strange messages to root, possibly SA related?

Paul Howarth paul at city-fan.org
Tue Nov 14 18:57:26 UTC 2006


Gene Heskett wrote:
> On Tuesday 14 November 2006 06:19, Paul Howarth wrote:
>> Gene Heskett wrote:
>>> Greetings;
>>>
>>> My logs now contain megabytes of selinux spew. I've disabled it for
>>> the time being, and have forgotten how one goes about having it
>>> regenerate its 'this is ok' list, can someone refresh me on that?
>> Could you post a few samples of this spew?
>>
>> Paul.
> Sure,  its quiet now since I've disabled it, but before I did, I had this 
> on an every 90 second or so basis:
> 
> ============================================
> Nov 11 01:54:52 coyote kernel: audit(1163228092.870:182): avc:  denied  { 
> getattr } for  pid=4236 comm="fetchmail" name=".fetchmailrc" dev=dm-0 
> ino=29032467 scontext=system_u:system_r:fetchmail_t:s0 tcontext=root:object_r:user_home_t:s0 
> tclass=file

Fetchmail reading its configuration file; certainly something that 
should be allowed.

> Nov 11 01:54:54 coyote kernel: audit(1163228094.106:183): avc:  denied  { 
> ioctl } for  pid=5633 comm="sh" name="[22634]" dev=pipefs ino=22634 
> scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 tclass=fifo_file
> Nov 11 01:54:54 coyote kernel: audit(1163228094.106:184): avc:  denied  { 
> search } for  pid=5633 comm="sh" name="sbin" dev=dm-0 ino=36864001 
> scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir
> Nov 11 01:54:54 coyote kernel: audit(1163228094.114:185): avc:  denied  { 
> getattr } for  pid=4236 comm="fetchmail" name="[22634]" dev=pipefs 
> ino=22634 scontext=system_u:sy
> stem_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 
> tclass=fifo_file
> Nov 11 01:54:54 coyote kernel: audit(1163228094.114:186): avc:  denied  { 
> write } for  pid=4236 comm="fetchmail" name="[22634]" dev=pipefs 
> ino=22634 scontext=system_u:syst
> em_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 
> tclass=fifo_file
> Nov 11 01:54:54 coyote kernel: audit(1163228094.114:187): avc:  denied  { 
> read } for  pid=5633 comm="procmail" name="[22634]" dev=pipefs ino=22634 
> scontext=system_u:system
> _r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 
> tclass=fifo_file

These all look to be to do with fetchmail piping stuff into procmail, 
which seems reasonable to do.

> Nov 11 01:54:54 coyote kernel: audit(1163228094.114:188): avc:  denied  { 
> read } for  pid=5633 comm="procmail" name=".procmailrc" dev=dm-0 
> ino=29032466 scontext=system_u:s
> ystem_r:fetchmail_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file
> Nov 11 01:54:54 coyote kernel: audit(1163228094.126:189): avc:  denied  { 
> getattr } for  pid=5639 comm="bash" name="formail" dev=dm-0 ino=6925589 
> scontext=system_u:system_
> r:fetchmail_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file
> Nov 11 01:54:54 coyote kernel: audit(1163228094.134:190): avc:  denied  { 
> search } for  pid=5643 comm="spamc" name="mail" dev=dm-0 ino=24609414 
> scontext=system_u:system_r:
> fetchmail_t:s0 tcontext=system_u:object_r:etc_mail_t:s0 tclass=dir
> Nov 11 02:10:53 coyote ntpd[2917]: synchronized to LOCAL(0), stratum 10
> Nov 11 02:19:31 coyote ntpd[2917]: synchronized to 193.11.184.180, stratum 
> 2
> Nov 11 02:19:35 coyote kernel: audit(1163229575.203:191): avc:  denied  { 
> execute } for  pid=5769 comm="procmail" name="spamc" dev=dm-0 ino=6935366 
> scontext=system_u:syste
> m_r:fetchmail_t:s0 tcontext=system_u:object_r:spamc_exec_t:s0 tclass=file
> Nov 11 02:19:35 coyote kernel: audit(1163229575.203:192): avc:  denied  { 
> execute_no_trans } for  pid=5769 comm="procmail" name="spamc" dev=dm-0 
> ino=6935366 scontext=syste
> m_u:system_r:fetchmail_t:s0 tcontext=system_u:object_r:spamc_exec_t:s0 
> tclass=file
> Nov 11 02:19:35 coyote kernel: audit(1163229575.203:193): avc:  denied  { 
> read } for  pid=5769 comm="procmail" name="spamc" dev=dm-0 ino=6935366 
> scontext=system_u:system_r
> :fetchmail_t:s0 tcontext=system_u:object_r:spamc_exec_t:s0 tclass=file

I think these are due to a missing transition from the fetchmail to 
procmail domains; audit2allow will generate the wrong fix for this sort 
of problem.

> Nov 11 03:01:03 coyote kernel: audit(1163232063.108:194): avc:  denied  { 
> append } for  pid=4236 comm="fetchmail" name="fetchmail.log" dev=dm-0 
> ino=19170983 scontext=syste
> m_u:system_r:fetchmail_t:s0 tcontext=root:object_r:var_log_t:s0 
> tclass=file

Hmm, fetchmail can't write its log file in /var/log.

> Nov 11 03:01:04 coyote kernel: audit(1163232064.500:195): avc:  denied  { 
> read } for  pid=5923 comm="fetchmail" name="sh" dev=dm-0 ino=33128453 
> scontext=system_u:system_r:
> fetchmail_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file
> Nov 11 03:01:04 coyote kernel: audit(1163232064.504:196): avc:  denied  { 
> execute } for  pid=5923 comm="sh" name="procmail" dev=dm-0 ino=6933056 
> scontext=system_u:system_r
> :fetchmail_t:s0 tcontext=system_u:object_r:procmail_exec_t:s0 tclass=file
> Nov 11 03:01:04 coyote kernel: audit(1163232064.504:197): avc:  denied  { 
> execute_no_trans } for  pid=5923 comm="sh" name="procmail" dev=dm-0 
> ino=6933056 scontext=system_u
> :system_r:fetchmail_t:s0 tcontext=system_u:object_r:procmail_exec_t:s0 
> tclass=file
> Nov 11 03:01:04 coyote kernel: audit(1163232064.504:198): avc:  denied  { 
> read } for  pid=5923 comm="sh" name="procmail" dev=dm-0 ino=6933056 
> scontext=system_u:system_r:fe
> tchmail_t:s0 tcontext=system_u:object_r:procmail_exec_t:s0 tclass=file
> Nov 11 03:01:04 coyote kernel: audit(1163232064.508:199): avc:  denied  { 
> send_msg } for  pid=5927 comm="spamc" saddr=127.0.0.1 src=43491 
> daddr=127.0.0.1 dest=783 netif=lo
>  scontext=system_u:system_r:fetchmail_t:s0 
> tcontext=system_u:object_r:spamd_port_t:s0 tclass=tcp_socket
> Nov 11 03:01:04 coyote kernel: audit(1163232064.508:200): avc:  denied  { 
> recv_msg } for  pid=5927 comm="spamc" saddr=127.0.0.1 src=783 
> daddr=127.0.0.1 dest=43491 netif=lo
>  scontext=system_u:system_r:fetchmail_t:s0 
> tcontext=system_u:object_r:spamd_port_t:s0 tclass=tcp_socket
> Nov 11 03:06:06 coyote kernel: audit(1163232366.401:201): avc:  denied  { 
> create } for  pid=5967 comm="procmail" 

More of the same.

Can you tell us how you are running fetchmail? From a cron job perhaps? 
And how do you invoke procmail from fetchmail?

> A newer kernel was installed by yumex last night and I'll reboot to it 
> sometime this morning.  Where do I find the proceedure to re-enable it 
> after touching some file in / so it resets things properly?                    

# touch /.autorelabel

Set SELinux to permissive mode, then reboot. Do this when you can afford 
for your machine to be off for a while, as relabelling is not a quick 
process.

Paul.




More information about the users mailing list