-
Notifications
You must be signed in to change notification settings - Fork 136
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
selinux policy prevents proxy through squid port 3128 #162
Comments
Thank you for your question.
Afterwords you can run:
This will allow SELinux to allow any squid_port_t port, including port 3128, to connect to Duo for 2FA. |
I am going to close this out. If you have any more questions about this please feel free to reopen this issue. |
As Squid is a popular Forward Proxy platform, and security binaries should be compiled by trusted partners, add use of squid_port_t to the supplied SELINUX policy object. Satisfies Issue duosecurity#162
I have posted a pull request to fix this issue properly. See #265 |
We have some duo-enabled CentOS 7 systems which are on rfc1918 addresses, and so have to access the api servers through a provided proxy which runs on port 3128 (standard squid port).
However selinux policy prevents duo from connecting to this port so we get an error:
Failsafe Duo login for 'user' from hostname: Couldn't connect to api-82d56263.duosecurity.com: Failed to connect
(This does work if we disable selinux.)
Here is the problem: port 3128 is already defined by policy so it seems impossible to add to the http_cache_port_t list used by duo, nor can I remove that port from the squid_port_t list:
Since duo_linux is designed to support connection through a proxy, and squid is a fairly common implementation, maybe it would make sense to add squid_port_t to the set of permitted port lists (in pam_duo/authlogin_duo.te)?
Or perhaps there is another solution?
The text was updated successfully, but these errors were encountered: