FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > Redhat > Fedora User

 
 
LinkBack Thread Tools
 
Old 12-10-2007, 03:54 AM
"Daniel B. Thurman"
 
Default Sendmail, SpamAssasin, ClamAV and SELinux

SELinux is preventing Sendmail from accessing spamass-milter.sock
and clamav-milter.sock in their respective /var/run subdirectories.

The /var/run/{clamav-milter,spamass-milter} attributes are:

/var/run/clamav-milter var_run_t
/var/run/clamav-milter/clamav-milter.sock: var_run_t

/var/run/spamass-milter var_run_t
/var/run/spamass-milter/spamass-milter.sock: spamd_var_run

The MAIN problem is that even though it is NOT a problem starting
the spamassasin and clamav programs but the sendmail program
fails to start up because sendmail is denied permissions to access
the clamav and spamass milter directory/file in /var/run areas.

The sendmail.mc(cf) file has input-filters installed in them so that is
why sendmail wants to use the clamav and spamassasin filters but
is prevented from doing so due to selinux access permission denials.

Sendmail has sendmail_t selinux tags but how is it allowed to access
either of the above sock files if no selinux tags are assigned to neither?

Please advise.

Thanks!
Dan


No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.5.503 / Virus Database: 269.16.17/1178 - Release Date: 12/8/2007 11:59 AM


--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
 
Old 12-10-2007, 06:43 PM
"Daniel B. Thurman"
 
Default Sendmail, SpamAssasin, ClamAV and SELinux

Daniel B. Thurman wrote:
>Sent: Sunday, December 09, 2007 8:54 PM
>To: Fedora-List (E-mail)
>Subject: [F8] Sendmail, SpamAssasin, ClamAV and SELinux
>
>
>
>SELinux is preventing Sendmail from accessing spamass-milter.sock
>and clamav-milter.sock in their respective /var/run subdirectories.
>
>The /var/run/{clamav-milter,spamass-milter} attributes are:
>
>/var/run/clamav-milter var_run_t
>/var/run/clamav-milter/clamav-milter.sock: var_run_t
>
>/var/run/spamass-milter var_run_t
>/var/run/spamass-milter/spamass-milter.sock: spamd_var_run
>
>The MAIN problem is that even though it is NOT a problem starting
>the spamassasin and clamav programs but the sendmail program
>fails to start up because sendmail is denied permissions to access
>the clamav and spamass milter directory/file in /var/run areas.
>
>The sendmail.mc(cf) file has input-filters installed in them so that is
>why sendmail wants to use the clamav and spamassasin filters but
>is prevented from doing so due to selinux access permission denials.
>
>Sendmail has sendmail_t selinux tags but how is it allowed to access
>either of the above sock files if no selinux tags are assigned
>to neither?
>
>Please advise.
>
>Thanks!
>Dan
>
>--

Here are the SELinux reports for more details. I have disabled
clamav and spamassassin from the sendmail.mc file for now.

================================================== ========
Summary
SELinux is preventing /usr/sbin/sendmail.sendmail (sendmail_t) "getattr" to
/var/run/clamav-milter/clamav.sock (var_run_t).

Detailed Description
SELinux denied access requested by /usr/sbin/sendmail.sendmail. It is not
expected that this access is required by /usr/sbin/sendmail.sendmail and
this access may signal an intrusion attempt. It is also possible that the
specific version or configuration of the application is causing it to
require additional access.

Allowing Access
Sometimes labeling problems can cause SELinux denials. You could try to
restore the default system file context for /var/run/clamav-
milter/clamav.sock, restorecon -v /var/run/clamav-milter/clamav.sock If this
does not work, there is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see
http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385 Or you can disable
SELinux protection altogether. Disabling SELinux protection is not
recommended. Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi
against this package.

Additional Information

Source Context system_u:system_r:sendmail_t:s0
Target Context system_ubject_r:var_run_t:s0
Target Objects /var/run/clamav-milter/clamav.sock [ sock_file ]
Affected RPM Packages sendmail-8.14.2-1.fc8 [application]clamav-
milter-0.91.2-3.fc8 [target]
Policy RPM selinux-policy-3.0.8-62.fc8
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name plugins.catchall_file
Host Name linux.cdkkt.com
Platform Linux linux.cdkkt.com 2.6.23.8-63.fc8 #1 SMP Wed
Nov 21 18:51:08 EST 2007 i686 i686
Alert Count 3
First Seen Mon 10 Dec 2007 11:02:42 AM PST
Last Seen Mon 10 Dec 2007 11:28:29 AM PST
Local ID f06fe44d-c540-45eb-b792-2949a7404482
Line Numbers

Raw Audit Messages

avc: denied { getattr } for comm=sendmail dev=sda2 egid=51 euid=0
exe=/usr/sbin/sendmail.sendmail exit=-13 fsgid=51 fsuid=0 gid=0 items=0
path=/var/run/clamav-milter/clamav.sock pid=7622
scontext=system_u:system_r:sendmail_t:s0 sgid=51
subj=system_u:system_r:sendmail_t:s0 suid=0 tclass=sock_file
tcontext=system_ubject_r:var_run_t:s0 tty=pts7 uid=0


Summary
SELinux is preventing spamassassin (procmail_t) "write" to <Unknown>
(clamd_var_lib_t).

Detailed Description
SELinux denied access requested by spamassassin. It is not expected that
this access is required by spamassassin and this access may signal an
intrusion attempt. It is also possible that the specific version or
configuration of the application is causing it to require additional access.

Allowing Access
Sometimes labeling problems can cause SELinux denials. You could try to
restore the default system file context for <Unknown>, restorecon -v
<Unknown> If this does not work, there is currently no automatic way to
allow this access. Instead, you can generate a local policy module to allow
this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385
Or you can disable SELinux protection altogether. Disabling SELinux
protection is not recommended. Please file a
http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package.

Additional Information

Source Context system_u:system_rrocmail_t:s0
Target Context system_ubject_r:clamd_var_lib_t:s0
Target Objects None [ dir ]
Affected RPM Packages
Policy RPM selinux-policy-3.0.8-62.fc8
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name plugins.catchall_file
Host Name linux.cdkkt.com
Platform Linux linux.cdkkt.com 2.6.23.8-63.fc8 #1 SMP Wed
Nov 21 18:51:08 EST 2007 i686 i686
Alert Count 9
First Seen Mon 10 Dec 2007 10:22:35 AM PST
Last Seen Mon 10 Dec 2007 11:21:37 AM PST
Local ID 0dec68d7-43d0-4140-b747-1fb2300de7ed
Line Numbers

Raw Audit Messages

avc: denied { write } for comm=spamassassin dev=sda2 egid=491 euid=496
exe=/usr/bin/perl exit=-13 fsgid=491 fsuid=496 gid=491 items=0 name=clamav
pid=7447 scontext=system_u:system_rrocmail_t:s0 sgid=491
subj=system_u:system_rrocmail_t:s0 suid=496 tclass=dir
tcontext=system_ubject_r:clamd_var_lib_t:s0 tty=(none) uid=496


Summary
SELinux is preventing /usr/sbin/sendmail.sendmail (sendmail_t) "search" to
<Unknown> (spamd_var_run_t).

Detailed Description
SELinux denied access requested by /usr/sbin/sendmail.sendmail. It is not
expected that this access is required by /usr/sbin/sendmail.sendmail and
this access may signal an intrusion attempt. It is also possible that the
specific version or configuration of the application is causing it to
require additional access.

Allowing Access
Sometimes labeling problems can cause SELinux denials. You could try to
restore the default system file context for <Unknown>, restorecon -v
<Unknown> If this does not work, there is currently no automatic way to
allow this access. Instead, you can generate a local policy module to allow
this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385
Or you can disable SELinux protection altogether. Disabling SELinux
protection is not recommended. Please file a
http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package.

Additional Information

Source Context system_u:system_r:sendmail_t:s0
Target Context system_ubject_r:spamd_var_run_t:s0
Target Objects None [ dir ]
Affected RPM Packages sendmail-8.14.2-1.fc8 [application]
Policy RPM selinux-policy-3.0.8-62.fc8
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name plugins.catchall_file
Host Name linux.cdkkt.com
Platform Linux linux.cdkkt.com 2.6.23.8-63.fc8 #1 SMP Wed
Nov 21 18:51:08 EST 2007 i686 i686
Alert Count 3
First Seen Mon 10 Dec 2007 11:02:42 AM PST
Last Seen Mon 10 Dec 2007 11:03:30 AM PST
Local ID 2c99868b-1707-4ecf-b3b8-ea0f4f092b3b
Line Numbers

Raw Audit Messages

avc: denied { search } for comm=sendmail dev=sda2 egid=51 euid=0
exe=/usr/sbin/sendmail.sendmail exit=-13 fsgid=51 fsuid=0 gid=0 items=0 name
=spamass-milter pid=7147 scontext=system_u:system_r:sendmail_t:s0 sgid=51
subj=system_u:system_r:sendmail_t:s0 suid=0 tclass=dir
tcontext=system_ubject_r:spamd_var_run_t:s0 tty=pts7 uid=0


Summary
SELinux is preventing /usr/sbin/sendmail.sendmail (sendmail_t) "getattr" to
/var/run/spamass-milter (spamd_var_run_t).

Detailed Description
SELinux denied access requested by /usr/sbin/sendmail.sendmail. It is not
expected that this access is required by /usr/sbin/sendmail.sendmail and
this access may signal an intrusion attempt. It is also possible that the
specific version or configuration of the application is causing it to
require additional access.

Allowing Access
Sometimes labeling problems can cause SELinux denials. You could try to
restore the default system file context for /var/run/spamass-milter,
restorecon -v /var/run/spamass-milter If this does not work, there is
currently no automatic way to allow this access. Instead, you can generate
a local policy module to allow this access - see
http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385 Or you can disable
SELinux protection altogether. Disabling SELinux protection is not
recommended. Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi
against this package.

Additional Information

Source Context system_u:system_r:sendmail_t:s0
Target Context system_ubject_r:spamd_var_run_t:s0
Target Objects /var/run/spamass-milter [ dir ]
Affected RPM Packages sendmail-8.14.2-1.fc8 [application]spamass-
milter-0.3.1-5.fc8 [target]
Policy RPM selinux-policy-3.0.8-62.fc8
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name plugins.catchall_file
Host Name linux.cdkkt.com
Platform Linux linux.cdkkt.com 2.6.23.8-63.fc8 #1 SMP Wed
Nov 21 18:51:08 EST 2007 i686 i686
Alert Count 3
First Seen Mon 10 Dec 2007 11:02:42 AM PST
Last Seen Mon 10 Dec 2007 11:03:30 AM PST
Local ID 55aa49d1-3ea7-4e6a-80a6-087c37eaf2ba
Line Numbers

Raw Audit Messages

avc: denied { getattr } for comm=sendmail dev=sda2 egid=51 euid=0
exe=/usr/sbin/sendmail.sendmail exit=-13 fsgid=51 fsuid=0 gid=0 items=0
path=/var/run/spamass-milter pid=7147 scontext=system_u:system_r:sendmail_t:s0
sgid=51 subj=system_u:system_r:sendmail_t:s0 suid=0 tclass=dir
tcontext=system_ubject_r:spamd_var_run_t:s0 tty=pts7 uid=0
================================================== =============================

No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.5.503 / Virus Database: 269.16.17/1179 - Release Date: 12/9/2007 11:06 AM


--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
 

Thread Tools




All times are GMT. The time now is 03:33 AM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org