-
Notifications
You must be signed in to change notification settings - Fork 174
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
F40: selinux-policy-40.22-1 systemd-cryptsetup-generator no longer able to write untis #2190
Comments
@Luap99 There were many related updates since you reported this issue, can you check if it is gone? |
Yes I can check later today |
Same issue with selinux-policy-40.27-1.fc40.noarch I use the keyfile directive with a different file system label so it must be mounted first. systemd-cryptsetup-generator tries to create directories in /run/systemd/cryptsetup/ as mount point target for the keyfile fs but selinux seems to block blocking access there I am using |
Bumping this @zpytela , I just hit this today on a new Fedora IoT machine
for context, I have multiple LUKS encrypted devices in my /etc/crypttab like so (private data replaced with ...):
With a corresponding /etc/fstab like so:
My keyfile is attached to a USB drive at this moment with system_u:object_r:dosfs_t labels. I'm able and willing the labels on the USB drive but I'm not sure what is "best" move here output of system: Fedora IoT 41 I cannot run the |
Yes I also have a USB device with my keyfiles on it. I don't think the issue is the label on the drives, the generator is trying to create mount points in |
The best workaround I found for my case (immutable ostree distro) was to place the keyfile on my OS drive under /etc (this is literally the opposite of what I wanted to do). Then it worked. I attempted to create a policy exception with audit2allow but could not get it working I also fiddled with a yubikey based flow as an alternative but I need unattended boot, and the FIDO2 spec seemingly explicitly forbids that? Update: Finally got the audit2allow policy working, I'm a noob at this so probably improper but for the benefit of future readers it's this
Saved this as hack.te
|
Created a PR attempting to resolve this: #2488 |
My system was no longer able to boot after installing selinux-policy-40.22-1 because systemd couldn't decrypt my extra disks as the systemd-cryptsetup-generator failed to create the units for them.
Obviously systemd-cryptsetup-generator should be allowed to write where it needs to, I guess
/run/systemd/generator/
and/run/systemd/cryptsetup
looking at the file paths after a successful boot but I am not sure if there is more.The text was updated successfully, but these errors were encountered: