FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > Redhat > Fedora SELinux Support

 
 
LinkBack Thread Tools
 
Old 07-15-2008, 02:35 PM
Dan Thurman
 
Default Problems with logwatch, sagator and zope?

My logs are reporting many errors, one which appears here:
Jul 14 20:15:41 bronze setroubleshoot: SELinux is preventing 0logwatch
(logwatch_t) "read" to sagator (var_log_t). For complete SELinux
messages. run sealert -l 623798e3-17ec-4751-ae16-e2d92c397e72


.... And more here:
Jul 14 20:20:06 bronze logrotate: ALERT exited abnormally with [1]
Jul 14 20:22:02 bronze setroubleshoot: SELinux is preventing updatedb
(locate_t) "getattr" to /usr/share/sagator (sagator_t). For complete
SELinux messages. run sealert -l 54affa1b-dd31-4c24-b021-3e5ce8da3fe4


Jul 14 20:27:49 bronze setroubleshoot: SELinux is preventing logrotate
(logrotate_t) "getattr" to /var/lib/zope/etc/logrotate.conf (var_lib_t).
For complete SELinux messages. run sealert -l
0851295f-58e7-43d8-940c-614514dcfdad


================================================== ===============
# sealert -l 623798e3-17ec-4751-ae16-e2d92c397e72
==========================================
Summary:

SELinux is preventing 0logwatch (logwatch_t) "read" to sagator (var_log_t).

Detailed Description:

SELinux denied access requested by 0logwatch. It is not expected that this
access is required by 0logwatch and this access may signal an intrusion
attempt.

It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Allowing Access:

Sometimes labeling problems can cause SELinux denials. You could try to
restore

the default system file context for sagator,

restorecon -v 'sagator'

If this does not work, there is currently no automatic way to allow this
access.
Instead, you can generate a local policy module to allow this access -
see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can
disable
SELinux protection altogether. Disabling SELinux protection is not
recommended.

Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:

Source Context system_u:system_r:logwatch_t:s0
Target Context system_ubject_r:var_log_t:s0
Target Objects sagator [ lnk_file ]
Source 0logwatch
Source Path /usr/bin/perl
Port <Unknown>
Host bronze.cdkkt.com
Source RPM Packages perl-5.10.0-30.fc9
Target RPM Packages
Policy RPM selinux-policy-3.3.1-74.fc9

Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name catchall_file
Host Name bronze.cdkkt.com
Platform Linux bronze.cdkkt.com
2.6.25.9-76.fc9.i686 #1 SMP

Fri Jun 27 16:14:35 EDT 2008 i686 i686
Alert Count 8
First Seen Mon Jul 14 20:15:41 2008
Last Seen Mon Jul 14 20:15:41 2008
Local ID 623798e3-17ec-4751-ae16-e2d92c397e72
Line Numbers

Raw Audit Messages

host=bronze.cdkkt.com type=AVC msg=audit(1216091741.414:1543): avc:
denied { read } for pid=19074 comm="0logwatch" name="sagator" dev=sda6
ino=86871 scontext=system_u:system_r:logwatch_t:s0
tcontext=system_ubject_r:var_log_t:s0 tclass=lnk_file


host=bronze.cdkkt.com type=SYSCALL msg=audit(1216091741.414:1543):
arch=40000003 syscall=5 success=no exit=-13 a0=bf87c1c8 a1=98800
a2=8a67e30 a3=bf87c1c8 items=0 ppid=15038 pid=19074 auid=4294967295
uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none)
ses=4294967295 comm="0logwatch" exe="/usr/bin/perl"
subj=system_u:system_r:logwatch_t:s0 key=(null)


================================================== ===============
# sealert -l 0851295f-58e7-43d8-940c-614514dcfdad
# ls -lZ /var/lib/zope/etc/logrotate.conf
-rw-r--r-- root zope system_ubject_r:var_lib_t:s0
/var/lib/zope/etc/logrotate.conf

==========================================
Summary:

SELinux is preventing logrotate (logrotate_t) "getattr" to
/var/lib/zope/etc/logrotate.conf (var_lib_t).

Detailed Description:

SELinux denied access requested by logrotate. It is not expected that this
access is required by logrotate and this access may signal an intrusion
attempt.

It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Allowing Access:

Sometimes labeling problems can cause SELinux denials. You could try to
restore

the default system file context for /var/lib/zope/etc/logrotate.conf,

restorecon -v '/var/lib/zope/etc/logrotate.conf'

If this does not work, there is currently no automatic way to allow this
access.
Instead, you can generate a local policy module to allow this access -
see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can
disable
SELinux protection altogether. Disabling SELinux protection is not
recommended.

Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:

Source Context system_u:system_r:logrotate_t:s0
Target Context system_ubject_r:var_lib_t:s0
Target Objects /var/lib/zope/etc/logrotate.conf [ file ]
Source logrotate
Source Path /usr/sbin/logrotate
Port <Unknown>
Host bronze.cdkkt.com
Source RPM Packages logrotate-3.7.6-5.fc9
Target RPM Packages compat-zope-2.10.5-3.lvn9
Policy RPM selinux-policy-3.3.1-74.fc9
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name catchall_file
Host Name bronze.cdkkt.com
Platform Linux bronze.cdkkt.com
2.6.25.9-76.fc9.i686 #1 SMP

Fri Jun 27 16:14:35 EDT 2008 i686 i686
Alert Count 1
First Seen Mon Jul 14 20:27:49 2008
Last Seen Mon Jul 14 20:27:49 2008
Local ID 0851295f-58e7-43d8-940c-614514dcfdad
Line Numbers

Raw Audit Messages

host=bronze.cdkkt.com type=AVC msg=audit(1216092469.664:1690): avc:
denied { getattr } for pid=6689 comm="logrotate"
path="/var/lib/zope/etc/logrotate.conf" dev=sda6 ino=2220768
scontext=system_u:system_r:logrotate_t:s0
tcontext=system_ubject_r:var_lib_t:s0 tclass=file


host=bronze.cdkkt.com type=SYSCALL msg=audit(1216092469.664:1690):
arch=40000003 syscall=195 success=no exit=-13 a0=bfb60ec5 a1=bfb5fa2c
a2=bcbff4 a3=bfb5fac4 items=0 ppid=6687 pid=6689 auid=4294967295 uid=0
gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none)
ses=4294967295 comm="logrotate" exe="/usr/sbin/logrotate"
subj=system_u:system_r:logrotate_t:s0 key=(null)

================================================== ===============

--
fedora-selinux-list mailing list
fedora-selinux-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
 
Old 07-16-2008, 01:59 PM
Daniel J Walsh
 
Default Problems with logwatch, sagator and zope?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dan Thurman wrote:
>
> My logs are reporting many errors, one which appears here:
> Jul 14 20:15:41 bronze setroubleshoot: SELinux is preventing 0logwatch
> (logwatch_t) "read" to sagator (var_log_t). For complete SELinux
> messages. run sealert -l 623798e3-17ec-4751-ae16-e2d92c397e72
>
> .... And more here:
> Jul 14 20:20:06 bronze logrotate: ALERT exited abnormally with [1]
> Jul 14 20:22:02 bronze setroubleshoot: SELinux is preventing updatedb
> (locate_t) "getattr" to /usr/share/sagator (sagator_t). For complete
> SELinux messages. run sealert -l 54affa1b-dd31-4c24-b021-3e5ce8da3fe4
>
> Jul 14 20:27:49 bronze setroubleshoot: SELinux is preventing logrotate
> (logrotate_t) "getattr" to /var/lib/zope/etc/logrotate.conf (var_lib_t).
> For complete SELinux messages. run sealert -l
> 0851295f-58e7-43d8-940c-614514dcfdad
>
> ================================================== ===============
> # sealert -l 623798e3-17ec-4751-ae16-e2d92c397e72
> ==========================================
> Summary:
>
> SELinux is preventing 0logwatch (logwatch_t) "read" to sagator (var_log_t).
>
> Detailed Description:
>
> SELinux denied access requested by 0logwatch. It is not expected that this
> access is required by 0logwatch and this access may signal an intrusion
> attempt.
> It is also possible that the specific version or configuration of the
> application is causing it to require additional access.
>
> Allowing Access:
>
> Sometimes labeling problems can cause SELinux denials. You could try to
> restore
> the default system file context for sagator,
>
> restorecon -v 'sagator'
>
> If this does not work, there is currently no automatic way to allow this
> access.
> Instead, you can generate a local policy module to allow this access -
> see FAQ
> (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can
> disable
> SELinux protection altogether. Disabling SELinux protection is not
> recommended.
> Please file a bug report
> (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
> against this package.
>
> Additional Information:
>
> Source Context system_u:system_r:logwatch_t:s0
> Target Context system_ubject_r:var_log_t:s0
> Target Objects sagator [ lnk_file ]
> Source 0logwatch
> Source Path /usr/bin/perl
> Port <Unknown>
> Host bronze.cdkkt.com
> Source RPM Packages perl-5.10.0-30.fc9
> Target RPM Packages Policy RPM
> selinux-policy-3.3.1-74.fc9
> Selinux Enabled True
> Policy Type targeted
> MLS Enabled True
> Enforcing Mode Enforcing
> Plugin Name catchall_file
> Host Name bronze.cdkkt.com
> Platform Linux bronze.cdkkt.com
> 2.6.25.9-76.fc9.i686 #1 SMP
> Fri Jun 27 16:14:35 EDT 2008 i686 i686
> Alert Count 8
> First Seen Mon Jul 14 20:15:41 2008
> Last Seen Mon Jul 14 20:15:41 2008
> Local ID 623798e3-17ec-4751-ae16-e2d92c397e72
> Line Numbers
> Raw Audit Messages
> host=bronze.cdkkt.com type=AVC msg=audit(1216091741.414:1543): avc:
> denied { read } for pid=19074 comm="0logwatch" name="sagator" dev=sda6
> ino=86871 scontext=system_u:system_r:logwatch_t:s0
> tcontext=system_ubject_r:var_log_t:s0 tclass=lnk_file
>
> host=bronze.cdkkt.com type=SYSCALL msg=audit(1216091741.414:1543):
> arch=40000003 syscall=5 success=no exit=-13 a0=bf87c1c8 a1=98800
> a2=8a67e30 a3=bf87c1c8 items=0 ppid=15038 pid=19074 auid=4294967295
> uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none)
> ses=4294967295 comm="0logwatch" exe="/usr/bin/perl"
> subj=system_u:system_r:logwatch_t:s0 key=(null)
>
> ================================================== ===============
> # sealert -l 0851295f-58e7-43d8-940c-614514dcfdad
> # ls -lZ /var/lib/zope/etc/logrotate.conf
> -rw-r--r-- root zope system_ubject_r:var_lib_t:s0
> /var/lib/zope/etc/logrotate.conf
> ==========================================
> Summary:
>
> SELinux is preventing logrotate (logrotate_t) "getattr" to
> /var/lib/zope/etc/logrotate.conf (var_lib_t).
>
> Detailed Description:
>
> SELinux denied access requested by logrotate. It is not expected that this
> access is required by logrotate and this access may signal an intrusion
> attempt.
> It is also possible that the specific version or configuration of the
> application is causing it to require additional access.
>
> Allowing Access:
>
> Sometimes labeling problems can cause SELinux denials. You could try to
> restore
> the default system file context for /var/lib/zope/etc/logrotate.conf,
>
> restorecon -v '/var/lib/zope/etc/logrotate.conf'
>
> If this does not work, there is currently no automatic way to allow this
> access.
> Instead, you can generate a local policy module to allow this access -
> see FAQ
> (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can
> disable
> SELinux protection altogether. Disabling SELinux protection is not
> recommended.
> Please file a bug report
> (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
> against this package.
>
> Additional Information:
>
> Source Context system_u:system_r:logrotate_t:s0
> Target Context system_ubject_r:var_lib_t:s0
> Target Objects /var/lib/zope/etc/logrotate.conf [ file ]
> Source logrotate
> Source Path /usr/sbin/logrotate
> Port <Unknown>
> Host bronze.cdkkt.com
> Source RPM Packages logrotate-3.7.6-5.fc9
> Target RPM Packages compat-zope-2.10.5-3.lvn9
> Policy RPM selinux-policy-3.3.1-74.fc9
> Selinux Enabled True
> Policy Type targeted
> MLS Enabled True
> Enforcing Mode Enforcing
> Plugin Name catchall_file
> Host Name bronze.cdkkt.com
> Platform Linux bronze.cdkkt.com
> 2.6.25.9-76.fc9.i686 #1 SMP
> Fri Jun 27 16:14:35 EDT 2008 i686 i686
> Alert Count 1
> First Seen Mon Jul 14 20:27:49 2008
> Last Seen Mon Jul 14 20:27:49 2008
> Local ID 0851295f-58e7-43d8-940c-614514dcfdad
> Line Numbers
> Raw Audit Messages
> host=bronze.cdkkt.com type=AVC msg=audit(1216092469.664:1690): avc:
> denied { getattr } for pid=6689 comm="logrotate"
> path="/var/lib/zope/etc/logrotate.conf" dev=sda6 ino=2220768
> scontext=system_u:system_r:logrotate_t:s0
> tcontext=system_ubject_r:var_lib_t:s0 tclass=file
>
> host=bronze.cdkkt.com type=SYSCALL msg=audit(1216092469.664:1690):
> arch=40000003 syscall=195 success=no exit=-13 a0=bfb60ec5 a1=bfb5fa2c
> a2=bcbff4 a3=bfb5fac4 items=0 ppid=6687 pid=6689 auid=4294967295 uid=0
> gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none)
> ses=4294967295 comm="logrotate" exe="/usr/sbin/logrotate"
> subj=system_u:system_r:logrotate_t:s0 key=(null)
> ================================================== ===============
>
> --
> fedora-selinux-list mailing list
> fedora-selinux-list@redhat.com
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
Open buzilla's on Zope to put their stuff in normal locations.

/var/lib/zope/etc/logrotate.conf jeesh...

CC me on the bugzilla.

You can add these rules using audit2allow


# grep log /var/log/audit/audit.log | myzopeinweirddir.pp
# semodule -i myzopeinweirddir.pp
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkh9/skACgkQrlYvE4MpobOZVgCgsJ/uyGIpEG4kmEPgfASUJlGr
f2QAoNrr8+UyAYv6b3LORpjHEn7quJO4
=bySZ
-----END PGP SIGNATURE-----

--
fedora-selinux-list mailing list
fedora-selinux-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
 

Thread Tools




All times are GMT. The time now is 07:31 AM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org