Hello,
I have deployed Bugzilla 3.6.2 on CentOS 5 (with rpmforge perl-*
packages) and I have a problem with SELinux preventing mail being sent
via sendmail.
(see SELinux reports below, especially the second one)
When SELinux is in permissive mode, mail sending from Bugzilla is
working properly.
Has anybody got recent Bugzilla to work with SELinux on CentOS?
Thanks in advance!
Mathieu
--------------------------------------------------------------------------------
Summary:
SELinux is preventing the sendmail from using potentially mislabeled files
./spool (var_spool_t).
Detailed Description:
SELinux has denied the sendmail access to potentially mislabeled files ./spool.
This means that SELinux will not allow httpd to use these files. Many third
party apps install html files in directories that SELinux policy cannot predict.
These directories have to be labeled with a file context which httpd can access.
Allowing Access:
If you want to change the file context of ./spool so that the httpd daemon can
access it, you need to execute it using chcon -t httpd_sys_content_t
'./spool'.
You can look at the httpd_selinux man page for additional information.
Additional Information:
Source Context system_u:system_r:httpd_bugzilla_script_t
Target Context system_u:object_r:var_spool_t
Target Objects ./spool [ dir ]
Source sendmail
Source Path /usr/sbin/sendmail.sendmail
Port <Unknown>
Host <Unknown>
Source RPM Packages sendmail-8.13.8-8.el5
Target RPM Packages
Policy RPM selinux-policy-2.4.6-279.el5_5.1
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name httpd_bad_labels
Host Name www
Platform Linux www 2.6.18-194.11.4.el5 #1 SMP Tue Sep 21
05:04:09 EDT 2010 x86_64 x86_64
Alert Count 1
First Seen Mon Sep 27 02:07:43 2010
Last Seen Mon Sep 27 02:07:43 2010
Local ID 24372577-2d4c-4bbe-be6b-ea9100b7c3ed
Line Numbers 11701, 11702
Raw Audit Messages
type=AVC msg=audit(1285546063.60:15): avc: denied { search } for
pid=3420 comm="sendmail" name="spool" dev=dm-2 ino=158722
scontext=system_u:system_r:httpd_bugzilla_script_t:s0
tcontext=system_u:object_r:var_spool_t:s0 tclass=dir
type=SYSCALL msg=audit(1285546063.60:15): arch=c000003e syscall=80
success=no exit=-13 a0=7fffeddf6060 a1=17 a2=fff a3=0 items=0
ppid=3418 pid=3420 auid=4294967295 uid=48 gid=48 euid=48 suid=48
fsuid=48 egid=51 sgid=51 fsgid=51 tty=(none) ses=4294967295
comm="sendmail" exe="/usr/sbin/sendmail.sendmail"
subj=system_u:system_r:httpd_bugzilla_script_t:s0 key=(null)
--------------------------------------------------------------------------------
Summary:
SELinux is preventing sendmail (httpd_bugzilla_script_t) "create" to
<Unknown>
(httpd_bugzilla_script_t).
Detailed Description:
SELinux denied access requested by sendmail. It is not expected that this access
is required by sendmail and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.
Allowing Access:
You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.
Additional Information:
Source Context system_u:system_r:httpd_bugzilla_script_t
Target Context system_u:system_r:httpd_bugzilla_script_t
Target Objects None [ unix_dgram_socket ]
Source sendmail
Source Path /usr/sbin/sendmail.sendmail
Port <Unknown>
Host <Unknown>
Source RPM Packages sendmail-8.13.8-8.el5
Target RPM Packages
Policy RPM selinux-policy-2.4.6-279.el5_5.1
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name catchall
Host Name www
Platform Linux www 2.6.18-194.11.4.el5 #1 SMP Tue Sep 21
05:04:09 EDT 2010 x86_64 x86_64
Alert Count 1
First Seen Mon Sep 27 02:07:43 2010
Last Seen Mon Sep 27 02:07:43 2010
Local ID f7aa29e4-40d9-4184-904e-4dfb93c57ea7
Line Numbers 11703, 11704
Raw Audit Messages
type=AVC msg=audit(1285546063.61:16): avc: denied { create } for
pid=3420 comm="sendmail"
scontext=system_u:system_r:httpd_bugzilla_script_t:s0
tcontext=system_u:system_r:httpd_bugzilla_script_t:s0
tclass=unix_dgram_socket
type=SYSCALL msg=audit(1285546063.61:16): arch=c000003e syscall=41
success=no exit=-13 a0=1 a1=2 a2=0 a3=7373696d72655020 items=0
ppid=3418 pid=3420 auid=4294967295 uid=48 gid=48 euid=48 suid=48
fsuid=48 egid=51 sgid=51 fsgid=51 tty=(none) ses=4294967295
comm="sendmail" exe="/usr/sbin/sendmail.sendmail"
subj=system_u:system_r:httpd_bugzilla_script_t:s0 key=(null)