On 10/24/13, 2:02 PM, Jeff Bachtel wrote:
Apologies - SSG master/HEAD, openscap 0.9.3-1
Jeff
On Thu, Oct 24, 2013 at 1:47 PM, Jeff Bachtel
<[email protected]
<mailto:[email protected]>> wrote:
Getting errors running selinux_all_devicefiles_labeled check on
RHEL6. I ran testcheck.py, and initially the check was barfing on
all of the broken symlinks under /dev/.udev/**. I deleted all of
the broken symlinks, but I'm still getting an error on one file
(that does not exist)
<system_data>
<lin-sys:selinuxsecuritycontext_item id="1255121"
status="error">
<message level="error">Can't get context for
/dev/fd/6: No such file or directory
</message>
<lin-sys:filepath>/dev/fd/6</lin-sys:filepath>
<lin-sys:path>/dev/fd</lin-sys:path>
<lin-sys:filename>6</lin-sys:filename>
</lin-sys:selinuxsecuritycontext_item>
</system_data>
Regarding the broken symlinks: should the check error out on them?
Looking, the problem might occur around
if ((ofts = oval_fts_open(path, filename,
filepath, behaviors)) != NULL) {
in OVAL/probes/unix/linux/selinuxsecuritycontext.c
Regarding the search for the stray file descriptor: the check
still errors out when run properly via oscap, as well. Might this
be some sort of race condition with the file descriptor being
opened by the probe, and disappearing before the check can get to
it? I've tried manually creating the symlink for /dev/fd/6 to
test, but devfs unfortunately won't let me create it.
Thanks for any ideas,
It's a known issue, ref
https://fedorahosted.org/scap-security-guide/ticket/392
There's much debate about how SCAP (as a protocol) should handle /proc
and /dev. We're waiting to see how things square out.
_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide