SELinux ThreatLockDown context
Security-Enhanced Linux (SELinux) defines access controls for the applications, processes, and files on a system.
SELinux is based on "security contexts", assigning one to every element under supervision and a policy that defines what access and operations are allowed. The default SELinux behavior is context inheritance, so if there is no SELinux policy specifying otherwise, every process created will inherit the context of its parent.
That said, as ThreatLockDown does not have a defined context, it inherits the context from systemd
which is in charge of starting the service. This context is of type unconfined_t
, which means that it is not under any security restriction, so only the standard Linux DAC restrictions will be applied to it.
Create ThreatLockDown context
In case of having the need to run ThreatLockDown as a confined process, we propose to create a new SELinux policy module which allows the transition to a ThreatLockDown context which we will call wazuh_t
. Besides, we will create a set of rules assigning the necessary permissions to run.
Note
For the following example we used the ThreatLockDown OVA image based on centOS 7 and the default ThreatLockDown configuration. In case of an upgrade, rules will probably have to be updated according to Wazuh's new functionalities.
SELinux module example to confine Wazuh
To create a new module that allows ThreatLockDown to transition to the new context we need the following files:
ThreatLockDown manager
wazuhT.fc
/var/ossec/active-response gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/active-response/bin(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
/var/ossec/agentless(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
/var/ossec/api gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/api/configuration(/.*)? gen_context(system_u:object_r:wazuh_etc_t,s0)
/var/ossec/api/scripts(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
/var/ossec/backup(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/bin(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
/var/ossec/etc(/.*)? gen_context(system_u:object_r:wazuh_etc_t,s0)
/var/ossec/framework(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
/var/ossec/integrations(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
/var/ossec/lib(/.*)? gen_context(system_u:object_r:wazuh_lib_t,s0)
/var/ossec/logs(/.*)? gen_context(system_u:object_r:wazuh_log_t,s0)
/var/ossec/queue(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/ruleset(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/stats(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/tmp(/.*)? gen_context(system_u:object_r:wazuh_tmp_t,s0)
/var/ossec/var(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/wodles(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
wazuhT.te
policy_module(wazuhT,1.0)
require {
type bin_t;
type tmp_t;
type unconfined_t;
type initrc_t;
type unconfined_service_t;
type shell_exec_t;
type var_t;
type cert_t;
type node_t;
type init_t;
type kernel_t;
type system_dbusd_t;
type sshd_t;
type fs_t;
type unlabeled_t;
type sysctl_net_t;
type systemd_unit_file_t;
type cgroup_t;
type hugetlbfs_t;
type sysfs_t;
type iptables_exec_t;
type sshd_exec_t;
type device_t;
type fixed_disk_device_t;
type useradd_exec_t;
type journalctl_exec_t;
type proc_net_t;
type pstore_t;
type mount_exec_t;
type insmod_exec_t;
type systemd_systemctl_exec_t;
type crontab_exec_t;
type devlog_t;
type rpm_exec_t;
type proc_t;
type configfs_t;
type http_port_t;
type tmpfs_t;
type gssproxy_var_lib_t;
type rpm_log_t;
type auditd_unit_file_t;
type crond_unit_file_t;
type mount_var_run_t;
type rpm_var_lib_t;
type usermodehelper_t;
type var_run_t;
type etc_t;
type security_t;
type firewalld_t;
type iptables_t;
type dhcpc_t;
role system_r;
role unconfined_r;
class process { transition getattr getpgid getsession setrlimit setsched signull open read};
class rawip_socket {bind setopt getopt create open};
class netlink_route_socket {bind setopt create open write read nlmsg_read};
class netlink_audit_socket {bind setopt create open write read nlmsg_read};
class lnk_file {getattr open read};
class file { getattr open read execute getattr read};
class dir { getattr open read search };
class tcp_socket { bind connect create getopt listen name_bind name_connect node_bind setopt };
class capability { chown dac_override fowner fsetid kill net_bind_service net_raw setgid setuid sys_chroot sys_resource sys_ptrace};
class unix_dgram_socket { read write create ioctl sendto bind getopt connect};
class netlink_tcpdiag_socket {create getattr setopt read bind nlmsg_read write};
class filesystem { getattr open read };
class sock_file { getattr open read };
class blk_file { getattr open read };
class udp_socket name_bind;
class unix_stream_socket {connectto ioctl getattr};
class dbus send_msg;
}
# Private type declarations
type wazuh_t;
type wazuh_exec_t;
type wazuh_etc_t;
type wazuh_lib_t;
type wazuh_log_t;
type wazuh_tmp_t;
type wazuh_var_t;
# Ports label
type wazuh_port_t;
corenet_port(wazuh_port_t)
# domain_type macro specifies the type wazuh_t to be a domain
domain_type(wazuh_t)
# domain_entry_file specifies an entry point to the wazuh_t domain for the executable file of type wazuh_exec_t
domain_entry_file(wazuh_t, wazuh_exec_t)
# logging_log_file macro makes wazuh_log_t become the type of log file with the necessary groups and rules
logging_log_file(wazuh_log_t)
# Allow domain wazuh_t to manipulate log files
allow wazuh_t wazuh_log_t:file append_file_perms;
# files_tmp_file takes the type of wazuh_tmp_t to the necessary groups so that it becomes the type of tmp file
files_tmp_file(wazuh_tmp_t)
# Allow the wazuh_t domain write privileges into the tmp_t labeled directory, but with an automatic file transition towards wazuh_tmp_t for every file written
files_tmp_filetrans(wazuh_t,wazuh_tmp_t,file)
# Allow domain wazuh_t to manipulate tmp files
allow wazuh_t wazuh_tmp_t:file manage_file_perms;
#============== Allow transition
role unconfined_r types wazuh_t;
role system_r types wazuh_t;
allow wazuh_t bin_t : file execute;
allow unconfined_t wazuh_t : process transition;
allow initrc_t wazuh_t : process transition;
allow unconfined_service_t wazuh_t : process transition;
allow unconfined_t wazuh_exec_t : file execute;
allow initrc_t wazuh_exec_t : file execute;
allow unconfined_service_t wazuh_exec_t : file execute;
allow wazuh_t wazuh_exec_t : file entrypoint;
type_transition unconfined_t wazuh_exec_t : process wazuh_t;
type_transition initrc_t wazuh_exec_t : process wazuh_t;
type_transition unconfined_service_t wazuh_exec_t : process wazuh_t;
#============== Permissions for wazuh-control to run Wazuh
allow wazuh_t shell_exec_t:file { execute execute_no_trans };
allow wazuh_t bin_t:file execute_no_trans;
allow wazuh_t wazuh_var_t:dir { create rmdir open add_name read remove_name write getattr setattr search};
allow wazuh_t wazuh_var_t:file { create getattr open read append rename setattr unlink write ioctl lock};
allow wazuh_t wazuh_exec_t:dir { create rmdir open getattr add_name read remove_name write setattr search};
allow wazuh_t wazuh_exec_t:file { create getattr open read append rename setattr link unlink write ioctl lock execute execute_no_trans};
allow wazuh_t wazuh_log_t:dir { create rmdir open getattr add_name read remove_name write setattr search};
allow wazuh_t wazuh_log_t:file { create getattr open read append rename setattr link unlink write ioctl lock};
allow wazuh_t wazuh_etc_t:dir { create rmdir open getattr add_name read remove_name write setattr search};
allow wazuh_t wazuh_tmp_t:dir { create rmdir open getattr add_name read remove_name write setattr search rmdir};
allow wazuh_t wazuh_tmp_t:file { create getattr open read append rename setattr link unlink write ioctl lock};
allow wazuh_t wazuh_lib_t:dir { create rmdir open getattr add_name read remove_name write setattr search};
allow wazuh_t wazuh_lib_t:file { getattr open read map execute};
allow wazuh_t wazuh_var_t:filesystem { associate};
allow wazuh_var_t fs_t:filesystem { associate};
allow wazuh_etc_t fs_t:filesystem { associate};
# Permissions to read /proc
allow wazuh_t proc_t:dir read;
domain_read_all_domains_state(wazuh_t)
domain_getpgid_all_domains( wazuh_t )
domain_getattr_all_domains( wazuh_t )
domain_getsession_all_domains( wazuh_t )
domain_signull_all_domains( wazuh_t )
#============== Permissions for Framework and API
allow wazuh_t self:tcp_socket { bind connect create getopt listen setopt };
allow wazuh_t self:udp_socket { bind connect create getattr ioctl setopt };
allow wazuh_t node_t:tcp_socket node_bind;
allow wazuh_t node_t:udp_socket node_bind;
#============== Permissions for wazuh-analysisd to run
allow wazuh_t self:process { getattr getpgid getsession setrlimit setsched };
allow wazuh_t wazuh_etc_t:file { create getattr open read append rename setattr link unlink write ioctl lock map};
#============== Permissions for wazuh-remoted to use sockets
allow wazuh_t wazuh_var_t:sock_file { read write getattr create setattr unlink} ;
allow wazuh_t wazuh_t:unix_stream_socket {connectto ioctl};
allow wazuh_t wazuh_port_t:tcp_socket {name_connect name_bind create read write connect recvfrom sendto send_msg setopt ioctl setattr getattr};
allow wazuh_t wazuh_t:tcp_socket {accept bind name_connect name_bind create read write connect recvfrom sendto send_msg setopt ioctl setattr getattr};
allow wazuh_t wazuh_port_t:udp_socket {name_bind create read write connect recvfrom sendto send_msg setopt ioctl setattr getattr};
allow wazuh_t wazuh_t:udp_socket {accept name_bind create read write connect recvfrom sendto send_msg setopt ioctl setattr getattr};
allow wazuh_t wazuh_t:unix_dgram_socket { read write create ioctl sendto bind getopt connect};
#============== Permissions for wazuh-syscheckd to monitor files and directories and for wazuh-logcollector to read logs files
files_read_all_files(wazuh_t)
files_read_all_chr_files(wazuh_t)
files_read_all_symlinks(wazuh_t)
fs_getattr_all_chr_files(wazuh_t)
dev_getattr_all_chr_files(wazuh_t)
allow wazuh_t gssproxy_var_lib_t:sock_file { getattr open read };
allow wazuh_t fixed_disk_device_t:blk_file { getattr open read };
allow wazuh_t devlog_t:sock_file { read write getattr create setattr unlink};
#============== Permissions for rootcheck to monitor ports
corenet_udp_bind_all_ports(wazuh_t)
corenet_tcp_bind_all_ports(wazuh_t)
#============== Permissions for wazuh-modulesd to run
allow wazuh_t sysfs_t:lnk_file read;
allow wazuh_t proc_net_t:file { getattr open read };
allow wazuh_t self:netlink_route_socket {create getattr open read bind nlmsg_read write};
# Permissions for wazuh-modulesd to run SCA scans
allow wazuh_t sshd_exec_t:file { execute execute_no_trans };
allow wazuh_t useradd_exec_t:file { execute execute_no_trans};
allow wazuh_t rpm_exec_t:file { execute execute_no_trans ioctl};
allow wazuh_t systemd_systemctl_exec_t:file { execute execute_no_trans};
allow wazuh_t insmod_exec_t:file { execute execute_no_trans };
allow wazuh_t iptables_exec_t:file { execute execute_no_trans };
allow wazuh_t crontab_exec_t:file { execute execute_no_trans };
allow wazuh_t journalctl_exec_t:file { execute execute_no_trans};
allow wazuh_t mount_exec_t:file { execute execute_no_trans getattr};
allow wazuh_t rpm_log_t:file { getattr open read append};
allow wazuh_t rpm_var_lib_t:file { write create setattr unlink rename};
allow wazuh_t rpm_var_lib_t:dir { write add_name remove_name};
allow wazuh_t cert_t:dir { search write create add_name remove_name rmdir};
allow wazuh_t cert_t:file { lock write};
allow wazuh_t tmp_t:dir { search write create add_name remove_name rmdir};
allow wazuh_t unlabeled_t:file { getattr open read };
allow wazuh_t security_t:security compute_av;
allow wazuh_t security_t:file {write};
allow wazuh_t security_t:dir {write};
allow wazuh_t init_t:unix_stream_socket {connectto ioctl getattr};
allow wazuh_t init_t:system { status };
allow wazuh_t init_t:service { status };
allow wazuh_t system_dbusd_t:dbus send_msg;
allow wazuh_t tmpfs_t:dir read;
allow wazuh_t tmpfs_t:filesystem { getattr open read };
allow wazuh_t cgroup_t:filesystem { getattr open read };
allow wazuh_t configfs_t:filesystem { getattr open read };
allow wazuh_t device_t:filesystem { getattr open read };
allow wazuh_t hugetlbfs_t:filesystem { getattr open read };
allow wazuh_t proc_t:filesystem { getattr open read };
allow wazuh_t pstore_t:filesystem { getattr open read };
allow wazuh_t sysfs_t:filesystem { getattr open read };
allow wazuh_t fs_t:filesystem { getattr open read };
allow wazuh_t self:rawip_socket {bind setopt getopt create open};
allow wazuh_t kernel_t:unix_dgram_socket sendto;
allow wazuh_t auditd_unit_file_t:service { status };
allow wazuh_t crond_unit_file_t:service { status };
allow wazuh_t systemd_unit_file_t:service { status start};
allow wazuh_t mount_var_run_t:dir { getattr open read write search write};
allow wazuh_t var_run_t:dir { getattr open read search write add_name remove_name};
allow wazuh_t var_run_t:file { getattr open read write lock create unlink};
allow wazuh_t sysctl_net_t:dir search;
allow wazuh_t sysctl_net_t:file { getattr open read };
allow wazuh_t usermodehelper_t:file { getattr open read };
allow wazuh_t self:netlink_audit_socket {create setopt open read bind nlmsg_read write};
allow wazuh_t self:netlink_tcpdiag_socket {create getattr setopt read bind nlmsg_read write};
allow wazuh_t kernel_t:system module_request;
allow dhcpc_t unlabeled_t:file {getattr open read};
#============== Permissions for wazuh-execd to run AR
allow wazuh_t self:capability { chown dac_override fowner fsetid kill net_bind_service net_raw setgid setuid sys_chroot sys_resource sys_ptrace};
allow wazuh_t etc_t:dir { getattr open read search write add_name remove_name};
allow sshd_t var_t:file { getattr create open append ioctl lock read setattr write};
allow wazuh_t firewalld_t:dbus send_msg;
allow firewalld_t wazuh_t:dbus send_msg;
allow wazuh_t firewalld_t:process { getattr getpgid getsession signull };
allow iptables_t var_run_t:file {open read lock};
allow wazuh_t system_dbusd_t:unix_stream_socket connectto;
allow wazuh_t http_port_t:tcp_socket {name_bind name_connect write read};
#============== Permissions to assign new contexts
allow unconfined_t wazuh_var_t:dir {getattr open read search relabelto};
allow unconfined_t wazuh_var_t:file {getattr relabelto};
allow unconfined_t wazuh_var_t:sock_file {getattr open read relabelto};
allow unconfined_t wazuh_lib_t:dir {getattr open read search relabelto};
allow unconfined_t wazuh_lib_t:file {getattr relabelto};
allow unconfined_t wazuh_etc_t:dir {getattr open read search relabelto};
allow unconfined_t wazuh_etc_t:file {getattr open read write relabelto};
ThreatLockDown agent
wazuhT.fc
/var/ossec/active-response gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/active-response/bin(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
/var/ossec/agentless(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
/var/ossec/backup(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/bin(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
/var/ossec/etc(/.*)? gen_context(system_u:object_r:wazuh_etc_t,s0)
/var/ossec/lib(/.*)? gen_context(system_u:object_r:wazuh_lib_t,s0)
/var/ossec/logs(/.*)? gen_context(system_u:object_r:wazuh_log_t,s0)
/var/ossec/queue(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/ruleset(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/tmp(/.*)? gen_context(system_u:object_r:wazuh_tmp_t,s0)
/var/ossec/var(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0)
/var/ossec/wodles(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
wazuhT.te
policy_module(wazuhT,1.0)
require {
type bin_t;
type tmp_t;
type unconfined_t;
type initrc_t;
type unconfined_service_t;
type shell_exec_t;
type var_t;
type cert_t;
type node_t;
type init_t;
type kernel_t;
type system_dbusd_t;
type sshd_t;
type fs_t;
type unlabeled_t;
type sysctl_net_t;
type systemd_unit_file_t;
type cgroup_t;
type hugetlbfs_t;
type sysfs_t;
type iptables_exec_t;
type sshd_exec_t;
type device_t;
type fixed_disk_device_t;
type useradd_exec_t;
type journalctl_exec_t;
type proc_net_t;
type pstore_t;
type mount_exec_t;
type insmod_exec_t;
type systemd_systemctl_exec_t;
type crontab_exec_t;
type devlog_t;
type rpm_exec_t;
type proc_t;
type configfs_t;
type http_port_t;
type tmpfs_t;
type gssproxy_var_lib_t;
type rpm_log_t;
type auditd_unit_file_t;
type crond_unit_file_t;
type mount_var_run_t;
type rpm_var_lib_t;
type usermodehelper_t;
type var_run_t;
type etc_t;
type security_t;
type firewalld_t;
type iptables_t;
type dhcpc_t;
role system_r;
role unconfined_r;
class process { transition getattr getpgid getsession setrlimit setsched signull open read};
class rawip_socket {bind setopt getopt create open};
class netlink_route_socket {bind setopt create open write read nlmsg_read};
class netlink_audit_socket {bind setopt create open write read nlmsg_read};
class lnk_file {getattr open read};
class file { getattr open read execute getattr read};
class dir { getattr open read search };
class tcp_socket { bind connect create getopt listen name_bind name_connect node_bind setopt };
class capability { chown dac_override fowner fsetid kill net_bind_service net_raw setgid setuid sys_chroot sys_resource sys_ptrace};
class unix_dgram_socket { read write create ioctl sendto bind getopt connect};
class netlink_tcpdiag_socket {create getattr setopt read bind nlmsg_read write};
class filesystem { getattr open read };
class sock_file { getattr open read };
class blk_file { getattr open read };
class udp_socket name_bind;
class unix_stream_socket {connectto ioctl getattr};
class dbus send_msg;
}
# Private type declarations
type wazuh_t;
type wazuh_exec_t;
type wazuh_etc_t;
type wazuh_lib_t;
type wazuh_log_t;
type wazuh_tmp_t;
type wazuh_var_t;
# Ports label
type wazuh_port_t;
corenet_port(wazuh_port_t)
# domain_type macro specifies the type wazuh_t to be a domain
domain_type(wazuh_t)
# domain_entry_file specifies an entry point to the wazuh_t domain for the executable file of type wazuh_exec_t
domain_entry_file(wazuh_t, wazuh_exec_t)
# logging_log_file macro makes wazuh_log_t become the type of log file with the necessary groups and rules
logging_log_file(wazuh_log_t)
# Allow domain wazuh_t to manipulate log files
allow wazuh_t wazuh_log_t:file append_file_perms;
# files_tmp_file takes the type of wazuh_tmp_t to the necessary groups so that it becomes the type of tmp file
files_tmp_file(wazuh_tmp_t)
# Allow the wazuh_t domain write privileges into the tmp_t labeled directory, but with an automatic file transition towards wazuh_tmp_t for every file written
files_tmp_filetrans(wazuh_t,wazuh_tmp_t,file)
# Allow domain wazuh_t to manipulate tmp files
allow wazuh_t wazuh_tmp_t:file manage_file_perms;
#============== Allow transition
role unconfined_r types wazuh_t;
role system_r types wazuh_t;
allow wazuh_t bin_t : file execute;
allow unconfined_t wazuh_t : process transition;
allow initrc_t wazuh_t : process transition;
allow unconfined_service_t wazuh_t : process transition;
allow unconfined_t wazuh_exec_t : file execute;
allow initrc_t wazuh_exec_t : file execute;
allow unconfined_service_t wazuh_exec_t : file execute;
allow wazuh_t wazuh_exec_t : file entrypoint;
type_transition unconfined_t wazuh_exec_t : process wazuh_t;
type_transition initrc_t wazuh_exec_t : process wazuh_t;
type_transition unconfined_service_t wazuh_exec_t : process wazuh_t;
#============== Permissions for wazuh-control to run Wazuh
allow wazuh_t shell_exec_t:file { execute execute_no_trans };
allow wazuh_t bin_t:file execute_no_trans;
allow wazuh_t wazuh_var_t:dir { create rmdir open add_name read remove_name write getattr setattr search};
allow wazuh_t wazuh_var_t:file { create getattr open read append rename setattr unlink write ioctl lock};
allow wazuh_t wazuh_exec_t:dir { create rmdir open getattr add_name read remove_name write setattr search};
allow wazuh_t wazuh_exec_t:file { create getattr open read append rename setattr link unlink write ioctl lock execute execute_no_trans};
allow wazuh_t wazuh_log_t:dir { create rmdir open getattr add_name read remove_name write setattr search};
allow wazuh_t wazuh_log_t:file { create getattr open read append rename setattr link unlink write ioctl lock};
allow wazuh_t wazuh_etc_t:dir { create rmdir open getattr add_name read remove_name write setattr search};
allow wazuh_t wazuh_etc_t:file { create getattr open read append rename setattr link unlink write ioctl lock map};
allow wazuh_t wazuh_tmp_t:dir { create rmdir open getattr add_name read remove_name write setattr search rmdir};
allow wazuh_t wazuh_tmp_t:file { create getattr open read append rename setattr link unlink write ioctl lock};
allow wazuh_t wazuh_lib_t:dir { create rmdir open getattr add_name read remove_name write setattr search};
allow wazuh_t wazuh_lib_t:file { getattr open read map execute};
allow wazuh_t wazuh_var_t:filesystem { associate};
allow wazuh_var_t fs_t:filesystem { associate};
allow wazuh_etc_t fs_t:filesystem { associate};
allow wazuh_t self:process { getattr getpgid getsession setrlimit setsched };
# Permissions to read /proc
allow wazuh_t proc_t:dir read;
domain_read_all_domains_state(wazuh_t)
domain_getpgid_all_domains( wazuh_t )
domain_getattr_all_domains( wazuh_t )
domain_getsession_all_domains( wazuh_t )
domain_signull_all_domains( wazuh_t )
#============== Permissions for wazuh-agentd to use sockets
allow wazuh_t wazuh_var_t:sock_file { read write getattr create setattr unlink};
allow wazuh_t wazuh_t:unix_stream_socket {connectto ioctl};
allow wazuh_t wazuh_port_t:tcp_socket {name_connect name_bind create read write connect recvfrom sendto send_msg setopt ioctl setattr getattr};
allow wazuh_t wazuh_t:tcp_socket {accept bind name_connect name_bind create read write connect recvfrom sendto send_msg setopt ioctl setattr getattr};
allow wazuh_t wazuh_port_t:udp_socket {name_bind create read write connect recvfrom sendto send_msg setopt ioctl setattr getattr};
allow wazuh_t wazuh_t:udp_socket {accept name_bind create read write connect recvfrom sendto send_msg setopt ioctl setattr getattr};
allow wazuh_t wazuh_t:unix_dgram_socket { read write create ioctl sendto bind getopt connect};
allow wazuh_t self:tcp_socket { bind connect create getopt listen setopt };
allow wazuh_t self:udp_socket { bind connect create getattr ioctl setopt };
allow wazuh_t node_t:tcp_socket node_bind;
allow wazuh_t node_t:udp_socket node_bind;
#============== Permissions for wazuh-syscheckd to monitor files and directories and for wazuh-logcollector to read logs files
files_read_all_files(wazuh_t)
files_read_all_chr_files(wazuh_t)
files_read_all_symlinks(wazuh_t)
fs_getattr_all_chr_files(wazuh_t)
dev_getattr_all_chr_files(wazuh_t)
allow wazuh_t gssproxy_var_lib_t:sock_file { getattr open read };
allow wazuh_t fixed_disk_device_t:blk_file { getattr open read };
allow wazuh_t devlog_t:sock_file { read write getattr create setattr unlink};
#============== Permissions for rootcheck to monitor ports
corenet_udp_bind_all_ports(wazuh_t)
corenet_tcp_bind_all_ports(wazuh_t)
#============== Permissions for wazuh-modulesd to run
allow wazuh_t sysfs_t:lnk_file read;
allow wazuh_t proc_net_t:file { getattr open read };
allow wazuh_t self:netlink_route_socket {create getattr open read bind nlmsg_read write};
# Permissions for wazuh-modulesd to run SCA scans
allow wazuh_t sshd_exec_t:file { execute execute_no_trans };
allow wazuh_t useradd_exec_t:file { execute execute_no_trans};
allow wazuh_t rpm_exec_t:file { execute execute_no_trans ioctl};
allow wazuh_t systemd_systemctl_exec_t:file { execute execute_no_trans};
allow wazuh_t insmod_exec_t:file { execute execute_no_trans };
allow wazuh_t iptables_exec_t:file { execute execute_no_trans };
allow wazuh_t crontab_exec_t:file { execute execute_no_trans };
allow wazuh_t journalctl_exec_t:file { execute execute_no_trans};
allow wazuh_t mount_exec_t:file { execute execute_no_trans getattr};
allow wazuh_t rpm_log_t:file { getattr open read append};
allow wazuh_t rpm_var_lib_t:file { write create setattr unlink rename};
allow wazuh_t rpm_var_lib_t:dir { write add_name remove_name};
allow wazuh_t cert_t:dir { search write create add_name remove_name rmdir};
allow wazuh_t cert_t:file { lock write};
allow wazuh_t tmp_t:dir { search write create add_name remove_name rmdir};
allow wazuh_t unlabeled_t:file { getattr open read };
allow wazuh_t security_t:security compute_av;
allow wazuh_t security_t:file {write};
allow wazuh_t security_t:dir {write};
allow wazuh_t init_t:unix_stream_socket {connectto ioctl getattr};
allow wazuh_t init_t:system { status };
allow wazuh_t init_t:service { status };
allow wazuh_t system_dbusd_t:dbus send_msg;
allow wazuh_t tmpfs_t:dir read;
allow wazuh_t tmpfs_t:filesystem { getattr open read };
allow wazuh_t cgroup_t:filesystem { getattr open read };
allow wazuh_t configfs_t:filesystem { getattr open read };
allow wazuh_t device_t:filesystem { getattr open read };
allow wazuh_t hugetlbfs_t:filesystem { getattr open read };
allow wazuh_t proc_t:filesystem { getattr open read };
allow wazuh_t pstore_t:filesystem { getattr open read };
allow wazuh_t sysfs_t:filesystem { getattr open read };
allow wazuh_t fs_t:filesystem { getattr open read };
allow wazuh_t self:rawip_socket {bind setopt getopt create open};
allow wazuh_t kernel_t:unix_dgram_socket sendto;
allow wazuh_t auditd_unit_file_t:service { status };
allow wazuh_t crond_unit_file_t:service { status };
allow wazuh_t systemd_unit_file_t:service { status start};
allow wazuh_t mount_var_run_t:dir { getattr open read write search write};
allow wazuh_t var_run_t:dir { getattr open read search write add_name remove_name};
allow wazuh_t var_run_t:file { getattr open read write lock create unlink};
allow wazuh_t sysctl_net_t:dir search;
allow wazuh_t sysctl_net_t:file { getattr open read };
allow wazuh_t usermodehelper_t:file { getattr open read };
allow wazuh_t self:netlink_audit_socket {create setopt open read bind nlmsg_read write};
allow wazuh_t self:netlink_tcpdiag_socket {create getattr setopt read bind nlmsg_read write};
allow wazuh_t kernel_t:system module_request;
allow dhcpc_t unlabeled_t:file {getattr open read};
#============== Permissions for wazuh-execd to run AR
allow wazuh_t self:capability { chown dac_override fowner fsetid kill net_bind_service net_raw setgid setuid sys_chroot sys_resource sys_ptrace};
allow wazuh_t etc_t:dir { getattr open read search write add_name remove_name};
allow sshd_t var_t:file { getattr create open append ioctl lock read setattr write};
allow wazuh_t firewalld_t:dbus send_msg;
allow firewalld_t wazuh_t:dbus send_msg;
allow wazuh_t firewalld_t:process { getattr getpgid getsession signull };
allow iptables_t var_run_t:file {open read lock};
allow wazuh_t system_dbusd_t:unix_stream_socket connectto;
allow wazuh_t http_port_t:tcp_socket {name_bind name_connect write read};
#============== Permissions to assign new contexts
allow unconfined_t wazuh_var_t:dir {getattr open read search relabelto};
allow unconfined_t wazuh_var_t:file {getattr relabelto};
allow unconfined_t wazuh_var_t:sock_file {getattr open read relabelto};
allow unconfined_t wazuh_lib_t:dir {getattr open read search relabelto};
allow unconfined_t wazuh_lib_t:file {getattr relabelto};
allow unconfined_t wazuh_etc_t:dir {getattr open read search relabelto};
allow unconfined_t wazuh_etc_t:file {getattr open read write relabelto};
wazuhT.fc and wazuhT.te file content descriptions
Below there is a description of the wazuhT.fc
and wazuhT.te
files. These descriptions are based on the ThreatLockDown manager files.
wazuhT.fc
In this file, the security contexts for each folder and file within the ThreatLockDown folder are declared. For example, we assign the context
wazuh_exec_t
to executable files, including/ossec/active-response/bin/*
and/ossec/bin/*
. In this way, we declare a ThreatLockDown context for each file in the/var/ossec
directory:/var/ossec/active-response gen_context(system_u:object_r:wazuh_var_t,s0) /var/ossec/active-response/bin(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0) /var/ossec/agentless(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0) /var/ossec/api gen_context(system_u:object_r:wazuh_var_t,s0) /var/ossec/api/configuration(/.*)? gen_context(system_u:object_r:wazuh_etc_t,s0) /var/ossec/api/scripts(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0) /var/ossec/backup(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0) /var/ossec/bin(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0) /var/ossec/etc(/.*)? gen_context(system_u:object_r:wazuh_etc_t,s0) /var/ossec/framework(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0) /var/ossec/integrations(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0) /var/ossec/lib(/.*)? gen_context(system_u:object_r:wazuh_lib_t,s0) /var/ossec/logs(/.*)? gen_context(system_u:object_r:wazuh_log_t,s0) /var/ossec/queue(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0) /var/ossec/ruleset(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0) /var/ossec/stats(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0) /var/ossec/tmp(/.*)? gen_context(system_u:object_r:wazuh_tmp_t,s0) /var/ossec/var(/.*)? gen_context(system_u:object_r:wazuh_var_t,s0) /var/ossec/wodles(/.*)? gen_context(system_u:object_r:wazuh_exec_t,s0)
Note
Note that in the definition of the contexts for each ThreatLockDown folder the default installation folder (/var/ossec/
) was used.
wazuhT.te
The
wazuhT.te
file is the main file of the module, where it is defined:
The name and version of the module. The module, the
.te
file, and the.fc
file must have the same name.policy_module(wazuhT,1.0)
The private contexts of Wazuh.
type wazuh_t; type wazuh_exec_t; type wazuh_etc_t; type wazuh_lib_t; type wazuh_log_t; type wazuh_tmp_t; type wazuh_var_t;
Definition of the
wazuh_port_t
type to which the ports used by ThreatLockDown will be associated.type wazuh_port_t; corenet_port(wazuh_port_t)
Specifies that the
wazuh_t
type is a domain, and that the entry point to thewazuh_t
domain is through an executable of typewazuh_exec_t
.# domain_type macro specifies the type wazuh_t to be a domain. domain_type(wazuh_t) # domain_entry_file specifies an entry point to the wazuh_t domain for the executable file of type wazuh_exec_t. domain_entry_file(wazuh_t, wazuh_exec_t)
Creation of the necessary rules to allow the transition from an
unconfined_t
context to thewazuh_t
context.role unconfined_r types wazuh_t; role system_r types wazuh_t; allow wazuh_t bin_t : file { execute read getattr }; allow unconfined_t wazuh_t : process transition; allow initrc_t wazuh_t : process transition; allow unconfined_service_t wazuh_t : process transition; allow unconfined_t wazuh_exec_t : file { execute read getattr }; allow initrc_t wazuh_exec_t : file { execute read getattr }; allow unconfined_service_t wazuh_exec_t : file { execute read getattr }; allow wazuh_t wazuh_exec_t : file entrypoint; type_transition unconfined_t wazuh_exec_t : process wazuh_t; type_transition initrc_t wazuh_exec_t : process wazuh_t; type_transition unconfined_service_t wazuh_exec_t : process wazuh_t;
Creation of the necessary rules for each ThreatLockDown module to work correctly, for example:
Module
Rules
Description
Target context
Object type
Permissions
wazuh-control
shell_exec_t
file
execute, execute_no_trans
These rules allow wazuh-control and startup scripts to perform the necessary tasks to start Wazuh.
bin_t
file
execute_no_trans
wazuh_var_t
dir
create rmdir, open, add_name, read, write, remove_name, getattr, setattr, search
wazuh_var_t
file
create, getattr, open, read, append, lock, setattr, unlink, write, ioctl, rename
wazuh_exec_t
dir
create rmdir, open, add_name, read, write, remove_name, getattr, setattr, search
wazuh_exec_t
file
create, getattr, open, read, append, lock, setattr, unlink, write, ioctl, rename, link, execute, execute_no_trans
wazuh_log_t
dir
create rmdir, open, add_name, read, write, remove_name, getattr, setattr, search
wazuh_log_t
file
create, getattr, open, read, append, lock, setattr, unlink, write, ioctl, rename, link
wazuh_etc_t
dir
create rmdir, open, add_name, read, write, remove_name, getattr, setattr, search
wazuh_tmp_t
dir
create rmdir, open, add_name, read, write, remove_name, getattr, setattr, search
wazuh_tmp_t
file
create, getattr, open, read, append, lock, setattr, unlink, write, ioctl, rename, link
wazuh_lib_t
dir
create rmdir, open, add_name, read, write, remove_name, getattr, setattr, search
wazuh_lib_t
file
getattr, open, read, map, execute
wazuh_var_t
filesystem
associate
proc_t
dir
read
all
process
status, getpgid, getattr, getsession, signull
Framework & API
wazuh_t
tcp_socket
bind, connect, create, getopt, listen, setopt
These rules allow the API to listen for requests.
wazuh_t
udp_socket
bind, connect, create, getattr, ioctl, setopt
node_t
tcp_socket
node_bind
node_t
udp_socket
node_bind
wazuh-analysisd
wazuh_t
process
getattr, getpgid, getsession, setrlimit, setsched
These rules allow wazuh-analysisd, for example, to set the necessary permissions, read rules files and cdb lists.
wazuh_etc_t
file
create, getattr, open, read, append, rename, setattr, link, unlink, write, ioctl, lock map
wazuh-remoted
wazuh_var_t
sock_file
read, write, getattr, create, setattr, unlink
These rules allow wazuh-remoted to use
tcp/udp
sockets to communicate with agents.wazuh_t
unix_stream_socket
connectto, ioctl
wazuh_port_t
tcp_socket
name_connect, name_bind, create, read, write, connect, recvfrom, sendto, send_msg, setopt, ioctl, setattr, getattr
wazuh_t
tcp_socket
name_connect, name_bind, create, read, bind write, connect, recvfrom, sendto, send_msg, setopt, ioctl, setattr, getattr, accept
wazuh_port_t
udp_socket
name_bind, create, read, write, connect, recvfrom, sendto, send_msg, setopt, ioctl, setattr, getattr
wazuh_t
udp_socket
accept, name_bind, create, read, write, connect, recvfrom, sendto, send_msg, setopt, ioctl, setattr, getattr
wazuh_t
unix_dgram_socket
read, write, create, ioctl, sendto, bind, getopt, connect
wazuh-syscheckd & wazuh-logcollector
all
file
read
These rules allow wazuh-syscheckd to monitor files and folders inside the
/etc
,/usr
or/bin
directories present in Wazuh's default configuration; they also allow wazuh-logcollector to read log files.all
chr_file
read
all
symlinks
read
all
filesystem
getattr
all
device
getattr
gssproxy_var_lib_t
sock_file
getattr, open, read
fixed_disk_device_t
blk_file
getattr, open, read
devlog_t
sock_file
read, write, getattr, create, setattr, unlink
rootcheck
all
udp_socket
bind_name
These rules allow rootcheck to check which ports are open.
all
tcp_socket
bind_name
wazuh-modulesd
sysfs_t
lnk_file
read
These are some of the rules that allow wazuh-modulesd to, for example, run a SCA scan.
proc_net_t
file
getattr, open, read
wazuh_t
netlink_route_socket
create, getattr, open, read, bind, nlmsg_read, write
sshd_exec_t
file
execute, execute_no_trans
useradd_exec_t
file
execute, execute_no_trans
rpm_exec_t
file
execute, execute_no_trans, ioctl
systemd_systemctl_exec_t
file
execute, execute_no_trans
insmod_exec_t
file
execute, execute_no_trans
iptables_exec_t
file
execute, execute_no_trans
crontab_exec_t
file
execute, execute_no_trans
journalctl_exec_t
file
execute, execute_no_trans
mount_exec_t
file
execute, execute_no_trans, getattr
rpm_log_t
file
getattr, open, read, append
wazuh-execd
wazuh_t
capability
chown, dac_override, fowner, fsetid, kill, net_bind_service, net_raw, setgid, setuid, sys_chroot, sys_resource, sys_ptrace
These rules were added to allow wazuh-execd to run ARs such as
firewall-drop
,host-deny
orwazuh-slack
.etc_t
dir
getattr, open, read, search, write, add_name, remove_name
var_t
file
getattr, create, open, append, ioctl, lock, read, setattr, write
firewalld_t
dbus
send_msg
wazuh_t
dbus
send_msg
firewalld_t
process
getattr, getpgid, getsession, signull
system_dbusd_t
unix_stream_socket
connectto
http_port_t
tcp_socket
name_bind, name_connect, write read
Note
These are some of the many rules necessary for ThreatLockDown to run. The above categorization by module is for illustrative purposes only, as many of the rules are shared by different ThreatLockDown modules.
Steps to build and load the new SELinux policy module
Install required dependencies.
# yum install -y selinux-policy-devel gcc make
Stop Wazuh.
# systemctl stop wazuh-manager
Verify current SELinux state.
# getenforce
In case the SELinux status is
Enforcing
we must change it toPermissive
momentarily.# setenforce 0
Create the directory for the files
wazuhT.te
andwazuhT.fc
.# mkdir selinux-wazuh && cd selinux-wazuh
Download the
wazuhT.te
andwazuhT.fc
files and compile the module.# curl -sO https://raw.githubusercontent.com/wazuh/wazuh-documentation/4.9/resources/selinux/manager/wazuhT.fc # curl -sO https://raw.githubusercontent.com/wazuh/wazuh-documentation/4.9/resources/selinux/manager/wazuhT.te # make -f /usr/share/selinux/devel/Makefile
Install the new policy module.
# semodule -i wazuhT.pp
Check that it has been loaded correctly.
# semodule -l | grep wazuhT
wazuhT 1.0
Run
restorecon
to assign the new tags defined in thewazuhT.fc
file to existing files in the ThreatLockDown directory.# restorecon -RFvv /var/ossec/
Verify that the files have the appropriate contexts.
# ls -lZ /var/ossec/bin/
Assign the port numbers used by ThreatLockDown to the context
wazuh_port_t
.# semanage port -a -t wazuh_port_t -p tcp 1514 # semanage port -a -t wazuh_port_t -p udp 1514
Note
For the ThreatLockDown manager, you must add port 1515 used by wazuh-authd and 1516 which is used by wazuh-clusterd.
Change SELinux to Enforcing.
# setenforce 1
Start Wazuh.
# systemctl start wazuh-manager
By running the command ps auxZ | grep wazuh
we can see that ThreatLockDown is running with the new context wazuh_t
:
ps auxZ | grep wazuh system_u:system_r:wazuh_t:s0 ThreatLockDown 18239 8.2 16.5 435332 82744 ? Sl 18:50 0:09 /var/ossec/framework/python/bin/python3 /var/ossec/api/scripts/wazuh-apid.py system_u:system_r:wazuh_t:s0 root 18281 0.0 0.3 191524 1540 ? Sl 18:50 0:00 /var/ossec/bin/wazuh-authd system_u:system_r:wazuh_t:s0 ThreatLockDown 18298 0.6 1.3 641364 6588 ? Sl 18:50 0:00 /var/ossec/bin/wazuh-db system_u:system_r:wazuh_t:s0 root 18322 0.0 0.2 35888 1236 ? Sl 18:50 0:00 /var/ossec/bin/wazuh-execd system_u:system_r:wazuh_t:s0 ThreatLockDown 18337 3.0 16.2 755924 80936 ? Sl 18:50 0:03 /var/ossec/bin/wazuh-analysisd system_u:system_r:wazuh_t:s0 root 18350 21.5 0.9 349040 4528 ? SNl 18:50 0:24 /var/ossec/bin/wazuh-syscheckd system_u:system_r:wazuh_t:s0 ThreatLockDown 18367 0.3 0.3 520512 1840 ? Sl 18:50 0:00 /var/ossec/bin/wazuh-remoted system_u:system_r:wazuh_t:s0 root 18409 0.4 0.8 478308 4172 ? Sl 18:50 0:00 /var/ossec/bin/wazuh-logcollector system_u:system_r:wazuh_t:s0 ThreatLockDown 18429 0.0 0.2 35860 1192 ? Sl 18:50 0:00 /var/ossec/bin/wazuh-monitord system_u:system_r:wazuh_t:s0 root 18442 5.1 1.3 714180 6840 ? Sl 18:50 0:05 /var/ossec/bin/wazuh-modulesd
Create custom SELinux module
In this section we will see how to create a set of rules with the audit2allow tool in any SELinux environment.
Note
For this example we assume that ThreatLockDown has already been transitioned to a proper context other than unconfined_t
, you can see SELinux module example to confine Wazuh.
Change SELinux to Permissive, this will allow denial events to be logged but will not block the required action.
# setenforce 0
Start ThreatLockDown and use it for a while.
# systemctl start wazuh-manager
Stop Wazuh.
# systemctl stop wazuh-manager
Use the audit2allow tool to create a set of rules.
Note
Note that you must change the
--start
and--end
dates to the length of time your test lasted.# ausearch -m AVC --start 11/08/2021 19:58:19 --end 11/08/2021 23:58:19 | audit2allow -a -M test_audit
Install the new module.
# semodule -i test_audit.pp
Change SELinux to Enforcing.
# setenforce 1
Start Wazuh.
# systemctl start wazuh-manager
Troubleshooting
Create missing rules
It is possible that more rules may need to be added, as it depends on what applications are installed in the environment as well as what is being monitored. To do this, you need to follow these steps:
Check which action is being blocked.
# grep denied /var/log/audit/audit.log | ausearch -i ... type=AVC msg=audit(11/19/2021 13:45:23.239:486) : avc: denied { search } for pid=1944 comm=wazuh-modulesd name=960 dev="proc" ino=17328 scontext=system_u:system_r:wazuh_t:s0 tcontext=system_u:system_r:sshd_net_t:s0-s0:c0.c1023 tclass=dir permissive=0 ...
Create the rule to allow the blocked action.
- Manually:
It is possible to create a new rule and add it to the
wazuhT.te
file, for example:allow wazuh_t sshd_net_t:dir search;
Re-compile and install the policy module:
# make -f /usr/share/selinux/devel/Makefile # semodule -i wazuhT.pp
- Using audit2allow tool:
It is also possible to create the rules with the audit2allow tool. This tool takes the logged AVCs in the
/var/log/audit/audit.log
file and creates the necessary rules. It is possible to filter the logs, for example by date and time.# ausearch -m AVC --start 11/19/2021 13:45:00 --end 11/19/2021 13:46:00 | audit2allow -a -M test_audit
Install the new module.
# semodule -i test_audit.pp
Delete module and restore context
In case you need to restore the file context to the state prior to the installation of the wazuhT
module, you need to follow these steps:
Delete the assigned ports.
# semanage port -d -p tcp 1514 # semanage port -d -p udp 1514
Delete the loaded module.
# semodule -d wazuhT
Execute
restorecon
.# restorecon -RFvv /var/ossec/