Re: strange messages to root, possibly SA related?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Gene Heskett wrote:
On Tuesday 14 November 2006 06:19, Paul Howarth wrote:
Gene Heskett wrote:
Greetings;

My logs now contain megabytes of selinux spew. I've disabled it for
the time being, and have forgotten how one goes about having it
regenerate its 'this is ok' list, can someone refresh me on that?
Could you post a few samples of this spew?

Paul.
Sure, its quiet now since I've disabled it, but before I did, I had this on an every 90 second or so basis:

============================================
Nov 11 01:54:52 coyote kernel: audit(1163228092.870:182): avc: denied { getattr } for pid=4236 comm="fetchmail" name=".fetchmailrc" dev=dm-0 ino=29032467 scontext=system_u:system_r:fetchmail_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file

Fetchmail reading its configuration file; certainly something that should be allowed.

Nov 11 01:54:54 coyote kernel: audit(1163228094.106:183): avc: denied { ioctl } for pid=5633 comm="sh" name="[22634]" dev=pipefs ino=22634 scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 tclass=fifo_file Nov 11 01:54:54 coyote kernel: audit(1163228094.106:184): avc: denied { search } for pid=5633 comm="sh" name="sbin" dev=dm-0 ino=36864001 scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir Nov 11 01:54:54 coyote kernel: audit(1163228094.114:185): avc: denied { getattr } for pid=4236 comm="fetchmail" name="[22634]" dev=pipefs ino=22634 scontext=system_u:sy stem_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 tclass=fifo_file Nov 11 01:54:54 coyote kernel: audit(1163228094.114:186): avc: denied { write } for pid=4236 comm="fetchmail" name="[22634]" dev=pipefs ino=22634 scontext=system_u:syst em_r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 tclass=fifo_file Nov 11 01:54:54 coyote kernel: audit(1163228094.114:187): avc: denied { read } for pid=5633 comm="procmail" name="[22634]" dev=pipefs ino=22634 scontext=system_u:system _r:fetchmail_t:s0 tcontext=system_u:system_r:fetchmail_t:s0 tclass=fifo_file

These all look to be to do with fetchmail piping stuff into procmail, which seems reasonable to do.

Nov 11 01:54:54 coyote kernel: audit(1163228094.114:188): avc: denied { read } for pid=5633 comm="procmail" name=".procmailrc" dev=dm-0 ino=29032466 scontext=system_u:s
ystem_r:fetchmail_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file
Nov 11 01:54:54 coyote kernel: audit(1163228094.126:189): avc: denied { getattr } for pid=5639 comm="bash" name="formail" dev=dm-0 ino=6925589 scontext=system_u:system_
r:fetchmail_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file
Nov 11 01:54:54 coyote kernel: audit(1163228094.134:190): avc: denied { search } for pid=5643 comm="spamc" name="mail" dev=dm-0 ino=24609414 scontext=system_u:system_r:
fetchmail_t:s0 tcontext=system_u:object_r:etc_mail_t:s0 tclass=dir
Nov 11 02:10:53 coyote ntpd[2917]: synchronized to LOCAL(0), stratum 10
Nov 11 02:19:31 coyote ntpd[2917]: synchronized to 193.11.184.180, stratum 2 Nov 11 02:19:35 coyote kernel: audit(1163229575.203:191): avc: denied { execute } for pid=5769 comm="procmail" name="spamc" dev=dm-0 ino=6935366 scontext=system_u:syste
m_r:fetchmail_t:s0 tcontext=system_u:object_r:spamc_exec_t:s0 tclass=file
Nov 11 02:19:35 coyote kernel: audit(1163229575.203:192): avc: denied { execute_no_trans } for pid=5769 comm="procmail" name="spamc" dev=dm-0 ino=6935366 scontext=syste m_u:system_r:fetchmail_t:s0 tcontext=system_u:object_r:spamc_exec_t:s0 tclass=file Nov 11 02:19:35 coyote kernel: audit(1163229575.203:193): avc: denied { read } for pid=5769 comm="procmail" name="spamc" dev=dm-0 ino=6935366 scontext=system_u:system_r
:fetchmail_t:s0 tcontext=system_u:object_r:spamc_exec_t:s0 tclass=file

I think these are due to a missing transition from the fetchmail to procmail domains; audit2allow will generate the wrong fix for this sort of problem.

Nov 11 03:01:03 coyote kernel: audit(1163232063.108:194): avc: denied { append } for pid=4236 comm="fetchmail" name="fetchmail.log" dev=dm-0 ino=19170983 scontext=syste m_u:system_r:fetchmail_t:s0 tcontext=root:object_r:var_log_t:s0 tclass=file

Hmm, fetchmail can't write its log file in /var/log.

Nov 11 03:01:04 coyote kernel: audit(1163232064.500:195): avc: denied { read } for pid=5923 comm="fetchmail" name="sh" dev=dm-0 ino=33128453 scontext=system_u:system_r:
fetchmail_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file
Nov 11 03:01:04 coyote kernel: audit(1163232064.504:196): avc: denied { execute } for pid=5923 comm="sh" name="procmail" dev=dm-0 ino=6933056 scontext=system_u:system_r
:fetchmail_t:s0 tcontext=system_u:object_r:procmail_exec_t:s0 tclass=file
Nov 11 03:01:04 coyote kernel: audit(1163232064.504:197): avc: denied { execute_no_trans } for pid=5923 comm="sh" name="procmail" dev=dm-0 ino=6933056 scontext=system_u :system_r:fetchmail_t:s0 tcontext=system_u:object_r:procmail_exec_t:s0 tclass=file Nov 11 03:01:04 coyote kernel: audit(1163232064.504:198): avc: denied { read } for pid=5923 comm="sh" name="procmail" dev=dm-0 ino=6933056 scontext=system_u:system_r:fe
tchmail_t:s0 tcontext=system_u:object_r:procmail_exec_t:s0 tclass=file
Nov 11 03:01:04 coyote kernel: audit(1163232064.508:199): avc: denied { send_msg } for pid=5927 comm="spamc" saddr=127.0.0.1 src=43491 daddr=127.0.0.1 dest=783 netif=lo scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:object_r:spamd_port_t:s0 tclass=tcp_socket Nov 11 03:01:04 coyote kernel: audit(1163232064.508:200): avc: denied { recv_msg } for pid=5927 comm="spamc" saddr=127.0.0.1 src=783 daddr=127.0.0.1 dest=43491 netif=lo scontext=system_u:system_r:fetchmail_t:s0 tcontext=system_u:object_r:spamd_port_t:s0 tclass=tcp_socket Nov 11 03:06:06 coyote kernel: audit(1163232366.401:201): avc: denied { create } for pid=5967 comm="procmail"

More of the same.

Can you tell us how you are running fetchmail? From a cron job perhaps? And how do you invoke procmail from fetchmail?

A newer kernel was installed by yumex last night and I'll reboot to it sometime this morning. Where do I find the proceedure to re-enable it after touching some file in / so it resets things properly?

# touch /.autorelabel

Set SELinux to permissive mode, then reboot. Do this when you can afford for your machine to be off for a while, as relabelling is not a quick process.

Paul.


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux