Re: web-based chat server

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2005-08-17 at 19:10 +0200, Eric Tanguy wrote:
> Le mercredi 17 août 2005 à 12:35 +0100, Paul Howarth a écrit :
> > Eric Tanguy wrote:
> > > Le mercredi 17 août 2005 à 12:37 +0200, Eric Tanguy a écrit :
> > > If i disable selinux i can edit options view help and chat. So there is
> > > still some problem with selinux context. If someone have an idea ?
> > 
> > As always with SELinux issues, look for the avc messages in 
> > /var/log/messages, or /var/log/audit/audit.log if you're running auditd.
> > 
> > Paul.
> > 
> thanks but it's quite difficult to understand /var/log/audit/audit.log!
> The only lines i found in this file refering my problem (i think ...)
> are : 
> type=AVC msg=audit(1124298167.251:3778508): avc:  denied  { read } for
> pid=3907 comm="irc.cgi" name="formats" dev=dm-0 ino=8323109
> scontext=system_u:system_r:httpd_sys_script_t
> tcontext=system_u:object_r:httpd_sys_script_exec_t tclass=dir

Your cgi script irc.cgi is trying to read a file called "formats", which
it's not allowed to do because that file has context
system_u:object_r:httpd_sys_script_exec_t. Does the "formats" file live
in /var/www/cgi-bin and is it a regular file, not a script? If so,
changing the context of that file (e.g. to httpd_sys_content_t) might
help.

> type=AVC msg=audit(1124298171.144:3812320): avc:  denied  { connectto }
> for  pid=3922 comm="client-perl.cgi" name="sock"
> scontext=system_u:system_r:httpd_sys_script_t
> tcontext=system_u:system_r:httpd_sys_script_t tclass=unix_stream_socket

Your cgi script client-perl.cgi is trying to connect to a socket. Might
be a similar issue to the one above.

> But i can't understand where is the problem.
> If someone could help me ...

There are several approaches you could take.

First would be to try to get the contexts of the files right so that the
operations were allowed by existing policy.

Second would be to tweak the policy to allow the things your CGIs are
trying to do. The command:
# audit2allow -i /var/log/audit/audit.log -l
will show the rules that need to be added to the policy to allow all the
things that were denied by policy since the last policy reload. The
Apache SELinux FAQ at http://fedora.redhat.com/docs/selinux-apache-fc3/
includes details of customising policy.

A quick and dirty but relatively less secure third option would be to
change the context of the troublesome scripts to
httpd_unconfined_script_exec_t. This pretty well turns off SELinux
protection for the script and lets it do whatever it wants. This one's
mentioned in "man httpd_selinux".

Paul.
-- 
Paul Howarth <paul@xxxxxxxxxxxx>


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux