On Sat, 10 Jul 2004 17:23, Richard Hally <rhallyx@xxxxxxxxxxxxxx> wrote: > When booting in enforcing mode with the latest strict > policy(selinux-policy-strict-sources-1.14.1-5) > the following avc denied message is produced. > > Jul 10 03:12:02 new2 network: Bringing up interface eth0: succeeded > Jul 10 03:12:04 new2 kernel: audit(1089443524.677:0): avc: denied { > name_bind > } for pid=2016 exe=/usr/bin/mDNSResponder scontext=user_u:user_r:user_t > tcontext=system_u:object_r:dns_port_t tclass=udp_socket What is this /usr/bin/mDNSResponder and where do I find an RPM for it? Binding to port 53 is an operation for a daemon, why is it happening in user_r:user_t? -- http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/ Postal SMTP/POP benchmark http://www.coker.com.au/~russell/ My home page