Version 1.3.0-rcN release testing/observations/notes. #996
Replies: 12 comments 8 replies
-
Testing V1.3.0-rc1-1 over FC39, focusing on the following runtime updates:
Many of this release's other changes are related to CI, builds, and dependencies. General use should validate most of these changes. |
Beta Was this translation helpful? Give feedback.
-
During V1.3 testing, I noticed that some incorrect string values were passing the config validation test. Verified w/ @jw3 and in the src that only the first round of syslog and watch_fs validation has been realized: Pls see #997 (comment) |
Beta Was this translation helpful? Give feedback.
-
Continuing w/FC39:
|
Beta Was this translation helpful? Give feedback.
-
It was denied when running fapolicyd –debug-deny from the CL. It ran within the profiler, but that’s OK isn’t it, because the profiler run is ‘permissive’ iirc. Maybe we want ‘permissive’ to be optional? In any event, the analysis view showed my the files that /tmp/my-ls accessed.
I’ll do some image captures tomorrow AM.
I was trying to test the dynamic rules reload but didn’t get to the point of modifying them yet. I thought something should make obvious that /tmp/my-ls is untrusted. And then I saw the current rules should deny its execution; That’s when I ran fapd from the CL w/--debug-deny which did deny /tmp/my-ls’s execution.
|
Beta Was this translation helpful? Give feedback.
-
Two CL sessions on an FC39 TestBed. The smaller pane copied |
Beta Was this translation helpful? Give feedback.
-
The log says rule 14 allowed the execution, and the trust is showing that it is Untrusted |
Beta Was this translation helpful? Give feedback.
-
Another image of the above analysis view with no object selected: |
Beta Was this translation helpful? Give feedback.
-
@jw3 Thx for the help. |
Beta Was this translation helpful? Give feedback.
-
Over FC39, when attempting to modify and deploy the rules to deny access to a back up copy of
This doesn't currently make too much sense to me, given that earlier profiler runs today ran fine. Maybe the deployment execution environment's pid file location warrants the SELinux denial, but not the Profiler's pid file location. Or user error, with toggling back and forth between Profiler and Rule editor views. Will investigate further, but there is the implication that we may need to ship and/or update an SELinux policy config file. I don't know how we currently address SELinux policy from the |
Beta Was this translation helpful? Give feedback.
-
I dont see any issues at this point that cant be addressed next development cycle. Going to tag a release. |
Beta Was this translation helpful? Give feedback.
-
Testing over RHEL9. Had an issue w/installation of the el9 rpm:
Attempted with both |
Beta Was this translation helpful? Give feedback.
-
On RHEL9, observed no new issues. |
Beta Was this translation helpful? Give feedback.
-
Starting the V1.3.0-rc1 testing with the rpms available under GitHub releases page.
Beta Was this translation helpful? Give feedback.
All reactions