setkey ipsec no avc's message

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



when starting ipsec, there is a daemon
or I can run /usr/sbin/setkey. at the moment I've disabled
setkey daemon at boot up, and am using the manual
approach. when issuing setkey -f /etc/ipsec-tools.conf
the file does go into the SDP entry without any issues,
 but also leaves avc's in dmesg. (below);

[  157.919674] type=1415 audit(1221168887.813:5): op=SAD-add
auid=4294967295 ses=4294967295 subj=a-12:sysadm_r:sysadm_t
src=10.0.0.8 dst=10.0.0.5 spi=512(0x200) res=1
[  157.919714] type=1300 audit(1221168887.813:5): arch=40000003
syscall=102 success=yes exit=120 a0=9 a1=bfee55b0 a2=805a6d0 a3=20
items=0 ppid=3830 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=4294967295 comm="setkey"
exe="/usr/sbin/setkey" subj=a-12:sysadm_r:sysadm_t key=(null)
[  157.919907] type=1415 audit(1221168887.873:6): op=SAD-add
auid=4294967295 ses=4294967295 subj=a-12:sysadm_r:sysadm_t
src=10.0.0.5 dst=10.0.0.8 spi=768(0x300) res=1
[  157.919936] type=1300 audit(1221168887.873:6): arch=40000003
syscall=102 success=yes exit=120 a0=9 a1=bfee55b0 a2=805a7a0 a3=20
items=0 ppid=3830 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=4294967295 comm="setkey"
exe="/usr/sbin/setkey" subj=a-12:sysadm_r:sysadm_t key=(null)
[  157.997476] type=1415 audit(1221168887.873:7): op=SAD-add
auid=4294967295 ses=4294967295 subj=a-12:sysadm_r:sysadm_t
src=10.0.0.8 dst=10.0.0.5 spi=513(0x201) res=1
[  157.997518] type=1300 audit(1221168887.873:7): arch=40000003
syscall=102 success=yes exit=128 a0=9 a1=bfee55b0 a2=805a880 a3=20
items=0 ppid=3830 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=4294967295 comm="setkey"
exe="/usr/sbin/setkey" subj=a-12:sysadm_r:sysadm_t key=(null)
[  157.997717] type=1415 audit(1221168887.953:8): op=SAD-add
auid=4294967295 ses=4294967295 subj=a-12:sysadm_r:sysadm_t
src=10.0.0.5 dst=10.0.0.8 spi=769(0x301) res=1
[  157.997745] type=1300 audit(1221168887.953:8): arch=40000003
syscall=102 success=yes exit=128 a0=9 a1=bfee55b0 a2=805a978 a3=20
items=0 ppid=3830 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=4294967295 comm="setkey"
exe="/usr/sbin/setkey" subj=a-12:sysadm_r:sysadm_t key=(null)
[  157.997940] type=1415 audit(1221168887.953:9): op=SPD-add
auid=4294967295 ses=4294967295 subj=a-12:sysadm_r:sysadm_t res=1
src=10.0.0.8 dst=10.0.0.5
[  157.997968] type=1300 audit(1221168887.953:9): arch=40000003
syscall=102 success=yes exit=112 a0=9 a1=bfee3550 a2=ffffffff
a3=805ab70 items=0 ppid=3830 pid=3916 auid=4294967295 uid=0 gid=0
euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=4294967295
comm="setkey" exe="/usr/sbin/setkey" subj=a-12:sysadm_r:sysadm_t
key=(null)

When using audit2allow -d
there is a message of: No AVC's found.
Anyways not sure if this is good or bad...
thaught it would be better to post than to not at all.
Besides that ipsec seems to be running nicely, with the policy
in enforcing mode.
regards;

-- 
Justin P. Mattock

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux