Hi, I am using fetchmail as root to collect emails. fetchmail is launched by systemd through a fetchmail.service (see below) The /etc/fetchmail.conf file contains a list as poll mail.server.com with interval 1 protocol imap port 993 username "user" password "pass" is name@xxxxxxxxxx ssl keep ; As a result I have the following selinux messages (sealert below): time->Sun Jan 11 13:07:33 2015 type=AVC msg=audit(1420978053.531:434): avc: denied { write } for pid=820 comm="fetchmail" scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 tclass=key permissive=1 ---- time->Sun Jan 11 13:07:33 2015 type=AVC msg=audit(1420978053.531:435): avc: denied { read } for pid=820 comm="fetchmail" scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 tclass=key permissive=1 ---- time->Sun Jan 11 13:07:33 2015 type=AVC msg=audit(1420978053.531:436): avc: denied { view } for pid=820 comm="fetchmail" scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 tclass=key permissive=1 What can I do to have a more useful information to solve this problem? Actually this is the last AVC appearing in my logs and I want to solve it before changing the permissive mode to enforcing. -------------------------------------------------------------------------------- [Unit] Description=Mail Retrieval Agent After=network.target [Service] PermissionsStartOnly=true ExecStart=/usr/bin/fetchmail --daemon 600 -f /etc/fetchmail.conf --syslog --nobounce ExecStop=/usr/bin/fetchmail --quit Restart=always Type=simple [Install] WantedBy=multi-user.target -------------------------------------------------------------------------------- SELinux is preventing fetchmail from read access on the key Unknown. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that fetchmail should be allowed read access on the Unknown key by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep fetchmail /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:fetchmail_t:s0 Target Context system_u:system_r:fetchmail_t:s0 Target Objects Unknown [ key ] Source fetchmail Source Path fetchmail Port <Unknown> Host <Unknown> Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-103.fc21.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name hostname.domain.com Platform Linux hostname.domain.com 3.17.8-300.fc21.x86_64 #1 SMP Thu Jan 8 23:32:49 UTC 2015 x86_64 x86_64 Alert Count 238 First Seen 2015-01-06 09:08:52 CET Last Seen 2015-01-11 13:07:33 CET Local ID 158da9a2-8097-4c28-a055-98bee6b61498 Raw Audit Messages type=AVC msg=audit(1420978053.531:435): avc: denied { read } for pid=820 comm="fetchmail" scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 tclass=key permissive=1 Hash: fetchmail,fetchmail_t,fetchmail_t,key,read -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/selinux