Re: SEL & Spamassassin

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 2011-06-11 at 15:47 +0200, Dominick Grift wrote:
> 
> On Sat, 2011-06-11 at 14:40 +0100, Arthur Dent wrote:
> 
> > The other slightly odd thing is that when I place the system back into
> > Enforcing mode I get no AVCs, but some of the Spamassassin checks
> > (Especially iXhash I think) don't seem to be run, but give no errors.
> 
> Try to reproduce it after you ran : semodule -DB
> 
> semodule -DB loads the policy with any rules to silently deny access
> removed.
> 
> Then see for AVC denials again.
> 
> After checking do : semodule -B to load the policy with the rules to
> silently deny access re-inserted

OK I'll try that..

> 
> > Anyway, the above AVC looked strange and I didn't want to create a local
> > policy module for it until I had checked with the chaps here...
> 
> This does not look particularly strange. The pipe is probably created by
> systemd.

So, should I create a policy module to allow it?

I guess the "ask-password" bit of "SELinux is preventing /bin/systemd-tty-ask-password-agent from read access on the fifo_file 136:0."
worried me a bit...


Attachment: signature.asc
Description: This is a digitally signed message part

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux