Re: repost: SELinux questions, upon restarting BIND

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



I am hesitant to offer suggestions for RHELv5 selinux since I haven't
spent any time playing with it but would definitely recommend that you
join the selinux list...

https://www.redhat.com/mailman/listinfo/fedora-selinux-list

where you will get definitive and correct answers to selinux issues

Craig

On Fri, 2007-08-17 at 09:16 -0400, Ray Leventhal wrote:
> As this remains an issue for me, I'm reposting.  Please forgive the redundancy, but I've been unable to find the answer and am hoping for some guidance.
> 
> Thanks in advance,
> ~Ray
> 
> ==========Original Posts follow==========
> (full output is in the original thread)
> 
> Ray Leventhal wrote:
> 
> > > Hi all,
> > >
> > > On my newly up-and-running nameserver (CentOS 5), I noticed the
> > > following alerts in /var/log/messages after restarting BIND.  (lines
> > > inserted to aid in reading).
> > > As I'm new to SELinux, I'm hoping for some pointers on 1) if this is an
> > > issue which simply *must* be addressed, or if it's something I should
> > > live with, and 2) how to eliminate the warming messages without
> > > sacrificing SELinux protections.  The system does not have X installed,
> > > so 'setroubleshoot' isn't an option (unless there's a text equivalent).
> > >
> > > Thanks in advance for any opinions/suggestions/enlightenments  :) 
> > >
> > > ~Ray
> > >
> > > =============================================
> > > Aug 16 07:12:23 sunspot setroubleshoot:      SELinux is preventing
> > > /usr/sbin/named (named_t) "getattr" access to /dev/random
> > > (tmpfs_t).      For complete SELinux messages. run sealert -l
> > > 1ab129b8-9f9f-48ae-a67e-d52f63a5fb5a
> > > =============================================
> > > Aug 16 07:12:23 sunspot setroubleshoot:      SELinux is preventing
> > > /usr/sbin/named (named_t) "read" access to random (tmpfs_t).      For
> > > complete SELinux messages. run sealert -l
> > > b7014747-0d8d-443e-8b9a-af868976452d
> > > =============================================
> > >   
> >   
> <big output snip>
> Update:
> 
> A bit of searching found a thread which pointed here:
> http://www.webservertalk.com/message1323968.html
> 
> This is a talk about Bind 9.x on RHEL4, but I think it applies to C5 as
> well as the issue is SELinux and chrooted BIND implementations.
> 
> Problem is, I'm still not sure what should be done.  I'd rather not
> disable SELinux protection  by doing this:
> 
> setsebool -P named_disable_trans=1
> 
> ...but the instructions for alerting SELinux to the chrooted file locations are a bit short of my (inexperienced) needs.
> 
> Any help would be greatly appreciated.  
> 
> @Moderator: if this is truly off-topic, my apologies.  Please let me know and I will post to an SELinux list.
> 
> TIA,
> ~Ray
> 
> 
> _______________________________________________
> CentOS mailing list
> CentOS@xxxxxxxxxx
> http://lists.centos.org/mailman/listinfo/centos
> 
> _______________________________________________
> CentOS mailing list
> CentOS@xxxxxxxxxx
> http://lists.centos.org/mailman/listinfo/centos
-- 
Craig White <craig@xxxxxxxxxxxxx>

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux