Hi guys.

I have a seemingly healthy, working postfix yet logs are full of denials, one specific denial, so I wonder if that is perhaps some misconfiguration on my part, although again, all seem to work.
Any/all thoughts are much appreciated. Thanks.

In short, that would be needed (at least)
#============= postfix_postdrop_t ==============
allow postfix_postdrop_t cluster_t:fifo_file { getattr write };

Long/full log:
SELinux is preventing /usr/sbin/postdrop from write access on the fifo_file fifo_file.

*****  Plugin leaks (86.2 confidence) suggests *****************************

If you want to ignore postdrop trying to write access the fifo_file fifo_file, because you believe it should not need this access.
Then you should report this as a bug.
You can generate a local policy module to dontaudit this access.
Do
# ausearch -x /usr/sbin/postdrop --raw | audit2allow -D -M my-postdrop
# semodule -X 300 -i my-postdrop.pp

*****  Plugin catchall (14.7 confidence) suggests **************************

If you believe that postdrop should be allowed write access on the fifo_file fifo_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop
# semodule -X 300 -i my-postdrop.pp


Additional Information:
Source Context system_u:system_r:postfix_postdrop_t:s0
Target Context                system_u:system_r:cluster_t:s0
Target Objects                fifo_file [ fifo_file ]
Source                        postdrop
Source Path                   /usr/sbin/postdrop
Port                          <Unknown>
Host                          dzien.mine.priv
Source RPM Packages           postfix-3.5.25-1.el9.x86_64
Target RPM Packages
SELinux Policy RPM selinux-policy-targeted-38.1.58-1.el9.noarch
Local Policy RPM selinux-policy-targeted-38.1.58-1.el9.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     dzien.mine.priv
Platform                      Linux dzien.mine.priv 5.14.0-590.el9.x86_64 #1 SMP                               PREEMPT_DYNAMIC Fri May 30 21:16:05 UTC 2025
                              x86_64 x86_64
Alert Count                   80290
First Seen                    2024-02-06 14:18:17 CET
Last Seen                     2025-06-17 18:04:13 CEST
Local ID                      55748187-757f-4b1f-964f-28838a6a4e89

Raw Audit Messages
type=AVC msg=audit(1750176253.213:848448): avc:  denied  { write } for  pid=831496 comm="postdrop" path="pipe:[65326834]" dev="pipefs" ino=65326834 scontext=system_u:system_r:postfix_postdrop_t:s0 tcontext=system_u:system_r:cluster_t:s0 tclass=fifo_file permissive=0


type=SYSCALL msg=audit(1750176253.213:848448): arch=x86_64 syscall=execve success=yes exit=0 a0=55f6a1e404c0 a1=55f6a1e404f0 a2=55f6a1e40f00 a3=55f6a1e40600 items=0 ppid=831493 pid=831496 auid=4294967295 uid=189 gid=189 euid=189 suid=189 fsuid=189 egid=90 sgid=90 fsgid=90 tty=(none) ses=4294967295 comm=postdrop exe=/usr/sbin/postdrop subj=system_u:system_r:postfix_postdrop_t:s0 key=(null)

Hash: postdrop,postfix_postdrop_t,cluster_t,fifo_file,write
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to