[CentOS] NOT Solved - Re: SELinux policy to allow Dovecot to connect to Mysql

Tue Apr 25 08:39:35 UTC 2017
Robert Moskowitz <rgm at htt-consult.com>

Thanks Laurent.  You obviously know a LOT more about SELinux than I.  I 
pretty much just use commands and not build policies.  So I need some 
more information here.

 From what you provided below, how do I determine what is currently in 
place and how do I add your stuff (changing postgresql with mysql, nat.)

thanks

On 04/25/2017 10:26 AM, Laurent Wandrebeck wrote:
> Le mardi 25 avril 2017 à 10:04 +0200, Robert Moskowitz a écrit :
>> I thought I had this fixed, but I do not.  I was away from this problem
>> working on other matters, and came back (after a reboot) and it is still
>> there, so I suspect when I thought I had it 'fixed' I was running with
>> setenforce 0 from another problem (that is fixed).
>>
>> So anyone know how to get dovecot dict connecting to mysql when
>> enforcing?  Googling is not finding any real help.
> Hi,
>
> I’ve got some « tweaking » here (using postgresql, obviously) so that
> dovecot runs properly with SELinux enabled,
>
> HTH,
> Laurent.
>
> module mydovecot 1.0;
>
> require {
>          type dovecot_auth_t;
>          type postgresql_port_t;
>          type dovecot_t;
>          type var_t;
>          type postfix_virtual_tmp_t;
>          class tcp_socket name_connect;
>          class file { rename read lock create write getattr link unlink
> open append };
>          class dir { read write create add_name remove_name };
> }
>
> #============= dovecot_auth_t ==============
>
> #!!!! This avc is allowed in the current policy
> allow dovecot_auth_t postgresql_port_t:tcp_socket name_connect;
>
> #============= dovecot_t ==============
>
> #!!!! This avc is allowed in the current policy
> allow dovecot_t postfix_virtual_tmp_t:file { rename write unlink open
> link };
> allow dovecot_t var_t:dir create;
>
> #!!!! This avc is allowed in the current policy
> allow dovecot_t var_t:dir { read write add_name remove_name };
>
> #!!!! This avc is allowed in the current policy
> allow dovecot_t var_t:file { rename read lock create write getattr link
> unlink open append };
>