Need help bypassing spamass-milter audit

Dan Thurman dant at cdkkt.com
Thu Jan 28 03:24:16 UTC 2010


I know that F8 is not supported, but I need help in knowing how
to get SELinux to permanently bypass spamass-milter denials.
I just cannot upgrade this F8 machine right now as it is my main email
server.

The following is generated by the command:
# service spamass-milter start:
 [OK] is generated, but the errors are shown in /var/log/audit/audit.log:

type=AVC msg=audit(1264646701.440:1750): avc:  denied  { execute } for
pid=13694 comm="spamass-milter" name="spamc" dev=sda3 ino=4688447
scontext=unconfined_u:system_r:spamd_t:s0
tcontext=system_u:object_r:spamc_exec_t:s0 tclass=file
type=SYSCALL msg=audit(1264646701.440:1750): arch=40000003 syscall=11
success=no exit=-13 a0=8058507 a1=968fa20 a2=bf95526c a3=1 items=0
ppid=13056 pid=13694 auid=500 uid=600 gid=600 euid=600 suid=600
fsuid=600 egid=600 sgid=600 fsgid=600 tty=(none) ses=186
comm="spamass-milter" exe="/usr/sbin/spamass-milter"
subj=unconfined_u:system_r:spamd_t:s0 key=(null)
type=USER_START msg=audit(1264646735.400:1751): user pid=13765 uid=0
auid=500 ses=186 subj=unconfined_u:system_r:initrc_t:s0
msg='op=PAM:session_open acct="sa-milt" exe="/sbin/runuser" (hostname=?,
addr=?, terminal=pts/1 res=success)'
type=CRED_ACQ msg=audit(1264646735.400:1752): user pid=13765 uid=0
auid=500 ses=186 subj=unconfined_u:system_r:initrc_t:s0
msg='op=PAM:setcred acct="sa-milt" exe="/sbin/runuser" (hostname=?,
addr=?, terminal=pts/1 res=success)'
type=CRED_DISP msg=audit(1264646738.120:1753): user pid=13765 uid=0
auid=500 ses=186 subj=unconfined_u:system_r:initrc_t:s0
msg='op=PAM:setcred acct="sa-milt" exe="/sbin/runuser" (hostname=?,
addr=?, terminal=pts/1 res=success)'
type=USER_END msg=audit(1264646738.122:1754): user pid=13765 uid=0
auid=500 ses=186 subj=unconfined_u:system_r:initrc_t:s0
msg='op=PAM:session_close acct="sa-milt" exe="/sbin/runuser"
(hostname=?, addr=?, terminal=pts/1 res=success)'

Of course, shutting down spamass-milter will fail:

# service spamass-milter stop
 [FAILED] is generated, because
/var/run/spamass-milter/spamass-milter.sock is not created.


Interestingly, if one issues:

# setenforce 0
# service spamass-milter start
 [OK] is generated
# service spamass-milter stop
 [OK] is generated
# setenforce 1

And, /var/run/spamass-milter/spamass-milter.sock is created.

However, sendmail with spamass-milter enabled results in permission denied
because security context is enabled.


So, can someone please give me instructions so that I can permanently
bypass spamass-milter audit?

Thanks!
Dan




More information about the selinux mailing list