-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 06/05/2013 01:59 AM, Cristian Sava wrote: > On Tue, 2013-06-04 at 11:40 -0400, Daniel J Walsh wrote: >> On 06/04/2013 05:06 AM, Cristian Sava wrote: >>> I am trying to activate selinux for my mailserver. It is F19 >>> postfix_courier_amavisd-new_clamav_squirrelmail install in a virtual >>> environment. All needed is stock or was packaged on F19 (rpmbuild -ta >>> ... / rpmbuild -ba ...) and all is working fine (selinux disabled). No >>> tar.gz directly installed. I am trying to fix things one by one. Any >>> advice is welcome. When receiving a message selinux complain >>> (permissive): >>> >>> SELinux is preventing /usr/sbin/courierlogger from getattr access on >>> the file /var/spool/authdaemon/pid. >>> >>> ***** Plugin catchall (100. confidence) suggests >>> *************************** >>> >>> If you believe that courierlogger should be allowed getattr access on >>> the pid file by default. Then you should report this as a bug. You can >>> generate a local policy module to allow this access. Do allow this >>> access for now by executing: # grep courierlogger >>> /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp >>> >>> Additional Information: Source Context >>> system_u:system_r:courier_authdaemon_t:s0 Target Context >>> system_u:object_r:courier_spool_t:s0 Target Objects >>> /var/spool/authdaemon/pid [ file ] Source courierlogger Source Path >>> /usr/sbin/courierlogger Port <Unknown> Host >>> s198.domain.xx Source RPM Packages courier-authlib-0.65.0-1.fc19.x86_64 >>> Target RPM Packages courier-authlib-0.65.0-1.fc19.x86_64 Policy RPM >>> selinux-policy-3.12.1-47.fc19.noarch Selinux Enabled True >>> Policy Type targeted Enforcing Mode Permissive Host >>> Name s198.domain.xx Platform Linux s198.domain.xx >>> 3.9.4-300.fc19.x86_64 #1 SMP Fri May 24 22:17:06 UTC 2013 x86_64 x86_64 >>> Alert Count 7 First Seen 2013-05-30 16:35:05 EEST >>> Last Seen 2013-06-04 11:30:02 EEST Local ID >>> 469bd394-ddfb-454b-89e0-5ea40c2cf36b >>> >>> Raw Audit Messages type=AVC msg=audit(1370334602.277:26): avc: denied >>> { getattr } for pid=461 comm="courierlogger" >>> path="/var/spool/authdaemon/pid" dev="dm-1" ino=1193281 >>> scontext=system_u:system_r:courier_authdaemon_t:s0 >>> tcontext=system_u:object_r:courier_spool_t:s0 tclass=file >>> >>> >>> type=SYSCALL msg=audit(1370334602.277:26): arch=x86_64 syscall=fstat >>> success=yes exit=0 a0=3 a1=7fffc612b9d0 a2=7fffc612b9d0 a3=4 items=0 >>> ppid=1 pid=461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 >>> sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=courierlogger >>> exe=/usr/sbin/courierlogger >>> subj=system_u:system_r:courier_authdaemon_t:s0 key=(null) >>> >>> Hash: courierlogger,courier_authdaemon_t,courier_spool_t,file,getattr >>> >>> [cristi@s198 ~]$ getsebool -a | grep " on" auditadm_exec_content --> on >>> domain_fd_use --> on fips_mode --> on global_ssp --> on >>> gluster_export_all_rw --> on gssd_read_tmp --> on guest_exec_content >>> --> on httpd_builtin_scripting --> on httpd_can_network_connect --> on >>> httpd_can_network_connect_db --> on httpd_enable_cgi --> on >>> httpd_enable_homedirs --> on httpd_graceful_shutdown --> on >>> httpd_mod_auth_pam --> on httpd_sys_script_anon_write --> on >>> httpd_use_gpg --> on kerberos_enabled --> on >>> logging_syslogd_can_sendmail --> on login_console_enabled --> on >>> mcelog_exec_scripts --> on mount_anyfile --> on nfs_export_all_ro --> >>> on nfs_export_all_rw --> on nscd_use_shm --> on openvpn_enable_homedirs >>> --> on postfix_local_write_mail_spool --> on >>> postgresql_selinux_unconfined_dbadm --> on postgresql_selinux_users_ddl >>> --> on privoxy_connect_any --> on saslauthd_read_shadow --> on >>> secadm_exec_content --> on selinuxuser_direct_dri_enabled --> on >>> selinuxuser_execmod --> on selinuxuser_execstack --> on >>> selinuxuser_mysql_connect_enabled --> on selinuxuser_ping --> on >>> selinuxuser_rw_noexattrfile --> on selinuxuser_tcp_server --> on >>> spamassassin_can_network --> on spamd_enable_home_dirs --> on >>> squid_connect_any --> on staff_exec_content --> on sysadm_exec_content >>> --> on telepathy_tcp_connect_generic_network_ports --> on >>> unconfined_chrome_sandbox_transition --> on unconfined_login --> on >>> unconfined_mozilla_plugin_transition --> on user_exec_content --> on >>> virt_use_usb --> on xend_run_blktap --> on xend_run_qemu --> on >>> xguest_connect_network --> on xguest_exec_content --> on >>> xguest_mount_media --> on xguest_use_bluetooth --> on [cristi@s198 ~]$ >>> >>> Do I miss something obvious? >>> >>> C. Sava >>> >>> >> Why is courier storing pid files in /var/spool/authdaemon/pid? >> >> Current policy allows courier_authdaemon to create sock_files in this >> directory but not regular files. >> >> > That is beyond of me, but I think there may be a reason and I don't find > complains for it on forums. I think that it just have to work, with and > without selinux, it's the administrator's choice (without the need to > compile modules and so on, only an option needed). Courier is too well > known to be ignored and it is not something very special beast. > > C. Sava > > > > > Anyways Crhitian, I have added the allow rules to the base policy to allow this. You can do this for now by executing # grep courier /var/log/audit/audit.log | audit2allow -M mycourier # semodule -i mycourier.pp -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlGvQBQACgkQrlYvE4MpobOObgCgopB2FdvcJCDLwmzV8x8DhHmI /JUAoNGh9k8ijLJFgSh+9dFZIZqW1flC =vOEX -----END PGP SIGNATURE----- -- test mailing list test@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe: https://admin.fedoraproject.org/mailman/listinfo/test