2.4.29+xfs+swraid1

Discuss usability issues, general maintenance, and general support issues for a grsecurity-enabled system.

2.4.29+xfs+swraid1

Postby tempix » Mon Mar 07, 2005 10:11 am

I have a strange problem: I compiled 2.4.29 with grsec patch only, then reboot: gradm -D : yehh, its disabled. BUT I can not write to /, to /etc, etc....
gradm -P admin, could not open /etc/grsec/pw !!!

I use xfs filesystem, and all the filesystems are on raid-1.

What's wrong?

Lot of thanx
Tibor
tempix
 
Posts: 4
Joined: Mon Mar 07, 2005 10:05 am

Postby tempix » Mon Mar 07, 2005 10:27 am

Some other infos:
#
# Grsecurity
#
CONFIG_GRKERNSEC=y
CONFIG_CRYPTO=y
CONFIG_CRYPTO_SHA256=y
# CONFIG_GRKERNSEC_LOW is not set
# CONFIG_GRKERNSEC_MID is not set
# CONFIG_GRKERNSEC_HI is not set
CONFIG_GRKERNSEC_CUSTOM=y

#
# PaX Control
#
# CONFIG_GRKERNSEC_PAX_SOFTMODE is not set
CONFIG_GRKERNSEC_PAX_EI_PAX=y
CONFIG_GRKERNSEC_PAX_PT_PAX_FLAGS=y
# CONFIG_GRKERNSEC_PAX_NO_ACL_FLAGS is not set
CONFIG_GRKERNSEC_PAX_HAVE_ACL_FLAGS=y
# CONFIG_GRKERNSEC_PAX_HOOK_ACL_FLAGS is not set

#
# Address Space Protection
#
CONFIG_GRKERNSEC_PAX_NOEXEC=y
CONFIG_GRKERNSEC_PAX_PAGEEXEC=y
CONFIG_GRKERNSEC_PAX_SEGMEXEC=y
CONFIG_GRKERNSEC_PAX_EMUTRAMP=y
CONFIG_GRKERNSEC_PAX_EMUSIGRT=y
CONFIG_GRKERNSEC_PAX_MPROTECT=y
# CONFIG_GRKERNSEC_PAX_NOELFRELOCS is not set
CONFIG_GRKERNSEC_PAX_ASLR=y
CONFIG_GRKERNSEC_PAX_RANDKSTACK=y
CONFIG_GRKERNSEC_PAX_RANDUSTACK=y
CONFIG_GRKERNSEC_PAX_RANDMMAP=y
CONFIG_GRKERNSEC_KMEM=y
# CONFIG_GRKERNSEC_IO is not set
CONFIG_GRKERNSEC_PROC_MEMMAP=y
CONFIG_GRKERNSEC_BRUTE=y
CONFIG_GRKERNSEC_HIDESYM=y

#
# Role Based Access Control Options
#
CONFIG_GRKERNSEC_ACL_HIDEKERN=y
CONFIG_GRKERNSEC_ACL_MAXTRIES=3
CONFIG_GRKERNSEC_ACL_TIMEOUT=30

#
# Filesystem Protections
#
CONFIG_GRKERNSEC_PROC=y
# CONFIG_GRKERNSEC_PROC_USER is not set
CONFIG_GRKERNSEC_PROC_USERGROUP=y
CONFIG_GRKERNSEC_PROC_GID=10
CONFIG_GRKERNSEC_PROC_ADD=y
CONFIG_GRKERNSEC_LINK=y
CONFIG_GRKERNSEC_FIFO=y
CONFIG_GRKERNSEC_CHROOT=y
CONFIG_GRKERNSEC_CHROOT_MOUNT=y
CONFIG_GRKERNSEC_CHROOT_DOUBLE=y
CONFIG_GRKERNSEC_CHROOT_PIVOT=y
CONFIG_GRKERNSEC_CHROOT_CHDIR=y
CONFIG_GRKERNSEC_CHROOT_CHMOD=y
CONFIG_GRKERNSEC_CHROOT_FCHDIR=y
CONFIG_GRKERNSEC_CHROOT_MKNOD=y
CONFIG_GRKERNSEC_CHROOT_SHMAT=y
CONFIG_GRKERNSEC_CHROOT_UNIX=y
CONFIG_GRKERNSEC_CHROOT_FINDTASK=y
CONFIG_GRKERNSEC_CHROOT_NICE=y
CONFIG_GRKERNSEC_CHROOT_SYSCTL=y
CONFIG_GRKERNSEC_CHROOT_CAPS=y

#
# Kernel Auditing
#
# CONFIG_GRKERNSEC_AUDIT_GROUP is not set
CONFIG_GRKERNSEC_EXECLOG=y
CONFIG_GRKERNSEC_RESLOG=y
CONFIG_GRKERNSEC_CHROOT_EXECLOG=y
CONFIG_GRKERNSEC_AUDIT_CHDIR=y
CONFIG_GRKERNSEC_AUDIT_MOUNT=y
CONFIG_GRKERNSEC_AUDIT_IPC=y
CONFIG_GRKERNSEC_SIGNAL=y
CONFIG_GRKERNSEC_FORKFAIL=y
CONFIG_GRKERNSEC_TIME=y
CONFIG_GRKERNSEC_PROC_IPADDR=y
# CONFIG_GRKERNSEC_AUDIT_TEXTREL is not set

#
# Executable Protections
#
CONFIG_GRKERNSEC_EXECVE=y
CONFIG_GRKERNSEC_SHM=y
CONFIG_GRKERNSEC_DMESG=y
CONFIG_GRKERNSEC_RANDPID=y
CONFIG_GRKERNSEC_TPE=y
CONFIG_GRKERNSEC_TPE_ALL=y
CONFIG_GRKERNSEC_TPE_GID=500

#
# Network Protections
#
CONFIG_GRKERNSEC_RANDNET=y
CONFIG_GRKERNSEC_RANDSRC=y
# CONFIG_GRKERNSEC_SOCKET is not set

#
# Sysctl support
#
CONFIG_GRKERNSEC_SYSCTL=y
CONFIG_GRKERNSEC_SYSCTL_ON=y

#
# Logging options
#
CONFIG_GRKERNSEC_FLOODTIME=10
CONFIG_GRKERNSEC_FLOODBURST=4

After restart with the grsec kernel, I don't see anyithing new in /var/log/messages, And because I manage the server through ssh, I can't see the boot process.

After login per ssh I see a "success" in /, and like RBAC enabled, I have no rights, and can NOT open /dev/grsec!, gradm -D : disabled.

Why am I not root as root???
tempix
 
Posts: 4
Joined: Mon Mar 07, 2005 10:05 am

Postby tempix » Mon Mar 07, 2005 1:52 pm

Hmm, nobody knows anything..
I am new to grsec, but on my laptop it works fine, I have tested the features.
There I use gentoo --gentoo-dev-hardened.

The problematic OS is a SuSE 8.2, with XFS filesystem, on kernel-raid1.
Once again, I log in with ssh as a symple user, wow, I can't see the other processess, dmesg no rights, etc.
su --> I am root. And I CAN NOT write to /, to /etc, to /usr....
Then I type:
gradm -D: alredy disabled.
gradm -E: I should give a password: gradm -P admin: could not write /etc/grsec/pw (?)
What is it when not RB-ACL?
If I type mount, I only see my /dev/md0, the other three array not!
But they are mounted as /homr/ /tmp /var!

And of course, the syslog funcs not.
tempix
 
Posts: 4
Joined: Mon Mar 07, 2005 10:05 am

Postby tempix » Tue Mar 08, 2005 10:04 am

Sorry for everyone,
the problem is: /dev/md0 will not be mounted with the new kernel read-write!

This should be a SuSE related problem in /etc/init.d/boot.localfs.

mount -n -o remount,rw /dev/md0 / was the quick answer for me.

Bye
tempix
 
Posts: 4
Joined: Mon Mar 07, 2005 10:05 am


Return to grsecurity support