Package: selinux-policy-default Version: 2:2.20190201-2 Severity: normal Dear Maintainer,
In enforcing mode, selinux causes pam_selinux and systemd process user@<uid> to fail when logging in via ssh. root@prokyon:~# systemctl status user@1000 ● user@1000.service - User Manager for UID 1000 Loaded: loaded (/lib/systemd/system/user@.service; static; vendor preset: enabled) Active: failed (Result: protocol) since Tue 2019-09-24 01:12:29 CEST; 40s ago Docs: man:user@.service(5) Process: 6912 ExecStart=/lib/systemd/systemd --user (code=exited, status=224/PAM) Main PID: 6912 (code=exited, status=224/PAM) Sep 24 01:12:29 prokyon systemd[1]: Starting User Manager for UID 1000... Sep 24 01:12:29 prokyon systemd[6912]: pam_selinux(systemd-user:session): Unable to get valid context for rsenger Sep 24 01:12:29 prokyon systemd[6912]: pam_selinux(systemd-user:session): conversation failed Sep 24 01:12:29 prokyon systemd[6912]: pam_unix(systemd-user:session): session opened for user rsenger by (uid=0) Sep 24 01:12:29 prokyon systemd[6912]: PAM failed: Cannot make/remove an entry for the specified session Sep 24 01:12:29 prokyon systemd[6912]: user@1000.service: Failed to set up PAM session: Operation not permitted Sep 24 01:12:29 prokyon systemd[6912]: user@1000.service: Failed at step PAM spawning /lib/systemd/systemd: Operation not permitted Sep 24 01:12:29 prokyon systemd[1]: user@1000.service: Failed with result 'protocol'. Sep 24 01:12:29 prokyon systemd[1]: Failed to start User Manager for UID 1000. No other hints in the logs. No AVC logged, neither with or without dontaudit rules. System is Debian 10 buster. -- System Information: Debian Release: 10.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-6-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages selinux-policy-default depends on: ii libselinux1 2.8-1+b1 ii libsemanage1 2.8-2 ii libsepol1 2.8-1 ii policycoreutils 2.8-1 ii selinux-utils 2.8-1+b1 Versions of packages selinux-policy-default recommends: pn checkpolicy <none> pn setools <none> Versions of packages selinux-policy-default suggests: pn logcheck <none> pn syslog-summary <none>