On 02/12/2017 01:40 PM, Gordon Messmer wrote: > On 02/11/2017 08:56 PM, Robert Moskowitz wrote: >> This seems to be bug 1103439 which was 'fixed' for Centos6. >> >> What should I do about this? Is there a SELinux policy to apply or >> should I the avoid upd-ports option in Bind? > > > It looks like that bug was assigned to the selinux-policy component, > where it was CLOSED NOTABUG, and then mistakenly marked CLOSED ERRATA. > > The solution is probably to specify the allowed ports. However, I > must be reading something wrong, because on my system, it looks like > named_t is allowed to use those ports. > > # sesearch -A -s named_t | grep port | grep bind > > ...indicates that named_t is allowed to bind to both unreserved > ports and ephemeral ports. > > # semanage port -l | grep unreserved_port_t > unreserved_port_t tcp 61001-65535, 1024-32767 > unreserved_port_t udp 61001-65535, 1024-32767 > # semanage port -l | grep ephemeral_port_t > ephemeral_port_t tcp 32768-61000 > ephemeral_port_t udp 32768-61000 > > I'm not seeing those errors logged, either, so maybe your system > differs from mine. If I'm misreading, hopefully someone will chime in > to clarify. I get: # semanage port -l | grep unreserved_port_t unreserved_port_t tcp 61001-65535, 1024-32767 unreserved_port_t udp 61001-65535, 1024-32767 # semanage port -l | grep ephemeral_port_t ephemeral_port_t tcp 32768-61000 ephemeral_port_t udp 32768-61000 so same semanage results, but different logwatch events. BTW, my internal DNS is not getting these, so some external 'hit' is triggering it. > > It's probably safe to specify some range of higher numbered ports: > > use-v4-udp-ports { range 10240 65535; }; > use-v6-udp-ports { range 10240 65535; }; But that is not the ports that I am seeing in logwatch: **Unmatched Entries** dispatch 0xb4463008: open_socket(::#8554) -> permission denied: continuing: 1 Time(s) dispatch 0xb4463008: open_socket(::#8614) -> permission denied: continuing: 1 Time(s) dispatch 0xb4464008: open_socket(::#8613) -> permission denied: continuing: 1 Time(s) dispatch 0xb4465008: open_socket(::#4444) -> permission denied: continuing: 1 Time(s) dispatch 0xb4465440: open_socket(0.0.0.0#5546) -> permission denied: continuing: 2 Time(s) dispatch 0xb4465440: open_socket(0.0.0.0#8554) -> permission denied: continuing: 1 Time(s) dispatch 0xb4465878: open_socket(0.0.0.0#2605) -> permission denied: continuing: 1 Time(s) dispatch 0xb4465878: open_socket(0.0.0.0#4444) -> permission denied: continuing: 2 Time(s) dispatch 0xb4465878: open_socket(0.0.0.0#8610) -> permission denied: continuing: 1 Time(s) dispatch 0xb4465878: open_socket(0.0.0.0#8613) -> permission denied: continuing: 1 Time(s) dispatch 0xb4466008: open_socket(0.0.0.0#4444) -> permission denied: continuing: 1 Time(s) dispatch 0xb4466008: open_socket(0.0.0.0#8554) -> permission denied: continuing: 1 Time(s) dispatch 0xb4466008: open_socket(0.0.0.0#8613) -> permission denied: continuing: 1 Time(s) dispatch 0xb4466440: open_socket(0.0.0.0#1935) -> permission denied: continuing: 1 Time(s) dispatch 0xb4466440: open_socket(0.0.0.0#8610) -> permission denied: continuing: 1 Time(s) dispatch 0xb4466878: open_socket(0.0.0.0#8610) -> permission denied: continuing: 1 Time(s) dispatch 0xb4467008: open_socket(0.0.0.0#8611) -> permission denied: continuing: 1 Time(s) dispatch 0xb4467440: open_socket(0.0.0.0#1935) -> permission denied: continuing: 2 Time(s) dispatch 0xb4467440: open_socket(0.0.0.0#4444) -> permission denied: continuing: 1 Time(s) dispatch 0xb4467440: open_socket(0.0.0.0#8613) -> permission denied: continuing: 1 Time(s) dispatch 0xb4467440: open_socket(0.0.0.0#8614) -> permission denied: continuing: 1 Time(s) dispatch 0xb4468008: open_socket(0.0.0.0#4444) -> permission denied: continuing: 1 Time(s)