support in portage

2014-07-13 Thread Luis Ressel
LF headers, doesn't preserve xattrs; therefore, a separate pax-mark in src_install() is required. I bet there are more bugs like this one in other packages. Btw: Should such bugs block #427888? Regards, Luis Ressel signature.asc Description: PGP signature

Re: [gentoo-hardened] SELinux userspace patches in hardened-dev?

2014-08-05 Thread Luis Ressel
er a different way to centrally manage the patches > (they sometimes become too large to be put in the ${FILESDIR} so I > moved towards a patchbundle)? > > Wkr, > Sven Vermeulen > > It would be certainly helpful for downstream users/developers like me. Regards, Luis Ressel signature.asc Description: PGP signature

Re: [gentoo-hardened] SELinux userspace patches in hardened-dev?

2014-08-05 Thread Luis Ressel
On Wed, 6 Aug 2014 00:53:41 +0200 Luis Ressel wrote: > On Tue, 5 Aug 2014 12:47:32 + > Sven Vermeulen wrote: > > > Hi all > > > > Is it ok if I create a branch in the hardened-dev repo (called > > "selinux-userland") which contains the patches fo

Re: [gentoo-hardened] Update on SELinux eclass to support different git repo or branch

2014-08-06 Thread Luis Ressel
That sounds great! Up to now, I compiled and loaded my patched policy manually, but I think I'll switch over to using the -'s and configuring them to use my own repo. Regards, Luis signature.asc Description: PGP signature

Re: [gentoo-hardened] SELinux userspace patches in hardened-dev?

2014-08-06 Thread Luis Ressel
patchset.git > proj/hardened-patchset.git) keep patches separately. > Perhaps hardened-selinuxpatchset? > > Amadeusz > > I'd rather not have to keep track of yet another repository. What's wrong with a branch? Using "git checkout --orphan newbranch", one can create completely independent branches. Regards, Luis ressel signature.asc Description: PGP signature

Re: [gentoo-hardened] Exploring Gentoo Hardened

2014-08-11 Thread Luis Ressel
VBox VM just as a > learning exercise and which I understand it won't be as secure as > doing it on bare metal I'd be very interested in hearing about others > experience in this area. I've never used Virtualbox, but I know hardened-sources kernels work very well in KVM environments. That said, it's certainly a wise decision to test substantive system changes beforehand in a virtualized environment. Regards, Luis Ressel PS: Wow, that mail I've just written somehow reminds me of Duncan. signature.asc Description: PGP signature

Re: [gentoo-hardened] SELinux: Granting kernel_t (kdevtmpfs) manage rights on /dev/*

2015-03-04 Thread Luis Ressel
refer not to diverge further from upstream if we can avoid it. 5. seems to be the cleanest solution, but I've got to dig around a bit in the refpolicy to estimate the amount of work it'd require. If we want a temporary fix, I'd go with 3. It's only a tiny change, so it wouldn

[gentoo-hardened] [PATCH] services/postgresql.fc: Drop obsolete distro_gentoo block

2015-10-10 Thread Luis Ressel
Only some of the binaries in /usr/lib/postgresql-.../bin should be marked postgresql_exec_t (e.g. pg_ctl), the others (e.g. psql) should get a bin_t marking so they're user-accessible. refpolicy applies correct labels since last year (commit 3738cf10), but this ifdef block still overrides them on G

[gentoo-hardened] SELinux: portage_ro_role

2015-10-15 Thread Luis Ressel
actually expect $1 to be a type. So, we should either 1) replace $1 with $2 inside the interface, or 2) rename the interface to something without _role and fix the documentation. Regards, Luis Ressel

[gentoo-hardened] [PATCH 4/4] portage: Add new interfaces to portage_ro_role

2015-10-15 Thread Luis Ressel
--- policy/modules/contrib/portage.if | 2 ++ 1 file changed, 2 insertions(+) diff --git a/policy/modules/contrib/portage.if b/policy/modules/contrib/portage.if index 962dcca..e9de28e 100644 --- a/policy/modules/contrib/portage.if +++ b/policy/modules/contrib/portage.if @@ -410,6 +410,8 @@ inter

[gentoo-hardened] [PATCH 3/4] portage: New read-only interfaces for srcrepo and logs

2015-10-15 Thread Luis Ressel
Create portage_read_srcrepo and portage_read_log interfaces. --- policy/modules/contrib/portage.if | 40 +++ 1 file changed, 40 insertions(+) diff --git a/policy/modules/contrib/portage.if b/policy/modules/contrib/portage.if index 4652319..962dcca 100644 --- a

[gentoo-hardened] [PATCH 2/4] portage: Fix the gen_require of the portage_compile_domain interface

2015-10-15 Thread Luis Ressel
The portage_compile_domain interface used portage_sandbox_t without requiring it. --- policy/modules/contrib/portage.if | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/policy/modules/contrib/portage.if b/policy/modules/contrib/portage.if index c98a763..4652319 100644 --- a

[gentoo-hardened] [PATCH 1/4] portage: Dontaudit setattr in portage_dontaudit_write_cache

2015-10-15 Thread Luis Ressel
--- policy/modules/contrib/portage.if | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/policy/modules/contrib/portage.if b/policy/modules/contrib/portage.if index 640a63b..c98a763 100644 --- a/policy/modules/contrib/portage.if +++ b/policy/modules/contrib/portage.if @@ -511,6 +

[gentoo-hardened] [PATCH] contrib/portage: Fix portage_ro_role interface

2015-10-19 Thread Luis Ressel
According to its documentation, portage_ro_role expects a role for $1 and a type for $2, just like other _role interfaces. However, the policy directives inside the interface don't match its documentation and expect $1 to be a type. This interface isn't used anywhere in the policy, so no other fix

Re: [gentoo-hardened] Questions about SELinux

2016-11-14 Thread Luis Ressel
On Sun, 13 Nov 2016 16:29:00 -0600 R0b0t1 wrote: > If there is no policy package installed and there is not one in the > tree, you are on your own until one is written. I would double check > to ensure one exists because: 1) To the best of my knowledge, there > are logging policies available, and

Re: [gentoo-hardened] Portage-related AVCs

2016-11-25 Thread Luis Ressel
On Thu, 24 Nov 2016 15:29:54 + Robert Sharp wrote: > [snip] > If so, is there a way to avoid listing all the policy packages > in my accept_keywords file? > Yes, there is. You can use globs in package.accepts_keywords; for example "sec-policy/*" Regards, Luis

Re: [gentoo-hardened] Selinux: /bin/su and pam_selinux

2017-01-21 Thread Luis Ressel
nally I've never tried making su work with SELinux. "sudo -r sysadm_r -t sysadm_t" works like a charm. Regards, Luis Ressel pgpPP56t5YQ_2.pgp Description: OpenPGP digital signature

[gentoo-hardened] RIP hardened-sources

2017-04-29 Thread Luis Ressel
Hello, in case anyone hasn't read in on LWN yet, here's what I'm talking about: https://grsecurity.net/passing_the_baton.php In short, the grsecurity upstream folks decided they don't give a shit about the benefits of open source anymore even though their work wouldn't even possible without those

Re: [gentoo-hardened] RIP hardened-sources

2017-04-29 Thread Luis Ressel
On Sat, 29 Apr 2017 18:52:56 +0200 Javier Juan Martinez Cabezon wrote: > It's not one PaX alternative as its only one of its features but rsbac > recently implemented native W or X and seems to work fine If you're only looking for userland W^X, SELinux has some support for that, too (I don't kno

Re: [gentoo-hardened] RIP hardened-sources

2017-04-29 Thread Luis Ressel
On Sat, 29 Apr 2017 17:56:10 +0200 Daniel Cegiełka wrote: > By the way, I don't know what the Gentoo Hardened or Alpine Linux > have done wrong, that now are left out in the cold. That's the part I don't get either. Since the only possible motivation I can think of for this move is to generate m

Re: [gentoo-hardened] Technical repercussions of grsecurity removal

2017-05-02 Thread Luis Ressel
On Mon, 1 May 2017 09:38:43 + Sven Vermeulen wrote: > The obvious step is indeed to stop further *current* development on > hardened-sources. I don't know how many additional patchsets are being > implemented in it (blueness? Zorry?) so I don't know if it means that > hardened-sources in tota

Re: [gentoo-hardened] Technical repercussions of grsecurity removal

2017-05-02 Thread Luis Ressel
On Tue, 2 May 2017 17:56:22 +0200 Daniel Cegiełka wrote: > grep -r -e paxmark -e pax_kernel /usr/portage/ pax.?mark actually, since the eclass helper is called pax-mark. :) I'd hold off on removing those for at least a few months, though. Regards, Luis pgpmepOaL7otT.pgp Description: OpenPGP d

Re: [gentoo-hardened] Technical repercussions of grsecurity removal

2017-05-08 Thread Luis Ressel
Hi, I don't have much to add, but I'd like to clear two misunderstandings here: On Mon, 8 May 2017 20:08:07 +0200 Miroslav Rovis wrote: > And really since late in 2016 no more entries in the Changelog. Pls. > note that I'm only stating the facts, not complaining. AFAIK the Changelogs aren't up

[gentoo-hardened] [PATCH] miscfiles: Fix typo in /usr/local/share/man fc

2017-06-07 Thread Luis Ressel
This has been sitting in our policy since 2012 (aaa0f803d), but it's obviously a typo. --- policy/modules/system/miscfiles.fc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/policy/modules/system/miscfiles.fc b/policy/modules/system/miscfiles.fc index 42ac30bda..b32e4e262 1006

Re: [gentoo-hardened] Don't kill hardened yet - Porting the patch forward is complete

2017-08-23 Thread Luis Ressel
On Wed, 23 Aug 2017 12:13:31 -0500 Parker Schmitt wrote: > Have we thought about paying spender to give us patches? We could > agree to a license that requires it to be on Gentoojust a thought Yeah, that won't work. spender and PaX team have made the experience that if they publish their cod

Re: [gentoo-hardened] What does the pic USE flag do these days?

2018-09-20 Thread Luis Ressel
a bit further for gzip). Cheers, Luis Ressel