F19-mailserver & selinux complains

Daniel J Walsh dwalsh at redhat.com
Wed Jun 5 13:41:40 UTC 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/05/2013 01:59 AM, Cristian Sava wrote:
> On Tue, 2013-06-04 at 11:40 -0400, Daniel J Walsh wrote:
>> On 06/04/2013 05:06 AM, Cristian Sava wrote:
>>> I am trying to activate selinux for my mailserver. It is F19 
>>> postfix_courier_amavisd-new_clamav_squirrelmail install in a virtual 
>>> environment. All needed is stock or was packaged on F19 (rpmbuild -ta
>>> ... / rpmbuild -ba ...) and all is working fine (selinux disabled). No
>>> tar.gz directly installed. I am trying to fix things one by one. Any
>>> advice is welcome. When receiving a message selinux complain
>>> (permissive):
>>> 
>>> SELinux is preventing /usr/sbin/courierlogger from getattr access on
>>> the file /var/spool/authdaemon/pid.
>>> 
>>> *****  Plugin catchall (100. confidence) suggests 
>>> ***************************
>>> 
>>> If you believe that courierlogger should be allowed getattr access on
>>> the pid file by default. Then you should report this as a bug. You can
>>> generate a local policy module to allow this access. Do allow this
>>> access for now by executing: # grep courierlogger
>>> /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp
>>> 
>>> Additional Information: Source Context 
>>> system_u:system_r:courier_authdaemon_t:s0 Target Context 
>>> system_u:object_r:courier_spool_t:s0 Target Objects 
>>> /var/spool/authdaemon/pid [ file ] Source courierlogger Source Path
>>> /usr/sbin/courierlogger Port <Unknown> Host
>>> s198.domain.xx Source RPM Packages courier-authlib-0.65.0-1.fc19.x86_64
>>> Target RPM Packages courier-authlib-0.65.0-1.fc19.x86_64 Policy RPM 
>>> selinux-policy-3.12.1-47.fc19.noarch Selinux Enabled               True
>>>  Policy Type                   targeted Enforcing Mode Permissive Host
>>> Name                     s198.domain.xx Platform Linux s198.domain.xx
>>> 3.9.4-300.fc19.x86_64 #1 SMP Fri May 24 22:17:06 UTC 2013 x86_64 x86_64
>>> Alert Count                   7 First Seen 2013-05-30 16:35:05 EEST
>>> Last Seen                     2013-06-04 11:30:02 EEST Local ID
>>> 469bd394-ddfb-454b-89e0-5ea40c2cf36b
>>> 
>>> Raw Audit Messages type=AVC msg=audit(1370334602.277:26): avc:  denied
>>> { getattr } for pid=461 comm="courierlogger"
>>> path="/var/spool/authdaemon/pid" dev="dm-1" ino=1193281
>>> scontext=system_u:system_r:courier_authdaemon_t:s0 
>>> tcontext=system_u:object_r:courier_spool_t:s0 tclass=file
>>> 
>>> 
>>> type=SYSCALL msg=audit(1370334602.277:26): arch=x86_64 syscall=fstat 
>>> success=yes exit=0 a0=3 a1=7fffc612b9d0 a2=7fffc612b9d0 a3=4 items=0
>>> ppid=1 pid=461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
>>> sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=courierlogger 
>>> exe=/usr/sbin/courierlogger
>>> subj=system_u:system_r:courier_authdaemon_t:s0 key=(null)
>>> 
>>> Hash: courierlogger,courier_authdaemon_t,courier_spool_t,file,getattr
>>> 
>>> [cristi at s198 ~]$ getsebool -a | grep " on" auditadm_exec_content --> on
>>>  domain_fd_use --> on fips_mode --> on global_ssp --> on 
>>> gluster_export_all_rw --> on gssd_read_tmp --> on guest_exec_content
>>> --> on httpd_builtin_scripting --> on httpd_can_network_connect --> on
>>>  httpd_can_network_connect_db --> on httpd_enable_cgi --> on 
>>> httpd_enable_homedirs --> on httpd_graceful_shutdown --> on 
>>> httpd_mod_auth_pam --> on httpd_sys_script_anon_write --> on
>>> httpd_use_gpg --> on kerberos_enabled --> on
>>> logging_syslogd_can_sendmail --> on login_console_enabled --> on
>>> mcelog_exec_scripts --> on mount_anyfile --> on nfs_export_all_ro -->
>>> on nfs_export_all_rw --> on nscd_use_shm --> on openvpn_enable_homedirs
>>> --> on postfix_local_write_mail_spool --> on 
>>> postgresql_selinux_unconfined_dbadm --> on postgresql_selinux_users_ddl
>>> --> on privoxy_connect_any --> on saslauthd_read_shadow --> on 
>>> secadm_exec_content --> on selinuxuser_direct_dri_enabled --> on 
>>> selinuxuser_execmod --> on selinuxuser_execstack --> on 
>>> selinuxuser_mysql_connect_enabled --> on selinuxuser_ping --> on 
>>> selinuxuser_rw_noexattrfile --> on selinuxuser_tcp_server --> on 
>>> spamassassin_can_network --> on spamd_enable_home_dirs --> on 
>>> squid_connect_any --> on staff_exec_content --> on sysadm_exec_content
>>> --> on telepathy_tcp_connect_generic_network_ports --> on 
>>> unconfined_chrome_sandbox_transition --> on unconfined_login --> on 
>>> unconfined_mozilla_plugin_transition --> on user_exec_content --> on 
>>> virt_use_usb --> on xend_run_blktap --> on xend_run_qemu --> on 
>>> xguest_connect_network --> on xguest_exec_content --> on
>>> xguest_mount_media --> on xguest_use_bluetooth --> on [cristi at s198 ~]$
>>> 
>>> Do I miss something obvious?
>>> 
>>> C. Sava
>>> 
>>> 
>> Why is courier storing pid files in /var/spool/authdaemon/pid?
>> 
>> Current policy allows courier_authdaemon to create sock_files in this 
>> directory but not regular files.
>> 
>> 
> That is beyond of me, but I think there may be a reason and I don't find 
> complains for it on forums. I think that it just have to work, with and
> without selinux, it's the administrator's choice (without the need to
> compile modules and so on, only an option needed). Courier is too well
> known to be ignored and it is not something very special beast.
> 
> C. Sava
> 
> 
> 
> 
> 
Anyways Crhitian, I have added the allow rules to the base policy to allow
this.  You can do this for now  by executing

# grep courier /var/log/audit/audit.log | audit2allow -M mycourier
# semodule -i mycourier.pp

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlGvQBQACgkQrlYvE4MpobOObgCgopB2FdvcJCDLwmzV8x8DhHmI
/JUAoNGh9k8ijLJFgSh+9dFZIZqW1flC
=vOEX
-----END PGP SIGNATURE-----


More information about the test mailing list