[CentOS] Defaults of CentOS Install not working with SELinux

Andrew Colin Kissa andrew at topdog.za.net
Thu Apr 30 16:11:09 UTC 2009


The audit.log should contain more detail than is being provided here,  
if it is a unix socket you should see the path, i suspect it is the  
unix socket not the tcp sockets (pop3/imap)


On 30 Apr 2009, at 4:50 PM, Dan Roberts wrote:

> Ok, but how?
>
> There appear to be a lot of different options when employing  
> audit2allow and I am reluctant to start blazing away trying  
> different elements.  I am missing the details of what socket an dhow  
> the execution is occuring so that I can begin to develop the proper  
> audit2allow sequence.
>
>
>
>
> On Apr 30, 2009, at 8:43 AM, Andrew Colin Kissa wrote:
>
>> Hi
>>
>> Dovecot is trying to open a socket, and procmail is trying to  
>> execute spamc, You should be able to fix these issues using  
>> audit2allow.
>>
>> Andrew.
>>
>> On 30 Apr 2009, at 4:07 PM, Dan Roberts wrote:
>>
>>> Following a hard drive corruption I have reinstalled the latest  
>>> version of CentOS and all current patch files.
>>>
>>> For most applications I selected the default options.  By doing  
>>> this I expected that the packages would play nice with one another  
>>> and I could customize as necessary.
>>>
>>> Setting SELinux to enforce I encountered all sorts of problems -  
>>> but most were resolvable, save for Dovecot, Procmail (for spamc),  
>>> and an odd one with Apache.
>>>
>>> Given that these were all installed with the CentOS install  
>>> defaults, I can't believe I am the only one with these issues but  
>>> finding a solution has not been self evident.  Hoping someone here  
>>> can help.
>>>
>>> For Dovecot I get the following:
>>> 	SELinux is preventing dovecot (dovecot_t) "create" to <Unknown>  
>>> (dovecot_t). For complete SELinux messages. run sealert -l  
>>> e1b070ab-586a-4c5a-befe-b6a46b9ab992
>>>
>>> For procmail I get the following:
>>> 	SELinux is preventing procmail (procmail_t) "execute" to ./spamc  
>>> (spamc_exec_t). For complete SELinux messages. run sealert -l  
>>> 0a554689-4948-4edf-9964-dddbfe6a2492
>>> 	SELinux is preventing sh (procmail_t) "read" to ./spamc  
>>> (spamc_exec_t). For complete SELinux messages. run sealert -l  
>>> 1f1ebd83-412d-4e93-a36f-6f3d34c663df
>>>
>>> For Apache it's even more strange - When started I get:
>>> 	Syntax error on line 283 of /etc/httpd/conf/httpd.conf
>>> 	DocumentRoot must be  directory
>>>
>>> But it is a directory, has the correct permissions and I have even  
>>> run chcon -R -h -t httpd_sys_content_t /web/www/ in an effort to  
>>> correct the problem.  I run a virtual server too, and in trying to  
>>> find a fix for this that may be a problem - but first things first.
>>>
>>> All the other issues I had I could resolve when I ran the  
>>> specified "sealert" tag and followed the suggested instructions -  
>>> but those above don't budge.  When I go to the fedora.redhat.com/ 
>>> docs/selinux-fq-fc5 site to take on making a local policy module I  
>>> am quickly getting lost .   The option to simply disable SElinux  
>>> with respect to Apache, Dovecote or anything else is suggested -  
>>> but not something I see in the GUI window, and I have not figured  
>>> out how to do it from the command line.
>>>
>>> Again, because these are default packages, I hope that someone  
>>> else knows how to resolve these.
>>>
>>> With respect to the to reports from SELinux regarding Dovecot and  
>>> promail, here is a bit more info:
>>>
>>> The info and Raw Audit message for dovecot_t is:
>>> 	Source Context                system_u:system_r:dovecot_t:s0
>>> 	Target Context                system_u:system_r:dovecot_t:s0
>>> 	Target Objects                None [ socket ]
>>> 	Source                        dovecot
>>> 	Source Path                   /usr/sbin/dovecot
>>> 	Port                          <Unknown>
>>> 	Host                          trailrunner
>>> 	Source RPM Packages           dovecot-1.0.7-7.el5
>>> 	Target RPM Packages
>>> 	Policy RPM                    selinux-policy-2.4.6-203.el5
>>> 	Selinux Enabled               True
>>> 	Policy Type                   targeted
>>> 	MLS Enabled                   True
>>> 	Enforcing Mode                Enforcing
>>> 	Plugin Name                   catchall
>>> 	Host Name                     trailrunner
>>> 	Platform                      Linux trailrunner  
>>> 2.6.18-128.1.6.el5xen #1 SMP Wed
>>> 	                              Apr 1 10:38:05 EDT 2009 i686 athlon
>>> 	Alert Count                   2
>>> 	First Seen                    Wed Apr 29 15:39:51 2009
>>> 	Last Seen                     Wed Apr 29 15:47:31 2009
>>> 	Local ID                      e1b070ab-586a-4c5a-befe-b6a46b9ab992
>>> 	Line Numbers
>>>
>>> 	Raw Audit Messages
>>> 	host=trailrunner type=AVC msg=audit(1241041651.976:33): avc:   
>>> denied  { create } for  pid=3884 comm="dovecot"  
>>> scontext=system_u:system_r:dovecot_t:s0  
>>> tcontext=system_u:system_r:dovecot_t:s0 tclass=socket
>>> 	host=trailrunner type=SYSCALL msg=audit(1241041651.976:33):  
>>> arch=40000003 syscall=102 success=no exit=-13 a0=1 a1=bf851070  
>>> a2=9e45030 a3=3e1 items=0 ppid=3883 pid=3884 auid=4294967295 uid=0  
>>> gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none)  
>>> ses=4294967295 comm="dovecot" exe="/usr/sbin/dovecot"  
>>> subj=system_u:system_r:dovecot_t:s0 key=(null)
>>>
>>> The Raw Audit Message for Procmail is:
>>> 	Source Context                system_u:system_r:procmail_t:s0
>>> 	Target Context                system_u:object_r:spamc_exec_t:s0
>>> 	Target Objects                ./spamc [ file ]
>>> 	Source                        procmail
>>> 	Source Path                   /usr/bin/procmail
>>> 	Port                          <Unknown>
>>> 	Host                          trailrunner
>>> 	Source RPM Packages           procmail-3.22-17.1.el5.centos
>>> 	Target RPM Packages
>>> 	Policy RPM                    selinux-policy-2.4.6-203.el5
>>> 	Selinux Enabled               True
>>> 	Policy Type                   targeted
>>> 	MLS Enabled                   True
>>> 	Enforcing Mode                Enforcing
>>> 	Plugin Name                   catchall_file
>>> 	Host Name                     trailrunner
>>> 	Platform                      Linux trailrunner  
>>> 2.6.18-128.1.6.el5xen #1 SMP Wed
>>> 		                      Apr 1 10:38:05 EDT 2009 i686 athlon
>>> 	Alert Count                   29
>>> 	First Seen                    Wed Apr 29 15:40:40 2009
>>> 	Last Seen                     Wed Apr 29 16:25:40 2009
>>> 	Local ID                      0a554689-4948-4edf-9964-dddbfe6a2492
>>> 	Line Numbers
>>>
>>> 	Raw Audit Messages
>>> 	host=trailrunner type=AVC msg=audit(1241043940.918:166): avc:   
>>> denied  { execute } for  pid=3344 comm="procmail" name="spamc"  
>>> dev=dm-0 ino=18762675 scontext=system_u:system_r:procmail_t:s0  
>>> tcontext=system_u:object_r:spamc_exec_t:s0 tclass=file
>>> 	host=trailrunner type=SYSCALL msg=audit(1241043940.918:166):  
>>> arch=40000003 syscall=11 success=no exit=-13 a0=8ef1d90 a1=8ef1020  
>>> a2=8ef32d8 a3=1 items=0 ppid=3343 pid=3344 auid=4294967295 uid=0  
>>> gid=12 euid=0 suid=0 fsuid=0 egid=12 sgid=12 fsgid=12 tty=(none)  
>>> ses=4294967295 comm="procmail" exe="/usr/bin/procmail"  
>>> subj=system_u:system_r:procmail_t:s0 key=(null)
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> CentOS mailing list
>>> CentOS at centos.org
>>> http://lists.centos.org/mailman/listinfo/centos
>>
>> _______________________________________________
>> CentOS mailing list
>> CentOS at centos.org
>> http://lists.centos.org/mailman/listinfo/centos
>
> _______________________________________________
> CentOS mailing list
> CentOS at centos.org
> http://lists.centos.org/mailman/listinfo/centos

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.centos.org/pipermail/centos/attachments/20090430/d99adbd0/attachment.html 


More information about the CentOS mailing list