FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > Redhat > Fedora SELinux Support

 
 
LinkBack Thread Tools
 
Old 07-01-2008, 02:44 PM
Frank Murphy
 
Default Mislabeled files

I have no idea which dir to relabel?
and wouldl this dir relabel hold, after a full relabel?

#locate comes up empty even after #updatedb

$ rpm -qa | grep selinux
selinux-policy-3.3.1-69.fc9.noarch
libselinux-2.0.64-2.fc9.i386
libselinux-python-2.0.64-2.fc9.i386
selinux-policy-targeted-3.3.1-69.fc9.noarch


-----------------------------------------------------------------------

Summary:

SELinux is preventing the sendmail from using potentially mislabeled
files
(2F746D702F52734B6B436E774F202864656C6574656429).

Detailed Description:

SELinux has denied sendmail access to potentially mislabeled file(s)
(2F746D702F52734B6B436E774F202864656C6574656429). This means that
SELinux will
not allow sendmail to use these files. It is common for users to edit
files in
their home directory or tmp directories and then move (mv) them to
system
directories. The problem is that the files end up with the wrong file
context
which confined applications are not allowed to access.

Allowing Access:

If you want sendmail to access this files, you need to relabel them
using
restorecon -v '2F746D702F52734B6B436E774F202864656C6574656429'. You
might want
to relabel the entire directory using restorecon -R -v '.

Additional Information:

Source Context system_u:system_r:exim_t:s0
Target Context system_ubject_r:system_mail_tmp_t:s0
Target Objects
2F746D702F52734B6B436E774F202864656C6574656429 [
file ]
Source sendmail
Source Path /usr/sbin/exim
Port <Unknown>
Host frank-01
Source RPM Packages exim-4.69-4.fc9
Target RPM Packages
Policy RPM selinux-policy-3.3.1-69.fc9
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name home_tmp_bad_labels
Host Name frank-01
Platform Linux frank-01 2.6.25.6-55.fc9.i686 #1 SMP
Tue Jun
10 16:27:49 EDT 2008 i686 i686
Alert Count 1
First Seen Tue 01 Jul 2008 15:22:49 IST
Last Seen Tue 01 Jul 2008 15:22:49 IST
Local ID baefd44f-8e96-4353-8db7-badf98ef6335
Line Numbers

Raw Audit Messages

host=frank-01 type=AVC msg=audit(1214922169.332:32): avc: denied
{ read } for pid=11248 comm="sendmail"
path=2F746D702F52734B6B436E774F202864656C657465642 9 dev=dm-0 ino=34537
scontext=system_u:system_r:exim_t:s0
tcontext=system_ubject_r:system_mail_tmp_t:s0 tclass=file

host=frank-01 type=SYSCALL msg=audit(1214922169.332:32): arch=40000003
syscall=11 success=yes exit=0 a0=8058e0b a1=9eb060c a2=bf93c6e8
a3=9eb060c items=0 ppid=11247 pid=11248 auid=4294967295 uid=0 gid=0
euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="sendmail" exe="/usr/sbin/exim" subj=system_u:system_r:exim_t:s0
key=(null)



--
skype: Frankly3D
http://www.frankly3d.com

--
fedora-selinux-list mailing list
fedora-selinux-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
 
Old 07-01-2008, 03:29 PM
John Dennis
 
Default Mislabeled files

Frank Murphy wrote:

I have no idea which dir to relabel?
and wouldl this dir relabel hold, after a full relabel?


#locate comes up empty even after #updatedb

$ rpm -qa | grep selinux
selinux-policy-3.3.1-69.fc9.noarch
libselinux-2.0.64-2.fc9.i386
libselinux-python-2.0.64-2.fc9.i386
selinux-policy-targeted-3.3.1-69.fc9.noarch


-----------------------------------------------------------------------

Summary:

SELinux is preventing the sendmail from using potentially mislabeled
files
(2F746D702F52734B6B436E774F202864656C6574656429).

Detailed Description:

SELinux has denied sendmail access to potentially mislabeled file(s)
(2F746D702F52734B6B436E774F202864656C6574656429). This means that
SELinux will
not allow sendmail to use these files. It is common for users to edit
files in
their home directory or tmp directories and then move (mv) them to
system
directories. The problem is that the files end up with the wrong file
context
which confined applications are not allowed to access.

Allowing Access:

If you want sendmail to access this files, you need to relabel them
using
restorecon -v '2F746D702F52734B6B436E774F202864656C6574656429'. You
might want
to relabel the entire directory using restorecon -R -v '.

Additional Information:

Source Context system_u:system_r:exim_t:s0
Target Context system_ubject_r:system_mail_tmp_t:s0
Target Objects
2F746D702F52734B6B436E774F202864656C6574656429 [
file ]
Source sendmail
Source Path /usr/sbin/exim
Port <Unknown>
Host frank-01
Source RPM Packages exim-4.69-4.fc9
Target RPM Packages
Policy RPM selinux-policy-3.3.1-69.fc9

Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name home_tmp_bad_labels
Host Name frank-01
Platform Linux frank-01 2.6.25.6-55.fc9.i686 #1 SMP
Tue Jun
10 16:27:49 EDT 2008 i686 i686
Alert Count 1
First Seen Tue 01 Jul 2008 15:22:49 IST
Last Seen Tue 01 Jul 2008 15:22:49 IST
Local ID baefd44f-8e96-4353-8db7-badf98ef6335
Line Numbers

Raw Audit Messages


host=frank-01 type=AVC msg=audit(1214922169.332:32): avc: denied
{ read } for pid=11248 comm="sendmail"
path=2F746D702F52734B6B436E774F202864656C657465642 9 dev=dm-0 ino=34537
scontext=system_u:system_r:exim_t:s0
tcontext=system_ubject_r:system_mail_tmp_t:s0 tclass=file

host=frank-01 type=SYSCALL msg=audit(1214922169.332:32): arch=40000003
syscall=11 success=yes exit=0 a0=8058e0b a1=9eb060c a2=bf93c6e8
a3=9eb060c items=0 ppid=11247 pid=11248 auid=4294967295 uid=0 gid=0
euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="sendmail" exe="/usr/sbin/exim" subj=system_u:system_r:exim_t:s0
key=(null)





The mysterious string is hexidecimal encoded, which decodes to:

/tmp/RsKkCnwO (deleted)

Which means by the time the kernel emitted the event the file
/tmp/RsKkCnwO had been unlinked from the file system.


Setroubleshoot should have decoded the hexidecimal representation, I'm
not sure why it didn't.



--
John Dennis <jdennis@redhat.com>

--
fedora-selinux-list mailing list
fedora-selinux-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
 
Old 07-01-2008, 03:45 PM
Frank Murphy
 
Default Mislabeled files

On Tue, 2008-07-01 at 11:29 -0400, John Dennis wrote:
> Frank Murphy wrote:
> -
> >
> > Summary:
> >
> > SELinux is preventing the sendmail from using potentially mislabeled
> > files
> > (2F746D702F52734B6B436E774F202864656C6574656429).
> >

> >
> >
> The mysterious string is hexidecimal encoded, which decodes to:
>
> /tmp/RsKkCnwO (deleted)
>
> Which means by the time the kernel emitted the event the file
> /tmp/RsKkCnwO had been unlinked from the file system.
>
> Setroubleshoot should have decoded the hexidecimal representation, I'm
> not sure why it didn't.
>
>

[root@frank-01 /]# restorecon -R -v '/tmp'
restorecon reset /tmp/.X11-unix context
system_ubject_r:xdm_xserver_tmp_t:s0->system_ubject_r:xdm_tmp_t:s0


That looks ok?

Frank
--
skype: Frankly3D
http://www.frankly3d.com

--
fedora-selinux-list mailing list
fedora-selinux-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
 
Old 07-03-2008, 06:43 PM
Daniel J Walsh
 
Default Mislabeled files

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Frank Murphy wrote:
> I have no idea which dir to relabel?
> and wouldl this dir relabel hold, after a full relabel?
>
> #locate comes up empty even after #updatedb
>
> $ rpm -qa | grep selinux
> selinux-policy-3.3.1-69.fc9.noarch
> libselinux-2.0.64-2.fc9.i386
> libselinux-python-2.0.64-2.fc9.i386
> selinux-policy-targeted-3.3.1-69.fc9.noarch
>
>
> -----------------------------------------------------------------------
>
> Summary:
>
> SELinux is preventing the sendmail from using potentially mislabeled
> files
> (2F746D702F52734B6B436E774F202864656C6574656429).
>
> Detailed Description:
>
> SELinux has denied sendmail access to potentially mislabeled file(s)
> (2F746D702F52734B6B436E774F202864656C6574656429). This means that
> SELinux will
> not allow sendmail to use these files. It is common for users to edit
> files in
> their home directory or tmp directories and then move (mv) them to
> system
> directories. The problem is that the files end up with the wrong file
> context
> which confined applications are not allowed to access.
>
> Allowing Access:
>
> If you want sendmail to access this files, you need to relabel them
> using
> restorecon -v '2F746D702F52734B6B436E774F202864656C6574656429'. You
> might want
> to relabel the entire directory using restorecon -R -v '.
>
> Additional Information:
>
> Source Context system_u:system_r:exim_t:s0
> Target Context system_ubject_r:system_mail_tmp_t:s0
> Target Objects
> 2F746D702F52734B6B436E774F202864656C6574656429 [
> file ]
> Source sendmail
> Source Path /usr/sbin/exim
> Port <Unknown>
> Host frank-01
> Source RPM Packages exim-4.69-4.fc9
> Target RPM Packages
> Policy RPM selinux-policy-3.3.1-69.fc9
> Selinux Enabled True
> Policy Type targeted
> MLS Enabled True
> Enforcing Mode Enforcing
> Plugin Name home_tmp_bad_labels
> Host Name frank-01
> Platform Linux frank-01 2.6.25.6-55.fc9.i686 #1 SMP
> Tue Jun
> 10 16:27:49 EDT 2008 i686 i686
> Alert Count 1
> First Seen Tue 01 Jul 2008 15:22:49 IST
> Last Seen Tue 01 Jul 2008 15:22:49 IST
> Local ID baefd44f-8e96-4353-8db7-badf98ef6335
> Line Numbers
>
> Raw Audit Messages
>
> host=frank-01 type=AVC msg=audit(1214922169.332:32): avc: denied
> { read } for pid=11248 comm="sendmail"
> path=2F746D702F52734B6B436E774F202864656C657465642 9 dev=dm-0 ino=34537
> scontext=system_u:system_r:exim_t:s0
> tcontext=system_ubject_r:system_mail_tmp_t:s0 tclass=file
>
> host=frank-01 type=SYSCALL msg=audit(1214922169.332:32): arch=40000003
> syscall=11 success=yes exit=0 a0=8058e0b a1=9eb060c a2=bf93c6e8
> a3=9eb060c items=0 ppid=11247 pid=11248 auid=4294967295 uid=0 gid=0
> euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
> comm="sendmail" exe="/usr/sbin/exim" subj=system_u:system_r:exim_t:s0
> key=(null)
>
>
>
This is actually a bug in policy, and setroubleshoot should have told
you to use audit2allow to allow it.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkhtHeMACgkQrlYvE4MpobMgFQCfdGq2S5vm9R pX+qJlwJTAVXnQ
k6wAoK0Grmrl8OsrCKUu/AQKt6KwkgPr
=ndY1
-----END PGP SIGNATURE-----

--
fedora-selinux-list mailing list
fedora-selinux-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
 
Old 07-03-2008, 08:50 PM
Daniel J Walsh
 
Default Mislabeled files

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Frank Murphy wrote:
> On Tue, 2008-07-01 at 11:29 -0400, John Dennis wrote:
>> Frank Murphy wrote:
>> -
>>> Summary:
>>>
>>> SELinux is preventing the sendmail from using potentially mislabeled
>>> files
>>> (2F746D702F52734B6B436E774F202864656C6574656429).
>>>
>
>>>
>> The mysterious string is hexidecimal encoded, which decodes to:
>>
>> /tmp/RsKkCnwO (deleted)
>>
>> Which means by the time the kernel emitted the event the file
>> /tmp/RsKkCnwO had been unlinked from the file system.
>>
>> Setroubleshoot should have decoded the hexidecimal representation, I'm
>> not sure why it didn't.
>>
>>
>
> [root@frank-01 /]# restorecon -R -v '/tmp'
> restorecon reset /tmp/.X11-unix context
> system_ubject_r:xdm_xserver_tmp_t:s0->system_ubject_r:xdm_tmp_t:s0
>
>
> That looks ok?
>
> Frank
Frank you will have to add a custom policy module to allow this.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkhtO4cACgkQrlYvE4MpobMKLwCguSaPTF/dvuUUMh9jJXlql7HO
v9sAn1KV5u7R7ItpokRTqEJe12lJjwHt
=ArQG
-----END PGP SIGNATURE-----

--
fedora-selinux-list mailing list
fedora-selinux-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
 
Old 07-04-2008, 09:51 AM
Frank Murphy
 
Default Mislabeled files

On Thu, 2008-07-03 at 14:43 -0400, Daniel J Walsh wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1

> >
> >
> This is actually a bug in policy, and setroubleshoot should have told
> you to use audit2allow to allow it.
>

Fully updated,
Still getting these on a couple of boxes Fedora9 and (centos5.2)

Similar to:-
Target Objects: 2F746D702F5273497038477A34202864656C6574656429 [ file ]

Frank

--
fedora-selinux-list mailing list
fedora-selinux-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
 
Old 07-08-2008, 06:30 PM
Daniel J Walsh
 
Default Mislabeled files

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Frank Murphy wrote:
> On Thu, 2008-07-03 at 14:43 -0400, Daniel J Walsh wrote:
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>
>>>
>> This is actually a bug in policy, and setroubleshoot should have told
>> you to use audit2allow to allow it.
>>
>
> Fully updated,
> Still getting these on a couple of boxes Fedora9 and (centos5.2)
>
> Similar to:-
> Target Objects: 2F746D702F5273497038477A34202864656C6574656429 [ file ]
>
> Frank
>
> --
> fedora-selinux-list mailing list
> fedora-selinux-list@redhat.com
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list

# grep exim_t /var/log/audit/audit.log | audit2allow -M myexim
# semodule -i myexim.pp

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkhzsmAACgkQrlYvE4MpobMa5gCeIr4HtX8Alb DFpf1TtrrsSgds
CpAAoLGtkHFYteuwNKChSxRdmmZskI6p
=ZXKm
-----END PGP SIGNATURE-----

--
fedora-selinux-list mailing list
fedora-selinux-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
 

Thread Tools




All times are GMT. The time now is 11:39 PM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org