On 01/12/2015 11:25 AM, Glandvador wrote: > Thanks. > > Should I still open a bugzilla entry or not? After all I am not using > rawhide, but f21 :) > Yes, that way you can get it back ported. > On 12.01.2015 14:22, Daniel J Walsh wrote: >> I just added >> >> allow fetchmail_t self:key manage_key_perms; >> >> to git in Rawhide. This should fix the problem. >> >> It is always good to open a bugzilla on issues like this. >> >> On 01/11/2015 08:00 AM, Gland Vador wrote: >>> Hi, >>> >>> I am using fetchmail as root to collect emails. >>> >>> fetchmail is launched by systemd through a fetchmail.service (see >>> below) >>> >>> The /etc/fetchmail.conf file contains a list as >>> poll mail.server.com with >>> interval 1 >>> protocol imap port 993 >>> username "user" password "pass" is name@xxxxxxxxxx >>> ssl >>> keep >>> ; >>> >>> As a result I have the following selinux messages (sealert below): >>> >>> time->Sun Jan 11 13:07:33 2015 >>> type=AVC msg=audit(1420978053.531:434): avc: denied { write } for >>> pid=820 comm="fetchmail" scontext=system_u:system_r:fetchmail_t:s0 >>> tcontext=system_u:system_r:fetchmail_t:s0 tclass=key permissive=1 >>> ---- >>> time->Sun Jan 11 13:07:33 2015 >>> type=AVC msg=audit(1420978053.531:435): avc: denied { read } for >>> pid=820 comm="fetchmail" scontext=system_u:system_r:fetchmail_t:s0 >>> tcontext=system_u:system_r:fetchmail_t:s0 tclass=key permissive=1 >>> ---- >>> time->Sun Jan 11 13:07:33 2015 >>> type=AVC msg=audit(1420978053.531:436): avc: denied { view } for >>> pid=820 comm="fetchmail" scontext=system_u:system_r:fetchmail_t:s0 >>> tcontext=system_u:system_r:fetchmail_t:s0 tclass=key permissive=1 >>> >>> What can I do to have a more useful information to solve this >>> problem? Actually this is the last AVC appearing in my logs and I >>> want to solve it before changing the permissive mode to enforcing. >>> >>> -------------------------------------------------------------------------------- >>> >>> [Unit] >>> Description=Mail Retrieval Agent >>> After=network.target >>> >>> [Service] >>> PermissionsStartOnly=true >>> ExecStart=/usr/bin/fetchmail --daemon 600 -f /etc/fetchmail.conf >>> --syslog --nobounce >>> ExecStop=/usr/bin/fetchmail --quit >>> Restart=always >>> Type=simple >>> >>> [Install] >>> WantedBy=multi-user.target >>> >>> -------------------------------------------------------------------------------- >>> >>> >>> SELinux is preventing fetchmail from read access on the key Unknown. >>> >>> ***** Plugin catchall (100. confidence) suggests >>> ************************** >>> >>> If you believe that fetchmail should be allowed read access on the >>> Unknown key by default. >>> Then you should report this as a bug. >>> You can generate a local policy module to allow this access. >>> Do >>> allow this access for now by executing: >>> # grep fetchmail /var/log/audit/audit.log | audit2allow -M mypol >>> # semodule -i mypol.pp >>> >>> >>> Additional Information: >>> Source Context system_u:system_r:fetchmail_t:s0 >>> Target Context system_u:system_r:fetchmail_t:s0 >>> Target Objects Unknown [ key ] >>> Source fetchmail >>> Source Path fetchmail >>> Port <Unknown> >>> Host <Unknown> >>> Source RPM Packages >>> Target RPM Packages >>> Policy RPM selinux-policy-3.13.1-103.fc21.noarch >>> Selinux Enabled True >>> Policy Type targeted >>> Enforcing Mode Permissive >>> Host Name hostname.domain.com >>> Platform Linux hostname.domain.com >>> 3.17.8-300.fc21.x86_64 #1 >>> SMP Thu Jan 8 23:32:49 UTC 2015 >>> x86_64 x86_64 >>> Alert Count 238 >>> First Seen 2015-01-06 09:08:52 CET >>> Last Seen 2015-01-11 13:07:33 CET >>> Local ID 158da9a2-8097-4c28-a055-98bee6b61498 >>> >>> Raw Audit Messages >>> type=AVC msg=audit(1420978053.531:435): avc: denied { read } for >>> pid=820 comm="fetchmail" scontext=system_u:system_r:fetchmail_t:s0 >>> tcontext=system_u:system_r:fetchmail_t:s0 tclass=key permissive=1 >>> >>> >>> Hash: fetchmail,fetchmail_t,fetchmail_t,key,read >>> >>> >>> >>> >>> >>> >>> -- >>> selinux mailing list >>> selinux@xxxxxxxxxxxxxxxxxxxxxxx >>> https://admin.fedoraproject.org/mailman/listinfo/selinux >>> >>> > > -- > selinux mailing list > selinux@xxxxxxxxxxxxxxxxxxxxxxx > https://admin.fedoraproject.org/mailman/listinfo/selinux -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/selinux