Re: Help Please with SELinux fail report

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/18/2011 03:02 AM, Ken Smith wrote:
> Hi, I have a fair idea on using SELinux but I'd appreciate some
> guidance with a fail message I'm getting. Full message is
> appended.
> 
> Its from a Centos 5 system running the MythTV application. Part of
> that application uses ffmpeg to convert a video file (in
> /mnt/store) to .flv format and streams it using flowplayer to be
> viewed in remote web browser session. The application pipes the
> .flv output from ffmpeg via /dev/stdout
> 
> Any guidance most welcome.
> 
> Thanks
> 
> Ken
> 
> Reject Message is below
> 
> sealert -l 9c08728b-42e7-4836-857d-662884998dee
> 
> Summary:
> 
> SELinux is preventing the mythweb.pl from using potentially
> mislabeled files / (mnt_t).
> 
> Detailed Description:
> 
> SELinux has denied the mythweb.pl access to potentially mislabeled
> files /. This means that SELinux will not allow httpd to use these
> files. Many third party apps install html files in directories that
> SELinux policy cannot predict. These directories have to be labeled
> with a file context which httpd can access.
> 
> Allowing Access:
> 
> If you want to change the file context of / so that the httpd
> daemon can access it, you need to execute it using chcon -t
> httpd_sys_content_t '/'. You can look at the httpd_selinux man page
> for additional information.
> 
> Additional Information:
> 
> Source Context                root:system_r:httpd_sys_script_t 
> Target Context                system_u:object_r:mnt_t Target
> Objects                / [ dir ] Source
> mythweb.pl Source Path                   /usr/bin/perl Port
> <Unknown> Host                          ************************ 
> Source RPM Packages           perl-5.8.8-32.el5_6.3 Target RPM
> Packages           filesystem-2.4.0-3.el5.centos Policy RPM
> selinux-policy-2.4.6-300.el5_6.1 Selinux Enabled
> True Policy Type                   targeted MLS Enabled
> True Enforcing Mode                Enforcing Plugin Name
> httpd_bad_labels Host Name                     ************ 
> Platform                      Linux*********** 
> 2.6.18-238.12.1.el5.centos.plus #1 SMP Wed Jun 1 11:12:25 EDT 2011
> x86_64 x86_64 Alert Count                   2 First Seen
> Thu Oct 13 12:19:53 2011 Last Seen                     Thu Oct 13
> 12:19:53 2011 Local ID
> 9c08728b-42e7-4836-857d-662884998dee Line Numbers
> 
> Raw Audit Messages
> 
> host=knetgate.kensnet.org type=AVC
> msg=audit(1318504793.669:894697): avc:  denied  { search } for
> pid=8468 comm="mythweb.pl" name="/" dev=dm-1 ino=2
> scontext=root:system_r:httpd_sys_script_t:s0 
> tcontext=system_u:object_r:mnt_t:s0 tclass=dir
> 
> host=knetgate.kensnet.org type=SYSCALL
> msg=audit(1318504793.669:894697): arch=c000003e syscall=4
> success=no exit=-13 a0=1f5f79e0 a1=1f45e140 a2=1f45e140
> a3=3132323130 items=0 ppid=12664 pid=8468 auid=0 uid=48 gid=48
> euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) 
> ses=960 comm="mythweb.pl" exe="/usr/bin/perl" 
> subj=root:system_r:httpd_sys_script_t:s0 key=(null)
> 

If you are going to store apache content on the /mnt directory you
need to add rules to allow apache to search through the mnt_t directory

Easiest way to do this is by creating a policy module


# grep mnt_t /var/log/audit/audit.log | audit2allow -R -M myapache
# semodule -i myappache.pp

Not you might end up also needing a getattr access.  If so you could
run these commands above again or simply editit the myapache.te file
created and change the line

allow httpd_sys_script_t mnt_t:dir search;

To

allow httpd_sys_script_t mnt_t:dir search_dir_perms;

THen execute

# make -f /usr/share/selinux/devel/Makefile
# semodule -i myapache.pp
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk6gJKUACgkQrlYvE4MpobPrIACeNeGor+ymZp6VsCArxxDQoBdk
WgEAn2m3RVDBuRMo22nafXPwjsjklejc
=i8f2
-----END PGP SIGNATURE-----

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux