I just finished putting a new test box after the old one finally gave up the ghost. Everything seems to be working okay, EXCEPT for selinux. To be safe, I started with selinux in permissive mode. And I'm glad I did because of all the errors showing up for things that had BETTER not show errors. Things like auth,  sshd, etc...

Here's a sample of the errors I'm seeing

Apr 25 19:36:09 jupiter kernel: audit: type=1400 audit(1619400969.224:485): avc:  denied  { getattr } for  pid=8100 comm="auth" path="/etc/mysql/mariadb.d" dev="vda1" ino=271985181 scontext=system_u:system_r:dovecot_auth_t tcontext=system_u:object_r:mysqld_etc_t tclass=dir permissive=1 Apr 25 19:36:09 jupiter kernel: audit: type=1400 audit(1619400969.224:486): avc:  denied  { search } for  pid=8100 comm="auth" name="mysqld" dev="tmpfs" ino=160 scontext=system_u:system_r:dovecot_auth_t tcontext=system_u:object_r:mysqld_runtime_t tclass=dir permissive=1 Apr 25 19:36:09 jupiter kernel: audit: type=1400 audit(1619400969.224:487): avc:  denied  { write } for  pid=8100 comm="auth" name="mysqld.sock" dev="tmpfs" ino=161 scontext=system_u:system_r:dovecot_auth_t tcontext=system_u:object_r:mysqld_runtime_t tclass=sock_file permissive=1 Apr 25 19:36:09 jupiter kernel: audit: type=1400 audit(1619400969.224:488): avc:  denied  { connectto } for pid=8100 comm="auth" path="/run/mysqld/mysqld.sock" scontext=system_u:system_r:dovecot_auth_t tcontext=system_u:system_r:initrc_t tclass=unix_stream_socket permissive=1 Apr 25 19:36:50 jupiter kernel: audit: type=1400 audit(1619401010.244:490): avc:  denied  { create } for  pid=8172 comm="smbd" name="8172" scontext=system_u:system_r:smbd_t tcontext=system_u:object_r:var_lock_t tclass=file permissive=1 Apr 25 19:36:50 jupiter kernel: audit: type=1400 audit(1619401010.244:491): avc:  denied  { read write open } for pid=8172 comm="smbd" path="/run/lock/samba/msg.lock/8172" dev="tmpfs" ino=669 scontext=system_u:system_r:smbd_t tcontext=system_u:object_r:var_lock_t tclass=file permissive=1 Apr 25 19:36:50 jupiter kernel: audit: type=1400 audit(1619401010.244:492): avc:  denied  { lock } for  pid=8172 comm="smbd" path="/run/lock/samba/msg.lock/8172" dev="tmpfs" ino=669 scontext=system_u:system_r:smbd_t tcontext=system_u:object_r:var_lock_t tclass=file permissive=1 Apr 25 19:36:50 jupiter kernel: audit: type=1400 audit(1619401010.444:493): avc:  denied  { unlink } for  pid=8175 comm="smbd" name="8175" dev="tmpfs" ino=670 scontext=system_u:system_r:smbd_t tcontext=system_u:object_r:var_lock_t tclass=file permissive=1 Apr 25 19:38:35 jupiter kernel: audit: type=1400 audit(1619401115.314:494): avc:  denied  { connectto } for pid=4350 comm="apache2" path="/run/mysqld/mysqld.sock" scontext=system_u:system_r:httpd_t tcontext=system_u:system_r:initrc_t tclass=unix_stream_socket permissive=1 Apr 25 19:39:44 jupiter kernel: audit: type=1400 audit(1619401184.815:495): avc:  denied  { read } for  pid=8450 comm="smbd" name="lock" dev="vda1" ino=492466 scontext=system_u:system_r:smbd_t tcontext=system_u:object_r:var_lock_t tclass=lnk_file permissive=1 Apr 25 19:42:00 jupiter kernel: audit: type=1400 audit(1619401320.875:496): avc:  denied  { write } for  pid=8852 comm="lpqd" name="msg.lock" dev="tmpfs" ino=516 scontext=system_u:system_r:smbd_t tcontext=system_u:object_r:var_lock_t tclass=dir permissive=1 Apr 25 19:42:00 jupiter kernel: audit: type=1400 audit(1619401320.875:497): avc:  denied  { remove_name } for pid=8852 comm="lpqd" name="8852" dev="tmpfs" ino=697 scontext=system_u:system_r:smbd_t tcontext=system_u:object_r:var_lock_t tclass=dir permissive=1 Apr 25 19:42:00 jupiter kernel: audit: type=1400 audit(1619401320.875:498): avc:  denied  { sendto } for  pid=5984 comm="lpqd" path="/var/lib/samba/private/msg.sock/5797" scontext=system_u:system_r:smbd_t tcontext=system_u:system_r:initrc_t tclass=unix_dgram_socket permissive=1 Apr 25 19:42:00 jupiter kernel: audit: type=1400 audit(1619401320.875:499): avc:  denied  { sendto } for  pid=5984 comm="lpqd" path="/var/lib/samba/private/msg.sock/5919" scontext=system_u:system_r:smbd_t tcontext=system_u:system_r:winbind_t tclass=unix_dgram_socket permissive=1 Apr 25 19:42:12 jupiter kernel: audit: type=1400 audit(1619401332.945:500): avc:  denied  { add_name } for pid=8865 comm="smbd" name="8865" scontext=system_u:system_r:smbd_t tcontext=system_u:object_r:var_lock_t tclass=dir permissive=1 Apr 25 19:44:31 jupiter kernel: audit: type=1400 audit(1619401471.206:501): avc:  denied  { read } for  pid=9056 comm="winbindd" name="lock" dev="vda1" ino=492466 scontext=system_u:system_r:winbind_t tcontext=system_u:object_r:var_lock_t tclass=lnk_file permissive=1 Apr 25 19:44:31 jupiter kernel: audit: type=1400 audit(1619401471.206:502): avc:  denied  { search } for  pid=9056 comm="winbindd" name="lock" dev="tmpfs" ino=454 scontext=system_u:system_r:winbind_t tcontext=system_u:object_r:var_lock_t tclass=dir permissive=1 Apr 25 19:44:31 jupiter kernel: audit: type=1400 audit(1619401471.206:503): avc:  denied  { getattr } for  pid=9056 comm="winbindd" path="/run/lock/samba" dev="tmpfs" ino=462 scontext=system_u:system_r:winbind_t tcontext=system_u:object_r:var_lock_t tclass=dir permissive=1 Apr 25 19:44:31 jupiter kernel: audit: type=1400 audit(1619401471.206:504): avc:  denied  { write } for  pid=9056 comm="winbindd" name="msg.lock" dev="tmpfs" ino=516 scontext=system_u:system_r:winbind_t tcontext=system_u:object_r:var_lock_t tclass=dir permissive=1 Apr 25 19:44:31 jupiter kernel: audit: type=1400 audit(1619401471.206:505): avc:  denied  { add_name } for pid=9056 comm="winbindd" name="9056" scontext=system_u:system_r:winbind_t tcontext=system_u:object_r:var_lock_t tclass=dir permissive=1 Apr 25 19:44:31 jupiter kernel: audit: type=1400 audit(1619401471.206:506): avc:  denied  { create } for  pid=9056 comm="winbindd" name="9056" scontext=system_u:system_r:winbind_t tcontext=system_u:object_r:var_lock_t tclass=file permissive=1 Apr 25 19:44:31 jupiter kernel: audit: type=1400 audit(1619401471.206:507): avc:  denied  { read write open } for pid=9056 comm="winbindd" path="/run/lock/samba/msg.lock/9056" dev="tmpfs" ino=709 scontext=system_u:system_r:winbind_t tcontext=system_u:object_r:var_lock_t tclass=file permissive=1 Apr 25 19:44:31 jupiter kernel: audit: type=1400 audit(1619401471.206:508): avc:  denied  { lock } for  pid=9056 comm="winbindd" path="/run/lock/samba/msg.lock/9056" dev="tmpfs" ino=709 scontext=system_u:system_r:winbind_t tcontext=system_u:object_r:var_lock_t tclass=file permissive=1 Apr 25 20:00:11 jupiter kernel: audit: type=1400 audit(1619402411.709:509): avc:  denied  { search } for  pid=10897 comm="sshd" name="root" dev="vda1" ino=996517 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:default_t tclass=dir permissive=1 Apr 25 20:00:11 jupiter kernel: audit: type=1400 audit(1619402411.709:510): avc:  denied  { read } for  pid=10897 comm="sshd" name="authorized_keys" dev="vda1" ino=272988282 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:default_t tclass=file permissive=1


First thing I tried was restorecon. I did restorecon -r / to ensure that the entire directory tree was updated correctly. The errors above are AFTER restorecon.  I am using the targeted policy right now. I figured it would work for the first tests and I could upgrade to strict later. But if I can't even get targeted to work correctly, then I'm really in trouble.

Any tips?

--
Dan Egli
From my Test Server


Reply via email to