F9: Problems with named logging files

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have not been able to solve this issue but was able to 'get around' it via F8.

Below is the named.conf, just for the logging group:
=========================================
logging {
   channel my_syslog { file "/var/log/named/named.log" versions 25;
       severity info;
       print-category yes;
       print-time yes;
   };
   channel my_lame { file "/var/log/named/lame.log" versions 25;
       severity info;
       print-category yes;
       print-time yes;
//        size 50M;
   };
   channel my_xfer { file "/var/log/named/xfer.log" versions 25;
       severity info;
       print-category yes;
       print-time yes;
//        size 50M;
   };
   channel my_update { file "/var/log/named/named.update" versions 25;
       severity info;
       print-category yes;
       print-time yes;
//        size 50M;
   };
   channel my_db { file "/var/log/named/db.log" versions 25;
       severity info;
       print-category yes;
       print-time yes;
//        size 50M;
   };
   channel my_query { file "/var/log/named/query.log" versions 25;
       severity info;
       print-category yes;
       print-time yes;
//        size 50M;
   };
   channel my_security { file "/var/log/named/security.log" versions 99;
       severity info;
       print-category yes;
       print-time yes;
//        size 50M;
   };
   channel my_debug { file "/var/log/named/named.debug" versions 20;
       severity dynamic;
       print-category yes;
       print-time yes;
//        size 50M;
   };

   category security { my_security; };
   category default { my_syslog; };
   category queries { my_query; };
   category lame-servers { my_lame; };
   category update { my_update; };
//    category db { my_db; };
   category xfer-in { my_xfer; };
   category xfer-out { my_xfer; };
//    category packet { null; };
//    category eventlib { my_syslog; };

};
=========================================
Please note that the pathname is chrooted and is actually
found in: /var/named/chroot/var/log/named and the files
are initially set there with proper context of named_log_t
and the directory permissions set with user named with
access and context set accordingly.

Below is the selinux complaint:
=========================================
From: /var/log/messages:
-------------------------------
Jul 9 18:43:27 bronze named[10903]: unable to rename log file '/var/log/named/named.log' to '/var/log/named/named.log.0': permission denied Jul 9 18:43:27 bronze setroubleshoot: SELinux is preventing named (named_t) "write" to ./named (named_conf_t). For complete SELinux messages. run sealert -l ebd583dd-e96e-49ad-b6ce-72eda7273b09

# sealert -l ebd583dd-e96e-49ad-b6ce-72eda7273b09
=========================================
Summary:

SELinux is preventing named (named_t) "write" to ./named (named_conf_t).

Detailed Description:

SELinux denied access requested by named. It is not expected that this access is required by named and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.

Allowing Access:

Sometimes labeling problems can cause SELinux denials. You could try to restore
the default system file context for ./named,

restorecon -v './named'

If this does not work, there is currently no automatic way to allow this access. Instead, you can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:

Source Context                unconfined_u:system_r:named_t:s0
Target Context                system_u:object_r:named_conf_t:s0
Target Objects                ./named [ dir ]
Source                        named
Source Path                   /usr/sbin/named
Port                          <Unknown>
Host                          bronze.cdkkt.com
Source RPM Packages           bind-9.5.0-32.rc1.fc9
Target RPM Packages Policy RPM selinux-policy-3.3.1-74.fc9
Selinux Enabled               True
Policy Type                   targeted
MLS Enabled                   True
Enforcing Mode                Enforcing
Plugin Name                   catchall_file
Host Name                     bronze.cdkkt.com
Platform Linux bronze.cdkkt.com 2.6.25.9-76.fc9.i686 #1 SMP
                             Fri Jun 27 16:14:35 EDT 2008 i686 i686
Alert Count                   1
First Seen                    Wed Jul  9 18:43:27 2008
Last Seen                     Wed Jul  9 18:43:27 2008
Local ID                      ebd583dd-e96e-49ad-b6ce-72eda7273b09
Line Numbers Raw Audit Messages host=bronze.cdkkt.com type=AVC msg=audit(1215654207.611:139): avc: denied { write } for pid=10904 comm="named" name="named" dev=sda6 ino=2023442 scontext=unconfined_u:system_r:named_t:s0 tcontext=system_u:object_r:named_conf_t:s0 tclass=dir

host=bronze.cdkkt.com type=SYSCALL msg=audit(1215654207.611:139): arch=40000003 syscall=38 success=no exit=-13 a0=b547a4e8 a1=b7ee488a a2=4932fc a3=b7ee488a items=0 ppid=10902 pid=10904 auid=500 uid=25 gid=25 euid=25 suid=25 fsuid=25 egid=25 sgid=25 fsgid=25 tty=(none) ses=2 comm="named" exe="/usr/sbin/named" subj=unconfined_u:system_r:named_t:s0 key=(null)
=========================================

I have tried changing the context, permissions, restorecon and nothing seemed to help.

Advice please?

Thanks!
Dan

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux