m (fixed typo "sh ipaclient.example.com id -Z" -> "ssh ipaclient.example.com id -Z") |
|||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
{{QA/Test_Case | {{QA/Test_Case | ||
|description= | |description= | ||
SELinux user mapping provides a set of rules that maps a user to an SELinux context based on the machine being logged in to. These can leverage existing HBAC rules for the list of users and hosts so the lists don't need to be maintained in two places. | SELinux user mapping provides a set of rules that maps a user to an SELinux context based on the machine being logged in to. These can leverage existing HBAC rules for the list of users and hosts so the lists don't need to be maintained in two places. | ||
Line 59: | Line 59: | ||
# ipa hbacrule-add-user --users=admin hbacrule1 | # ipa hbacrule-add-user --users=admin hbacrule1 | ||
# ipa hbacrule-add-host --hosts=ipaclient.example.com hbacrule1 | # ipa hbacrule-add-host --hosts=ipaclient.example.com hbacrule1 | ||
# ipa selinuxusermap-add --selinuxuser=user_u:s0-s0:c0.c1023 --hbacrule=hbacrule1 test3 | # ipa selinuxusermap-add --selinuxuser=user_u:s0-s0:c0.c1023 --hbacrule=hbacrule1 test3 | ||
# ssh ipaclient.example.com id -Z | # ssh ipaclient.example.com id -Z | ||
Line 68: | Line 67: | ||
# ipa selinuxusermap-disable test3 | # ipa selinuxusermap-disable test3 | ||
# | # ssh ipaclient.example.com id -Z | ||
Context should be xguest_u (from rule test2) | Context should be xguest_u (from rule test2) |
Latest revision as of 13:58, 7 November 2012
Description
SELinux user mapping provides a set of rules that maps a user to an SELinux context based on the machine being logged in to. These can leverage existing HBAC rules for the list of users and hosts so the lists don't need to be maintained in two places.
Setup
- Make sure you have a working FreeIPA server
- Enroll a client with this IPA server
How to test
How to Test
The assumption is that on the IPA server you have already gotten a Kerberos ticket before running the commands.
# kinit admin
You may see this error when logging into remote servers:
Could not chdir to home directory /home/admin: No such file or directory
This is because home directories are not created by default. It can be ignored.
Get the current configuration
On the server:
# ipa config-show
Note the default SELinux user and the map order. The order defines the access from least to greatest.
Test the baseline
Get a ticket and ssh from the server to the client to get the baseline context:
# ssh ipaclient.example.com id -Z
Note the context, it should match the default SELinux context in the IPA config.
Create and test a single rule
# ipa selinuxusermap-add --usercat=all --hostcat=all --selinuxuser=guest_u:s0 test1 # ssh ipaclient.example.com id -Z
Context should be guest_u
Add another rule to test rule ordering
A more specific rule should override a less specific rule, so add a rule for this user on this host.
# ipa selinuxusermap-add --selinuxuser=xguest_u:s0 test2 # ipa selinuxusermap-add-user --users=admin test2 # ipa selinuxusermap-add-host --hosts=ipaclient.example.com test2 # ssh ipaclient.example.com id -Z
Context should be xguest_u
Test HBAC rules
An HBAC rule can be used as the source of user/host information:
# ipa hbacrule-add hbacrule1 # ipa hbacrule-add-user --users=admin hbacrule1 # ipa hbacrule-add-host --hosts=ipaclient.example.com hbacrule1 # ipa selinuxusermap-add --selinuxuser=user_u:s0-s0:c0.c1023 --hbacrule=hbacrule1 test3 # ssh ipaclient.example.com id -Z
Context should be user_u
Test disabling a rule
# ipa selinuxusermap-disable test3 # ssh ipaclient.example.com id -Z
Context should be xguest_u (from rule test2)
Expected Results
All the test steps should end with the specified results.