RE: [F8] Sendmail, SpamAssasin, ClamAV and SELinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Daniel B. Thurman wrote:
>Sent: Sunday, December 09, 2007 8:54 PM
>To: Fedora-List (E-mail)
>Subject: [F8] Sendmail, SpamAssasin, ClamAV and SELinux
>
>
>
>SELinux is preventing Sendmail from accessing spamass-milter.sock
>and clamav-milter.sock in their respective /var/run subdirectories.
>
>The /var/run/{clamav-milter,spamass-milter} attributes are:
>
>/var/run/clamav-milter				var_run_t
>/var/run/clamav-milter/clamav-milter.sock:		var_run_t
>
>/var/run/spamass-milter				var_run_t
>/var/run/spamass-milter/spamass-milter.sock:	spamd_var_run
>
>The MAIN problem is that even though it is NOT a problem starting
>the spamassasin and clamav programs but the sendmail program
>fails to start up because sendmail is denied permissions to access
>the clamav and spamass milter directory/file in /var/run areas.
>
>The sendmail.mc(cf) file has input-filters installed in them so that is
>why sendmail wants to use the clamav and spamassasin filters but
>is prevented from doing so due to selinux access permission denials.
>
>Sendmail has sendmail_t selinux tags but how is it allowed to access
>either of the above sock files if no selinux tags are assigned 
>to neither?
>
>Please advise.
>
>Thanks!
>Dan
>
>-- 

Here are the SELinux reports for more details.  I have disabled
clamav and spamassassin from the sendmail.mc file for now.

==========================================================
Summary
    SELinux is preventing /usr/sbin/sendmail.sendmail (sendmail_t) "getattr" to
    /var/run/clamav-milter/clamav.sock (var_run_t).

Detailed Description
    SELinux denied access requested by /usr/sbin/sendmail.sendmail. It is not
    expected that this access is required by /usr/sbin/sendmail.sendmail and
    this access may signal an intrusion attempt. It is also possible that the
    specific version or configuration of the application is causing it to
    require additional access.

Allowing Access
    Sometimes labeling problems can cause SELinux denials.  You could try to
    restore the default system file context for /var/run/clamav-
    milter/clamav.sock, restorecon -v /var/run/clamav-milter/clamav.sock If this
    does not work, there is currently no automatic way to allow this access.
    Instead,  you can generate a local policy module to allow this access - see
    http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385 Or you can disable
    SELinux protection altogether. Disabling SELinux protection is not
    recommended. Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi
    against this package.

Additional Information        

Source Context                system_u:system_r:sendmail_t:s0
Target Context                system_u:object_r:var_run_t:s0
Target Objects                /var/run/clamav-milter/clamav.sock [ sock_file ]
Affected RPM Packages         sendmail-8.14.2-1.fc8 [application]clamav-
                              milter-0.91.2-3.fc8 [target]
Policy RPM                    selinux-policy-3.0.8-62.fc8
Selinux Enabled               True
Policy Type                   targeted
MLS Enabled                   True
Enforcing Mode                Enforcing
Plugin Name                   plugins.catchall_file
Host Name                     linux.cdkkt.com
Platform                      Linux linux.cdkkt.com 2.6.23.8-63.fc8 #1 SMP Wed
                              Nov 21 18:51:08 EST 2007 i686 i686
Alert Count                   3
First Seen                    Mon 10 Dec 2007 11:02:42 AM PST
Last Seen                     Mon 10 Dec 2007 11:28:29 AM PST
Local ID                      f06fe44d-c540-45eb-b792-2949a7404482
Line Numbers                  

Raw Audit Messages            

avc: denied { getattr } for comm=sendmail dev=sda2 egid=51 euid=0
exe=/usr/sbin/sendmail.sendmail exit=-13 fsgid=51 fsuid=0 gid=0 items=0
path=/var/run/clamav-milter/clamav.sock pid=7622
scontext=system_u:system_r:sendmail_t:s0 sgid=51
subj=system_u:system_r:sendmail_t:s0 suid=0 tclass=sock_file
tcontext=system_u:object_r:var_run_t:s0 tty=pts7 uid=0


Summary
    SELinux is preventing spamassassin (procmail_t) "write" to <Unknown>
    (clamd_var_lib_t).

Detailed Description
    SELinux denied access requested by spamassassin. It is not expected that
    this access is required by spamassassin and this access may signal an
    intrusion attempt. It is also possible that the specific version or
    configuration of the application is causing it to require additional access.

Allowing Access
    Sometimes labeling problems can cause SELinux denials.  You could try to
    restore the default system file context for <Unknown>, restorecon -v
    <Unknown> If this does not work, there is currently no automatic way to
    allow this access. Instead,  you can generate a local policy module to allow
    this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385
    Or you can disable SELinux protection altogether. Disabling SELinux
    protection is not recommended. Please file a
    http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package.

Additional Information        

Source Context                system_u:system_r:procmail_t:s0
Target Context                system_u:object_r:clamd_var_lib_t:s0
Target Objects                None [ dir ]
Affected RPM Packages         
Policy RPM                    selinux-policy-3.0.8-62.fc8
Selinux Enabled               True
Policy Type                   targeted
MLS Enabled                   True
Enforcing Mode                Enforcing
Plugin Name                   plugins.catchall_file
Host Name                     linux.cdkkt.com
Platform                      Linux linux.cdkkt.com 2.6.23.8-63.fc8 #1 SMP Wed
                              Nov 21 18:51:08 EST 2007 i686 i686
Alert Count                   9
First Seen                    Mon 10 Dec 2007 10:22:35 AM PST
Last Seen                     Mon 10 Dec 2007 11:21:37 AM PST
Local ID                      0dec68d7-43d0-4140-b747-1fb2300de7ed
Line Numbers                  

Raw Audit Messages            

avc: denied { write } for comm=spamassassin dev=sda2 egid=491 euid=496
exe=/usr/bin/perl exit=-13 fsgid=491 fsuid=496 gid=491 items=0 name=clamav
pid=7447 scontext=system_u:system_r:procmail_t:s0 sgid=491
subj=system_u:system_r:procmail_t:s0 suid=496 tclass=dir
tcontext=system_u:object_r:clamd_var_lib_t:s0 tty=(none) uid=496


Summary
    SELinux is preventing /usr/sbin/sendmail.sendmail (sendmail_t) "search" to
    <Unknown> (spamd_var_run_t).

Detailed Description
    SELinux denied access requested by /usr/sbin/sendmail.sendmail. It is not
    expected that this access is required by /usr/sbin/sendmail.sendmail and
    this access may signal an intrusion attempt. It is also possible that the
    specific version or configuration of the application is causing it to
    require additional access.

Allowing Access
    Sometimes labeling problems can cause SELinux denials.  You could try to
    restore the default system file context for <Unknown>, restorecon -v
    <Unknown> If this does not work, there is currently no automatic way to
    allow this access. Instead,  you can generate a local policy module to allow
    this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385
    Or you can disable SELinux protection altogether. Disabling SELinux
    protection is not recommended. Please file a
    http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package.

Additional Information        

Source Context                system_u:system_r:sendmail_t:s0
Target Context                system_u:object_r:spamd_var_run_t:s0
Target Objects                None [ dir ]
Affected RPM Packages         sendmail-8.14.2-1.fc8 [application]
Policy RPM                    selinux-policy-3.0.8-62.fc8
Selinux Enabled               True
Policy Type                   targeted
MLS Enabled                   True
Enforcing Mode                Enforcing
Plugin Name                   plugins.catchall_file
Host Name                     linux.cdkkt.com
Platform                      Linux linux.cdkkt.com 2.6.23.8-63.fc8 #1 SMP Wed
                              Nov 21 18:51:08 EST 2007 i686 i686
Alert Count                   3
First Seen                    Mon 10 Dec 2007 11:02:42 AM PST
Last Seen                     Mon 10 Dec 2007 11:03:30 AM PST
Local ID                      2c99868b-1707-4ecf-b3b8-ea0f4f092b3b
Line Numbers                  

Raw Audit Messages            

avc: denied { search } for comm=sendmail dev=sda2 egid=51 euid=0
exe=/usr/sbin/sendmail.sendmail exit=-13 fsgid=51 fsuid=0 gid=0 items=0 name
=spamass-milter pid=7147 scontext=system_u:system_r:sendmail_t:s0 sgid=51
subj=system_u:system_r:sendmail_t:s0 suid=0 tclass=dir
tcontext=system_u:object_r:spamd_var_run_t:s0 tty=pts7 uid=0


Summary
    SELinux is preventing /usr/sbin/sendmail.sendmail (sendmail_t) "getattr" to
    /var/run/spamass-milter (spamd_var_run_t).

Detailed Description
    SELinux denied access requested by /usr/sbin/sendmail.sendmail. It is not
    expected that this access is required by /usr/sbin/sendmail.sendmail and
    this access may signal an intrusion attempt. It is also possible that the
    specific version or configuration of the application is causing it to
    require additional access.

Allowing Access
    Sometimes labeling problems can cause SELinux denials.  You could try to
    restore the default system file context for /var/run/spamass-milter,
    restorecon -v /var/run/spamass-milter If this does not work, there is
    currently no automatic way to allow this access. Instead,  you can generate
    a local policy module to allow this access - see
    http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385 Or you can disable
    SELinux protection altogether. Disabling SELinux protection is not
    recommended. Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi
    against this package.

Additional Information        

Source Context                system_u:system_r:sendmail_t:s0
Target Context                system_u:object_r:spamd_var_run_t:s0
Target Objects                /var/run/spamass-milter [ dir ]
Affected RPM Packages         sendmail-8.14.2-1.fc8 [application]spamass-
                              milter-0.3.1-5.fc8 [target]
Policy RPM                    selinux-policy-3.0.8-62.fc8
Selinux Enabled               True
Policy Type                   targeted
MLS Enabled                   True
Enforcing Mode                Enforcing
Plugin Name                   plugins.catchall_file
Host Name                     linux.cdkkt.com
Platform                      Linux linux.cdkkt.com 2.6.23.8-63.fc8 #1 SMP Wed
                              Nov 21 18:51:08 EST 2007 i686 i686
Alert Count                   3
First Seen                    Mon 10 Dec 2007 11:02:42 AM PST
Last Seen                     Mon 10 Dec 2007 11:03:30 AM PST
Local ID                      55aa49d1-3ea7-4e6a-80a6-087c37eaf2ba
Line Numbers                  

Raw Audit Messages            

avc: denied { getattr } for comm=sendmail dev=sda2 egid=51 euid=0
exe=/usr/sbin/sendmail.sendmail exit=-13 fsgid=51 fsuid=0 gid=0 items=0
path=/var/run/spamass-milter pid=7147 scontext=system_u:system_r:sendmail_t:s0
sgid=51 subj=system_u:system_r:sendmail_t:s0 suid=0 tclass=dir
tcontext=system_u:object_r:spamd_var_run_t:s0 tty=pts7 uid=0
===============================================================================

No virus found in this outgoing message.
Checked by AVG Free Edition. 
Version: 7.5.503 / Virus Database: 269.16.17/1179 - Release Date: 12/9/2007 11:06 AM
 

-- 
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux