I also just wrote an setroubleshoot description for this error.

Summary
SELinux is preventing the users from running TCP servers in the usedomain.

Detailed Description
SELinux has denied the nc program from binding to a network port 3333 which
   does not have an SELinux type associated with it. nc does not have an
SELinux policy defined for it when run by the user, so it runs in the users domain. The userdomain currently does not allow TCP server to run within its domain. If you did not expect programs like nc to be network bind, this
   could signal a intrusion attempt. If this system is running as an NIS
Client, turning on the allow_ypbind boolean, may fix the problem. setsebool
   -P allow_ypbind=1.

Allowing Access
If you want to allow user programs to run as TCP Servers, you can turn on the user_tcp_server boolean, by executing: setsebool -P user_tcp_server=1

   The following command will allow this access:
   setsebool -P user_tcp_server=1

Additional Information
Source Context                root:user_r:user_t:s0-s15:c0.c1023
Target Context                system_u:object_r:port_t
Target Objects                None [ tcp_socket ]
Affected RPM Packages Policy RPM Selinux Enabled Policy Type MLS Enabled Enforcing Mode Plugin Name plugins.user_tcp_server Host Name Platform Alert Count 1
Line Numbers                  1

Raw Audit Messages
avc: denied { name_bind } for comm="nc" pid=31873
scontext=root:user_r:user_t:s0-s15:c0.c1023 src=3333 tclass=tcp_socket
tcontext=system_u:object_r:port_t:s0



--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to