Correct way to handle SELinux for a systemd-started SSH VPN

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I am starting an SSH VPN connection with a systemd service.  It's just a
simple service, with an ExecStart to run ssh.  If I wrap it with a shell
(ExecStart=/bin/sh -c "/usr/bin/ssh %i"), it runs; if I take out the
shell wrap (ExecStart=/usr/bin/ssh %i), it fails due to SELinux not
allowing it.  If I set permissive mode, there's a whole lot of different
things that init_t is not allowed to do. :)

So obviously I can just run with the shell wrapper, but is there a more
proper way to do this?
-- 
Chris Adams <linux@xxxxxxxxxxx>
_______________________________________________
selinux mailing list -- selinux@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to selinux-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/selinux@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux