Re: [CentOS] fail2ban firewalld problems with current CentOS 7

2020-04-09 Thread Andreas Haumer
Hi!

Am 09.04.20 um 10:07 schrieb Rob Kampen:
[...]
> I too had fail2ban fail after an otherwise successful yum update. Mine 
> occurred in Feb when my versions of firewalld etc were updated to the 
> versions you show. Thus far I have not had the opportunity to sort the 
> problem. Lockdown has been quite busy so far, hopefully some slower times 
> coming next week.

Yeah, those pesky real-life biological virus keeps all of us busy just like the 
virtual ones... ;-)

(Just yesterday I found the following article mentioned on Slashdot:
https://www.bloomberg.com/news/articles/2020-04-08/are-you-finally-thankful-for-your-it-person-now

Made me smile... :-)

Anyway, I digged into the fail2ban problem today and it looks like something
changed regarding selinux and fail2ban.

After several iterations with fail2ban restart, ausearch and audit2allow like 
this:

ausearch -c 'f2b/server' --raw | audit2allow -M f2b-addon

I came up with a SELinux module like that:

module f2b-addon 1.0;

require {
type sysctl_net_t;
type sysfs_t;
type fail2ban_t;
class file { getattr open read };
class dir search;
}

#= fail2ban_t ==

# This avc is allowed in the current policy
allow fail2ban_t sysctl_net_t:dir search;

# This avc is allowed in the current policy
allow fail2ban_t sysctl_net_t:file { getattr open read };

# This avc is allowed in the current policy
allow fail2ban_t sysfs_t:file { getattr open read };


When I load this new module I can restart fail2ban and
it finally is able to create a working ipset:

[root@camus ~]# ipset list
Name: f2b-apache
Type: hash:ip
Revision: 4
Header: family inet hashsize 1024 maxelem 65536 timeout 10800
Size in memory: 408
References: 1
Number of entries: 3
Members:
223.167.32.161 timeout 10149
93.174.93.143 timeout 10149
5.164.24.192 timeout 10149


I'm neither a fail2ban nor a SELinux expert, but it seems the
standard fail2ban SELinux policy as provided by CentOS 7 is not
sufficient anymore and the recent updates did not correctly
update the required SELinux policies.

I could report this as bug, but where does such a bugreport belong to
in the first place?

- andreas

-- 
Andreas Haumer | mailto:andr...@xss.co.at
*x Software + Systeme  | http://www.xss.co.at/
Karmarschgasse 51/2/20 | Tel: +43-1-6060114-0
A-1100 Vienna, Austria | Fax: +43-1-6060114-71



signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] fail2ban firewalld problems with current CentOS 7

2020-04-09 Thread Andreas Haumer
3507): avc: denied { read } for pid=1324 
comm="f2b/f.apache" name="disable" dev="sysfs" ino=1481 
scontext=system_u:system_r:fail2ban_t:s0 tcontext=system_u:object_r:sysfs_t:s0 
tclass=file permissive=0

So it seems somehow fail2ban does not add the required ip sets correctly.

From what I see in firewalld logfile it seems these problems started after the 
last updates on April 2nd.

On this day I did a "yum update" which executed without errors and installed:

augeas-libs-1.4.0-9.el7_7.1.x86_64Do 02 Apr 2020 20:14:27 CEST
restic-0.9.6-1.el7.x86_64 Do 02 Apr 2020 20:14:25 CEST
python-perf-3.10.0-1062.18.1.el7.x86_64   Do 02 Apr 2020 20:14:23 CEST
python3-pip-9.0.3-7.el7_7.noarch  Do 02 Apr 2020 20:14:23 CEST
borgbackup-1.1.11-1.el7.x86_64Do 02 Apr 2020 20:14:19 CEST
libgudev1-219-67.el7_7.4.x86_64   Do 02 Apr 2020 20:14:18 CEST
kernel-tools-3.10.0-1062.18.1.el7.x86_64  Do 02 Apr 2020 20:14:16 CEST
pcp-4.3.2-5.el7_7.x86_64  Do 02 Apr 2020 20:14:01 CEST
kernel-3.10.0-1062.18.1.el7.x86_64Do 02 Apr 2020 20:13:44 CEST
systemd-python-219-67.el7_7.4.x86_64  Do 02 Apr 2020 20:13:27 CEST
systemd-sysv-219-67.el7_7.4.x86_64Do 02 Apr 2020 20:13:26 CEST
rsyslog-8.24.0-41.el7_7.4.x86_64  Do 02 Apr 2020 20:13:26 CEST
python2-certbot-apache-1.3.0-1.el7.noarch Do 02 Apr 2020 20:13:25 CEST
sssd-1.16.4-21.el7_7.3.x86_64 Do 02 Apr 2020 20:13:24 CEST
firewalld-0.6.3-2.el7_7.4.noarch  Do 02 Apr 2020 20:13:24 CEST
sssd-proxy-1.16.4-21.el7_7.3.x86_64   Do 02 Apr 2020 20:13:23 CEST
sssd-krb5-1.16.4-21.el7_7.3.x86_64Do 02 Apr 2020 20:13:23 CEST
sssd-ldap-1.16.4-21.el7_7.3.x86_64Do 02 Apr 2020 20:13:22 CEST
sssd-ipa-1.16.4-21.el7_7.3.x86_64 Do 02 Apr 2020 20:13:22 CEST
sssd-ad-1.16.4-21.el7_7.3.x86_64  Do 02 Apr 2020 20:13:22 CEST
sssd-krb5-common-1.16.4-21.el7_7.3.x86_64 Do 02 Apr 2020 20:13:21 CEST
sssd-common-pac-1.16.4-21.el7_7.3.x86_64  Do 02 Apr 2020 20:13:21 CEST
sssd-common-1.16.4-21.el7_7.3.x86_64  Do 02 Apr 2020 20:13:20 CEST
http-parser-2.7.1-8.el7_7.2.x86_64Do 02 Apr 2020 20:13:19 CEST
python-firewall-0.6.3-2.el7_7.4.noarchDo 02 Apr 2020 20:13:18 CEST
certbot-1.3.0-1.el7.noarchDo 02 Apr 2020 20:13:11 CEST
python2-certbot-1.3.0-1.el7.noarchDo 02 Apr 2020 20:13:10 CEST
python2-acme-1.3.0-1.el7.noarch   Do 02 Apr 2020 20:13:09 CEST
python-requests-2.6.0-9.el7_7.noarch  Do 02 Apr 2020 20:13:08 CEST
systemd-219-67.el7_7.4.x86_64 Do 02 Apr 2020 20:13:05 CEST
kmod-20-25.el7_7.1.x86_64 Do 02 Apr 2020 20:13:02 CEST
binutils-2.27-41.base.el7_7.3.x86_64  Do 02 Apr 2020 20:13:00 CEST
pcp-selinux-4.3.2-5.el7_7.x86_64  Do 02 Apr 2020 20:12:48 CEST
libsss_autofs-1.16.4-21.el7_7.3.x86_64Do 02 Apr 2020 20:12:47 CEST
kernel-tools-libs-3.10.0-1062.18.1.el7.x86_64 Do 02 Apr 2020 20:12:46 CEST
python-sssdconfig-1.16.4-21.el7_7.3.noarchDo 02 Apr 2020 20:12:45 CEST
libsss_sudo-1.16.4-21.el7_7.3.x86_64  Do 02 Apr 2020 20:12:45 CEST
firewalld-filesystem-0.6.3-2.el7_7.4.noarch   Do 02 Apr 2020 20:12:44 CEST
sssd-client-1.16.4-21.el7_7.3.x86_64  Do 02 Apr 2020 20:12:43 CEST
libsss_nss_idmap-1.16.4-21.el7_7.3.x86_64 Do 02 Apr 2020 20:12:42 CEST
libipa_hbac-1.16.4-21.el7_7.3.x86_64  Do 02 Apr 2020 20:12:42 CEST
pcp-libs-4.3.2-5.el7_7.x86_64 Do 02 Apr 2020 20:12:41 CEST
pcp-conf-4.3.2-5.el7_7.x86_64 Do 02 Apr 2020 20:12:41 CEST
kmod-libs-20-25.el7_7.1.x86_64Do 02 Apr 2020 20:12:40 CEST
libsss_idmap-1.16.4-21.el7_7.3.x86_64 Do 02 Apr 2020 20:12:39 CEST
libsss_certmap-1.16.4-21.el7_7.3.x86_64   Do 02 Apr 2020 20:12:33 CEST
systemd-libs-219-67.el7_7.4.x86_64Do 02 Apr 2020 20:12:32 CEST

The firewalld errors start exactly after the updates were installed.
Does anyone else see similar problems since the last updates?

I googled and found some older postings, but nothing matching the
problems I see exactly.

I have other CentOS 7 servers with fail2ban and firewalld which
should be updated soon, but before I do this I first want to solve
this issue.

Any idea?

Thanks!

- andreas

-- 
Andreas Haumer | mailto:andr...@xss.co.at
*x Software + Systeme  | http://www.xss.co.at/
Karmarschgasse 51/2/20 | Tel: +43-1-6060114-0
A-1100 Vienna, Austria | Fax: +43-1-6060114-71



signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Which is better? Microsoft Exchange 2016 or Linux-based SMTP Servers?

2018-07-18 Thread Andreas Haumer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi!

Am 18.07.2018 um 20:27 schrieb Johnny Hughes:
[...]
> 
> But are you guys really telling you think the calendaring / scheduling for 
> individual users and the main corporate account, etc. .. are working well 
> enough with any Linux solution.
> 
[...]

Yes, I do think so!  :-)

At least for up to about 100 users (that's the size of the businesses
we usually have as our customers)

We implemented Linux-based groupware solutions for those clients in the past
(and hopefully will do in the future) based on the following main components:

*) Linux (CentOS, SLES, OpenSUSE, depending on customers preferences)

*) Cyrus IMAP

*) Sendmail [sic]

*) OpenLDAP

*) SOGO (nobody mentioned SOGO yet, but IMHO it works very well and integrates 
perfectly into the Linux software stack!)

*) Fusiondirectory (was GOSa)

*) And the usuall suspects like ClamAV, SpamAssassin, ...


This solution provides:

*) Basic Mail (Relay, Server, Storage, ...)

*) Webmail (through SOGO)

*) Calendar and address book Web UI

*) Calendar and address book for a desktop client like Thunderbird (CalDAV, 
CardDAV)

*) Web-Based Admin UI for both admins and users (to manage their own accounts)

*) Integration with smartphones (mail, calendar, address book)

*) Features like shared mailboxes, shared calendars, ...

*) Easy integration with all typical Unix/Linux services (Fileserver, 
Webserver, VPN, ...)


I have no experience with Exchange (and I refuse to get any),
but I have "some" with Unix/Linux (since 1990. Yes I'm old ;-)

For me the above mentined software stack "just works" and it
does for the more advanced business use case, too.

I can't say anything about solutions for thousands of users, though, so YMMV!

Regards

- - andreas

- -- 
Andreas Haumer | mailto:andr...@xss.co.at
*x Software + Systeme  | http://www.xss.co.at/
Karmarschgasse 51/2/20 | Tel: +43-1-6060114-0
A-1100 Vienna, Austria | Fax: +43-1-6060114-71
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iD8DBQFbT5A2xJmyeGcXPhERArplAJ9GILNWEm0S9LlvkNGE/LTUg61ylwCgkkc1
SQvs/o/neTjsio8RmSnfSwc=
=dX5+
-END PGP SIGNATURE-
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] How insecure is NIS ? Possible alternatives ?

2018-03-29 Thread Andreas Haumer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi!

Am 29.03.2018 um 09:38 schrieb Nicolas Kovacs:
> Le 29/03/2018 à 06:44, Keith Keller a écrit :
>> I wonder how much support there is for NIS any more in recent distros. Is it 
>> possible CentOS 7 doesn't support NIS, or does but is buggy?
> 
> I'm planning to test this very soon, probably during the next week, and I'll 
> report back.
> 

We are using the OpenLDAP + pam_ldap / sssd solution in
several smaller networks (up to ~40 Linux clients), but
I think it should scale well for larger networks, too.

The OpenLDAP solution can also support Samba as domain controller,
if you have to support windows clients, too.

- From that point on we usually integrate other services like
an IMAP server (we use Cyrus IMAP), groupware server (we use SOGo)
and many other services which suport LDAP authentication.
You can apply LDAP password policies, too.

We use GOSa (or it's successor FusionDirectory, see 
https://www.fusiondirectory.org/)
as web frontend, so the users can change their passwords, mail settings etc. on
their own (if they are given the rights to do so)

With all that you get a nice, easy to manage, well integrated and
secure network with a central authentication service all with open
source software!

It should run with almost all modern linux distributions, even mixed
together in the same network.

HTH

- - andreas

- -- 
Andreas Haumer | mailto:andr...@xss.co.at
*x Software + Systeme  | http://www.xss.co.at/
Karmarschgasse 51/2/20 | Tel: +43-1-6060114-0
A-1100 Vienna, Austria | Fax: +43-1-6060114-71
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iD8DBQFavJxYxJmyeGcXPhERAokrAKC1czb7l/AWaLZSDJ4g+VlIBN0IIQCgm7Iv
p5hn8aLp32GA4mJ49RXqp8A=
=s0/Q
-END PGP SIGNATURE-
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] Pacemaker bugs?

2016-11-25 Thread Andreas Haumer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi!

I think I stumbled on at least two bugs in the CentOS 7.2 pacemaker package,
though I'm not quite sure if or where to report it.

I'm using the following package to set up a 2-node active/passive cluster:

[root@clnode1 ~]# rpm -q pacemaker
pacemaker-1.1.13-10.el7_2.4.x86_64

The installation is up-to-date on both nodes as of the current PIT.

I have currently the following cluster resources running:

[root@clnode2 ~]# pcs status
Cluster name: rucluster1
Last updated: Fri Nov 25 11:26:51 2016  Last change: Fri Nov 25 
10:51:32 2016 by root via cibadmin on clnode1
Stack: corosync
Current DC: clnode2 (version 1.1.13-10.el7_2.4-44eb2dd) - partition with quorum
2 nodes and 12 resources configured

Online: [ clnode1 clnode2 ]

Full list of resources:

 p_ip_cluster   (ocf::heartbeat:IPaddr2):   Started clnode2
 Master/Slave Set: ms_drbd_r0 [p_drbd_r0]
 Masters: [ clnode2 ]
 Slaves: [ clnode1 ]
 p_fs_drbd1 (ocf::heartbeat:Filesystem):Started clnode2
 p_apache   (ocf::heartbeat:apache):Started clnode2
 p_dhcpd(ocf::heartbeat:dhcpd): Started clnode2
 p_named(ocf::heartbeat:named): Started clnode2
 p_slapd(ocf::heartbeat:slapd): Started clnode2
 p_postgres (ocf::heartbeat:pgsql): Started clnode2
 p_nmb  (systemd:nmb):  Started clnode2
 p_smb  (systemd:smb):  Started clnode2
 p_winbind  (systemd:winbind):  Started clnode2

PCSD Status:
  clnode1: Online
  clnode2: Online

Daemon Status:
  corosync: active/enabled
  pacemaker: active/enabled
  pcsd: active/enabled


The first bug is rather serious, though a workaround exists!

The cluster works fine, but as soon as I add a cluster resource of
class "service", the cluster manager software runs havoc on node
failover. In that situation, the lrmd process hangs in an infinite
loop (neither strace nor ltrace show any outout so it seems to be
an internal loop without any system or library call) and almost any
call to the cluster manager software (crmsh or pcs) runs into a timeout.
It's quite hard to recover the whole cluster from this situation.

When I replace the resource class "service" with resource class
"systemd", everything seems to work just fine.

I found a rather old, already closed bug for Fedora which looks similar:

<https://bugzilla.redhat.com/show_bug.cgi?id=1117151>


Another bug seems to be rather minor: I see following assertions in the 
corosync logs:

Nov 25 11:13:56 [3206] clnode1   crmd:error: crm_abort: 
pcmkRegisterNode: Triggered assert at xml.c:594 : node->type == XML_ELEMENT_NODE

They seem to be related with the drbd resource, but do not cause any functional 
problem it seems.

For this particular problem I found the following patch:

<https://github.com/ClusterLabs/pacemaker/commit/68c7506aa84c69e5f425ef5f3025a9efb41d13da>


Are these already known bugs?
(I searched the CentOS bugzilla site but couldn't find any ticket
describing these bugs)


Any advise on if or where I should report it?

Thanks!

- - andreas

- -- 
Andreas Haumer | mailto:andr...@xss.co.at
*x Software + Systeme  | http://www.xss.co.at/
Karmarschgasse 51/2/20 | Tel: +43-1-6060114-0
A-1100 Vienna, Austria | Fax: +43-1-6060114-71
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iD8DBQFYOBLBxJmyeGcXPhERAmSKAJ9NNI+D2OaBR1I8jum6AywMxQxsmACfU71C
HV+6j+4YRy71BkjHfipPJFg=
=Okfp
-END PGP SIGNATURE-
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos