denial even with appropriate allow rules

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I'm helping a co-worker with a policy problem.  In permissive he gets a
couple denials:

type=AVC msg=audit(1272049866.598:32539): avc:  denied  { send_msg } for
saddr=192.168.99.128 src=32786 daddr=192.168.99.1 dest=22 netif=eth0
scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:ssh_port_t
tclass=tcp_socket

type=AVC msg=audit(1272049866.598:32540): avc:  denied  { recv_msg } for
saddr=192.168.99.1 src=22 daddr=192.168.99.128 dest=32786 netif=eth0
scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:ssh_port_t
tclass=tcp_socket

I've checked his source policy and even checked the policy.18 file on
his target machine, they both show:

Allow sshd_t ssh_port_t : tcp_socket { recv_msg send_msg ... };

The only time I've seen it ignore networking policy was when I was doing
it the old (pre-secmark) way but forgot to put selinux_compat_net=1 on
the kernel line.  His kernel version is 2.6.9 so this should predate
secmark and need no flag, correct?  There is no /selinux/compat_net file
on the machine so I assume it should just work.

This is a fairly old and well "customized" policy, if that matters.  


Any ideas?

Dave Thomson


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux