⚝
One Hat Cyber Team
⚝
Your IP:
3.135.236.62
Server IP:
15.204.235.159
Server:
Linux srv.techlup.co.ke 4.18.0-553.5.1.el8_10.x86_64 #1 SMP Wed Jun 5 09:12:13 EDT 2024 x86_64
Server Software:
Apache
PHP Version:
8.2.27
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
proc
/
3374
/
root
/
usr
/
share
/
setroubleshoot
/
plugins
/
View File Name :
allow_ftpd_use_cifs.py
# # Authors: Karl MacMillan <kmacmillan@mentalrootkit.com> # # Copyright (C) 2006 Red Hat, Inc. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. # import gettext translation=gettext.translation('setroubleshoot-plugins', fallback=True) _=translation.gettext from setroubleshoot.util import * from setroubleshoot.Plugin import Plugin class plugin(Plugin): summary = _(''' SELinux prevented the ftp daemon from $ACCESS files stored on a CIFS filesystem. ''') problem_description = _(''' SELinux prevented the ftp daemon from $ACCESS files stored on a CIFS filesystem. CIFS (Comment Internet File System) is a network filesystem similar to SMB (<a href="http://www.microsoft.com/mind/1196/cifs.asp">http://www.microsoft.com/mind/1196/cifs.asp</a>) The ftp daemon attempted to read one or more files or directories from a mounted filesystem of this type. As CIFS filesystems do not support fine-grained SELinux labeling, all files and directories in the filesystem will have the same security context. If you have not configured the ftp daemon to read files from a CIFS filesystem this access attempt could signal an intrusion attempt. ''') fix_description = _(''' Changing the "$BOOLEAN" boolean to true will allow this access: "setsebool -P $BOOLEAN=1." ''') fix_cmd = '/usr/sbin/setsebool -P ftpd_use_cifs=1 ftpd_anon_write=1' rw_fix_description = _(''' Changing the "$BOOLEAN" and "$WRITE_BOOLEAN" booleans to true will allow this access: "setsebool -P $BOOLEAN=1 $WRITE_BOOLEAN=1". warning: setting the "$WRITE_BOOLEAN" boolean to true will allow the ftp daemon to write to all public content (files and directories with type public_content_t) in addition to writing to files and directories on CIFS filesystems. ''') rw_fix_cmd = '/usr/sbin/setsebool -P ftpd_use_cifs=1 ftpd_anon_write=1' if_text = _("If you want to allow ftpd to write to cifs file systems") then_text = _("you must tell SELinux about this") do_text = '# setsebool -P ftpd_use_cifs=1 ftpd_anon_write=1' def __init__(self): Plugin.__init__(self, __name__) self.fixable = True self.button_text = _("Enable booleans") def analyze(self, avc): if (avc.matches_source_types(['ftpd_t']) and avc.matches_target_types(['cifs_t']) and avc.has_tclass_in(['file', 'dir'])): # If only read access is requested then only the # allow_ftp_use_cifs boolean needs to be set. Write # access also requires the allow_ftpd_anon_write if avc.all_accesses_are_in(avc.create_file_perms + avc.rw_dir_perms): return self.report(args=("ftpd_use_cifs", "ftpd_anon_write")) else: return None else: return None