1 |
On Wed, 2007-08-01 at 11:53 +0200, julien.thomas@×××××××××××××.fr wrote: |
2 |
> Thanks for the tip with ssh. This work really well now. |
3 |
> |
4 |
> Unefortunately, it is not the only error I got with SELinux. |
5 |
> Some files were not correctly labelled (though I don't know how many |
6 |
> rlpkg -ar were done ...) |
7 |
> |
8 |
> For example here is a result of audit2allow. But the most important |
9 |
> problem, I think, is the networks error with for example allow |
10 |
> kernel_t lo_node_t:node udp_recv. |
11 |
> |
12 |
> For a full example, I have added the kernel messages |
13 |
> (/var/log/kern.log | grep portmap) produced by the portmap daemon. I |
14 |
> think that it s a recurrent error that is not produced by the daemon |
15 |
> but more by a network/kernel wrong labelling/policy. |
16 |
> |
17 |
> If someone has any clue about this, I will take it as I cannot find |
18 |
> any relevant information on the web. |
19 |
|
20 |
At a minimum, the portmap service is running in the wrong domain: |
21 |
|
22 |
> allow initrc_t inaddr_any_node_t:tcp_socket node_bind; |
23 |
> allow initrc_t pop_port_t:tcp_socket name_bind; |
24 |
> allow initrc_t unspec_node_t:tcp_socket node_bind; |
25 |
> allow initrc_t var_lib_t:sock_file { create rename setattr unlink }; |
26 |
|
27 |
-- |
28 |
Chris PeBenito |
29 |
<pebenito@g.o> |
30 |
Developer, |
31 |
Hardened Gentoo Linux |
32 |
|
33 |
Public Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xE6AF9243 |
34 |
Key fingerprint = B0E6 877A 883F A57A 8E6A CB00 BC8E E42D E6AF 9243 |