Openvpn and Selinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

In my F10 installation selinux seems to prevent working openvpn. After
connection openvpn wants to modify /etc/resolv.conf that is not
allowed I think.

I start openvpn by the command

[root@~]# /etc/init.d/openvpn start

and I get selinux messages like this:

---
Summary:
SELinux is preventing cp (openvpn_t) "write" to ./etc (etc_t).
Detailed Description:
SELinux is preventing cp (openvpn_t) "write" to ./etc (etc_t). The SELinux type
etc_t, is a generic type for all files in the directory and very few processes
(SELinux Domains) are allowed to write to this SELinux type. This type of denial
usual indicates a mislabeled file. By default a file created in a directory has
the gets the context of the parent directory, but SELinux policy has rules about
the creation of directories, that say if a process running in one SELinux Domain
(D1) creates a file in a directory with a particular SELinux File Context (F1)
the file gets a different File Context (F2). The policy usually allows the
SELinux Domain (D1) the ability to write, unlink, and append on (F2). But if for
some reason a file (./etc) was created with the wrong context, this domain will
be denied. The usual solution to this problem is to reset the file context on
the target file, restorecon -v './etc'. If the file context does not change from
etc_t, then this is probably a bug in policy. Please file a bug report
(http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against the selinux-policy
package. If it does change, you can try your application again to see if it
works. The file context could have been mislabeled by editing the file or moving
the file from a different directory, if the file keeps getting mislabeled, check
the init scripts to see if they are doing something to mislabel the file.

Allowing Access:
You can attempt to fix file context by executing restorecon -v './etc'
Fix Command:
restorecon './etc'
Additional Information:
Source Context                unconfined_u:system_r:openvpn_t:s0
Target Context                system_u:object_r:etc_t:s0
Target Objects                ./etc [ dir ]
Source                        cp
Source Path                   /bin/cp
Port                          <Unknown>
...
-
Summary:
SELinux is preventing dns.up (openvpn_t) "write" to ./resolv.conf (net_conf_t).
Detailed Description:
SELinux denied access requested by dns.up. It is not expected that this access
is required by dns.up and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

Allowing Access:
Sometimes labeling problems can cause SELinux denials. You could try to restore
the default system file context for ./resolv.conf,

restorecon -v './resolv.conf'

If this does not work, there is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:
Source Context                unconfined_u:system_r:openvpn_t:s0
Target Context                system_u:object_r:net_conf_t:s0
Target Objects                ./resolv.conf [ file ]
Source                        dns.up
Source Path                   /bin/bash
Port                          <Unknown>
...
-
Summary:
SELinux is preventing dns.up (openvpn_t) "write" openvpn_t.

Detailed Description:
SELinux denied access requested by dns.up. It is not expected that this access
is required by dns.up and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

Allowing Access:
You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:
Source Context                unconfined_u:system_r:openvpn_t:s0
Target Context                unconfined_u:system_r:openvpn_t:s0
Target Objects                pipe [ fifo_file ]
Source                        dns.up
Source Path                   /bin/bash
Port                          <Unknown>
...
-
Summary:
SELinux is preventing cut (openvpn_t) "getattr" openvpn_t.

Detailed Description:
SELinux denied access requested by cut. It is not expected that this access is
required by cut and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.

Allowing Access:
You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:
Source Context                unconfined_u:system_r:openvpn_t:s0
Target Context                unconfined_u:system_r:openvpn_t:s0
Target Objects                pipe [ fifo_file ]
Source                        dns.up
Source Path                   /bin/bash
Port                          <Unknown>
...
-
Summary:
SELinux is preventing cut (openvpn_t) "read" openvpn_t.

Detailed Description:
SELinux denied access requested by cut. It is not expected that this access is
required by cut and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.

Allowing Access:
You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:
Source Context                unconfined_u:system_r:openvpn_t:s0
Target Context                unconfined_u:system_r:openvpn_t:s0
Target Objects                pipe [ fifo_file ]
Source                        dns.up
Source Path                   /bin/bash
Port                          <Unknown>
...
-
Summary:
SELinux is preventing dns.up (openvpn_t) "append" to ./resolv.conf (net_conf_t).

Detailed Description:
SELinux denied access requested by dns.up. It is not expected that this access
is required by dns.up and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

Allowing Access:
Sometimes labeling problems can cause SELinux denials. You could try to restore
the default system file context for ./resolv.conf,

restorecon -v './resolv.conf'

If this does not work, there is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:
Source Context                unconfined_u:system_r:openvpn_t:s0
Target Context                system_u:object_r:net_conf_t:s0
Target Objects                ./resolv.conf [ file ]
Source                        dns.up
Source Path                   /bin/bash
Port                          <Unknown>
...

---

How could I enable openvpn to work without disabling selinux?
Zoltan

-- 
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux