[CentOS] Defaults of CentOS Install not working with SELinux

Dan Roberts dan at jlazyh.com
Thu Apr 30 14:50:36 UTC 2009


Ok, but how?

There appear to be a lot of different options when employing  
audit2allow and I am reluctant to start blazing away trying different  
elements.  I am missing the details of what socket an dhow the  
execution is occuring so that I can begin to develop the proper  
audit2allow sequence.




On Apr 30, 2009, at 8:43 AM, Andrew Colin Kissa wrote:

> Hi
>
> Dovecot is trying to open a socket, and procmail is trying to  
> execute spamc, You should be able to fix these issues using  
> audit2allow.
>
> Andrew.
>
> On 30 Apr 2009, at 4:07 PM, Dan Roberts wrote:
>
>> Following a hard drive corruption I have reinstalled the latest  
>> version of CentOS and all current patch files.
>>
>> For most applications I selected the default options.  By doing  
>> this I expected that the packages would play nice with one another  
>> and I could customize as necessary.
>>
>> Setting SELinux to enforce I encountered all sorts of problems -  
>> but most were resolvable, save for Dovecot, Procmail (for spamc),  
>> and an odd one with Apache.
>>
>> Given that these were all installed with the CentOS install  
>> defaults, I can't believe I am the only one with these issues but  
>> finding a solution has not been self evident.  Hoping someone here  
>> can help.
>>
>> For Dovecot I get the following:
>> 	SELinux is preventing dovecot (dovecot_t) "create" to <Unknown>  
>> (dovecot_t). For complete SELinux messages. run sealert -l  
>> e1b070ab-586a-4c5a-befe-b6a46b9ab992
>>
>> For procmail I get the following:
>> 	SELinux is preventing procmail (procmail_t) "execute" to ./spamc  
>> (spamc_exec_t). For complete SELinux messages. run sealert -l  
>> 0a554689-4948-4edf-9964-dddbfe6a2492
>> 	SELinux is preventing sh (procmail_t) "read" to ./spamc  
>> (spamc_exec_t). For complete SELinux messages. run sealert -l  
>> 1f1ebd83-412d-4e93-a36f-6f3d34c663df
>>
>> For Apache it's even more strange - When started I get:
>> 	Syntax error on line 283 of /etc/httpd/conf/httpd.conf
>> 	DocumentRoot must be  directory
>>
>> But it is a directory, has the correct permissions and I have even  
>> run chcon -R -h -t httpd_sys_content_t /web/www/ in an effort to  
>> correct the problem.  I run a virtual server too, and in trying to  
>> find a fix for this that may be a problem - but first things first.
>>
>> All the other issues I had I could resolve when I ran the specified  
>> "sealert" tag and followed the suggested instructions - but those  
>> above don't budge.  When I go to the fedora.redhat.com/docs/selinux- 
>> fq-fc5 site to take on making a local policy module I am quickly  
>> getting lost .   The option to simply disable SElinux with respect  
>> to Apache, Dovecote or anything else is suggested - but not  
>> something I see in the GUI window, and I have not figured out how  
>> to do it from the command line.
>>
>> Again, because these are default packages, I hope that someone else  
>> knows how to resolve these.
>>
>> With respect to the to reports from SELinux regarding Dovecot and  
>> promail, here is a bit more info:
>>
>> The info and Raw Audit message for dovecot_t is:
>> 	Source Context                system_u:system_r:dovecot_t:s0
>> 	Target Context                system_u:system_r:dovecot_t:s0
>> 	Target Objects                None [ socket ]
>> 	Source                        dovecot
>> 	Source Path                   /usr/sbin/dovecot
>> 	Port                          <Unknown>
>> 	Host                          trailrunner
>> 	Source RPM Packages           dovecot-1.0.7-7.el5
>> 	Target RPM Packages
>> 	Policy RPM                    selinux-policy-2.4.6-203.el5
>> 	Selinux Enabled               True
>> 	Policy Type                   targeted
>> 	MLS Enabled                   True
>> 	Enforcing Mode                Enforcing
>> 	Plugin Name                   catchall
>> 	Host Name                     trailrunner
>> 	Platform                      Linux trailrunner  
>> 2.6.18-128.1.6.el5xen #1 SMP Wed
>> 	                              Apr 1 10:38:05 EDT 2009 i686 athlon
>> 	Alert Count                   2
>> 	First Seen                    Wed Apr 29 15:39:51 2009
>> 	Last Seen                     Wed Apr 29 15:47:31 2009
>> 	Local ID                      e1b070ab-586a-4c5a-befe-b6a46b9ab992
>> 	Line Numbers
>>
>> 	Raw Audit Messages
>> 	host=trailrunner type=AVC msg=audit(1241041651.976:33): avc:   
>> denied  { create } for  pid=3884 comm="dovecot"  
>> scontext=system_u:system_r:dovecot_t:s0  
>> tcontext=system_u:system_r:dovecot_t:s0 tclass=socket
>> 	host=trailrunner type=SYSCALL msg=audit(1241041651.976:33):  
>> arch=40000003 syscall=102 success=no exit=-13 a0=1 a1=bf851070  
>> a2=9e45030 a3=3e1 items=0 ppid=3883 pid=3884 auid=4294967295 uid=0  
>> gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none)  
>> ses=4294967295 comm="dovecot" exe="/usr/sbin/dovecot"  
>> subj=system_u:system_r:dovecot_t:s0 key=(null)
>>
>> The Raw Audit Message for Procmail is:
>> 	Source Context                system_u:system_r:procmail_t:s0
>> 	Target Context                system_u:object_r:spamc_exec_t:s0
>> 	Target Objects                ./spamc [ file ]
>> 	Source                        procmail
>> 	Source Path                   /usr/bin/procmail
>> 	Port                          <Unknown>
>> 	Host                          trailrunner
>> 	Source RPM Packages           procmail-3.22-17.1.el5.centos
>> 	Target RPM Packages
>> 	Policy RPM                    selinux-policy-2.4.6-203.el5
>> 	Selinux Enabled               True
>> 	Policy Type                   targeted
>> 	MLS Enabled                   True
>> 	Enforcing Mode                Enforcing
>> 	Plugin Name                   catchall_file
>> 	Host Name                     trailrunner
>> 	Platform                      Linux trailrunner  
>> 2.6.18-128.1.6.el5xen #1 SMP Wed
>> 		                      Apr 1 10:38:05 EDT 2009 i686 athlon
>> 	Alert Count                   29
>> 	First Seen                    Wed Apr 29 15:40:40 2009
>> 	Last Seen                     Wed Apr 29 16:25:40 2009
>> 	Local ID                      0a554689-4948-4edf-9964-dddbfe6a2492
>> 	Line Numbers
>>
>> 	Raw Audit Messages
>> 	host=trailrunner type=AVC msg=audit(1241043940.918:166): avc:   
>> denied  { execute } for  pid=3344 comm="procmail" name="spamc"  
>> dev=dm-0 ino=18762675 scontext=system_u:system_r:procmail_t:s0  
>> tcontext=system_u:object_r:spamc_exec_t:s0 tclass=file
>> 	host=trailrunner type=SYSCALL msg=audit(1241043940.918:166):  
>> arch=40000003 syscall=11 success=no exit=-13 a0=8ef1d90 a1=8ef1020  
>> a2=8ef32d8 a3=1 items=0 ppid=3343 pid=3344 auid=4294967295 uid=0  
>> gid=12 euid=0 suid=0 fsuid=0 egid=12 sgid=12 fsgid=12 tty=(none)  
>> ses=4294967295 comm="procmail" exe="/usr/bin/procmail"  
>> subj=system_u:system_r:procmail_t:s0 key=(null)
>>
>>
>>
>>
>>
>>
>>
>> _______________________________________________
>> CentOS mailing list
>> CentOS at centos.org
>> http://lists.centos.org/mailman/listinfo/centos
>
> _______________________________________________
> CentOS mailing list
> CentOS at centos.org
> http://lists.centos.org/mailman/listinfo/centos

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.centos.org/pipermail/centos/attachments/20090430/1554f874/attachment.html>


More information about the CentOS mailing list