Thanks Paul and Daniel: My procmail invocation is: :0fw * < 256000 | /usr/bin/spamassassin And I see that I'm missing the lock (:) on this one, so I think my comment about procmail writing a lockfile was in error. I looked into spamc as an alternative - seems to work without a problem. Thanks for the tip Paul. The OS is Fedora Core 5, which I've been (somewhat blindly) updating with yum (no extra configuration on yum - just running it out of the box). Yum never complained, so I did not suspect that the system was partially upgraded. To be explicit, I've not yet tried to upgrade to FC6 or FC7. For the record, current status is [root@parsnip ~]# rpm -qa | grep policy selinux-policy-2.3.7-2.fc5 selinux-policy-targeted-2.3.7-2.fc5 policycoreutils-1.30.10-2.fc5 I guess the urgency on this is pretty low now that I've got the filter up and running (via spamc). But I'm still curious as to what I would have to have done if spamc didn't exist. I'm concerned about how many more SELinux bullets I can dodge... :) >I'm rather green, and have had some trouble deciphering a lot of the >SELinux stuff. Any help would be great. I'm using procmail to filter >mail through spamassassin (SA), but SELinux appears to be interfering. I >say this because if I turn off enforcing, mail gets through properly >tagged by SA. With SELinux on, messages are not tagged by SA. The log >looks like this: > >Jun 26 23:07:51 parsnip kernel: audit(1182917271.036:1779): enforcing=1 >old_enforcing=0 auid=4294967295 >Jun 26 23:07:51 parsnip dbus: avc: received setenforce notice >(enforcing=1) >Jun 26 23:08:04 parsnip kernel: audit(1182917284.795:1780): avc: denied >{ search } for pid=28116 comm="spamassassin" name="tmp" dev=sda3 >ino=26738689 scontext=user_u:system_r:procmail_t:s0 >tcontext=system_u:object_r:tmp_t:s0 tclass=dir > >My (rather ignorant) read is that procmail_t and tmp_t are not matching >(procmail does try to write a lockfile). And what I have gleaned is that >I either need some sort of rule that somehow matches these two, or I need >to change some tags (on my /tmp directory?) to allow this to proceed. > >Am I anywhere near the ballpark? I tried audit2why to decipher this, but >it complained that it didn't understand policies outside of the range >15-20. Audit2allow returns > > allow procmail_t tmp_t:di search; > >But I'm not sure what to do with it... > >Thanks in advance for any help! > >- Lowell -- fedora-selinux-list mailing list fedora-selinux-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-selinux-list