-
Bug
-
Resolution: Done-Errata
-
Major
-
rhel-8.1.0
-
fapolicyd-1.3.2-1.el8
-
None
-
Important
-
rhel-sst-security-special-projects
-
24
-
None
-
QE ack, Dev ack
-
False
-
-
Yes
-
None
-
- the audit messages contain the rule number which caused the actual decision
-
Pass
-
-
None
-
Enhancement
-
-
Done
-
-
All
-
None
Description of problem:
Currently fapolicyd is silent, causing support members a hard life: when some issue is due to fapolicyd, it's hard to find what is going on, because no log is seen at all, so nobody thinks about fapolicyd being the potential culprit.
This makes us lose a lot of time investigating issues.
Additionally, running fapolicyd in "debug-deny" mode requires to hack the fapolicyd.service unit, as shown below:
Original (in /usr/lib/systemd/system):
-------- 8< ---------------- 8< ---------------- 8< ---------------- 8< --------
Type=forking
ExecStart=/usr/sbin/fapolicyd
-------- 8< ---------------- 8< ---------------- 8< ---------------- 8< --------
Hacked to see denies (in /etc/systemd/system):
-------- 8< ---------------- 8< ---------------- 8< ---------------- 8< --------
Type=simple
ExecStart=/usr/sbin/fapolicyd --debug-deny
-------- 8< ---------------- 8< ---------------- 8< ---------------- 8< --------
The fapolicyd options should be read from /etc/sysconfig/fapolicyd or similar file and not require the daemon to be put in the foreground.
Version-Release number of selected component (if applicable):
fapolicyd-0.8.10-3.el8_1.1.x86_64
Acceptance Criteria:
- the audit messages contain the rule number which caused the actual decision
- blocks
-
RHEL-624 RFE: send rule number to fanotify so it gets audited
- Closed
- external trackers
- links to
-
RHBA-2023:117373 fapolicyd bug fix and enhancement update
- mentioned on