> > Sorry, I didn't put that very clearly. Could you show us the contents of > myzabbix.te.No prob! Thanks for all the help! But in searching my system I don't find anything of the sort. [root at monitor2:~] #updatedb [root at monitor2:~] #locate myzabbix.te [root at monitor2:~] #find / -name "myzabbix.*" I also did search using 'yum provides' to find something similar. But wasn't' able to find anything. yum provides "*/myzabbix.*" ... No matches found Maybe I'll need to install a package? Thanks, Tim On Wed, Jun 17, 2015 at 2:10 PM, Harold Toms <h.toms at qmul.ac.uk> wrote:> On 17/06/15 17:43, Tim Dunphy wrote: > >> What turns up in myzabbix.te? >>> >> >> Same deal. :( >> >> #semodule -i myzabbix.te >> semodule: Failed on myzabbix.te! >> >> >> sigh... but thanks any other clues? >> > > Sorry, I didn't put that very clearly. Could you show us the contents of > myzabbix.te. > > > -- > regards > > Harold Toms > URL: http://iodine.chem.qmul.ac.uk > > > _______________________________________________ > CentOS mailing list > CentOS at centos.org > http://lists.centos.org/mailman/listinfo/centos >-- GPG me!! gpg --keyserver pool.sks-keyservers.net --recv-keys F186197B
On Wed, Jun 17, 2015 at 03:30:51PM -0400, Tim Dunphy wrote:> No prob! Thanks for all the help! But in searching my system I don't find > anything of the sort. > > [root at monitor2:~] #updatedb > [root at monitor2:~] #locate myzabbix.te > [root at monitor2:~] #find / -name "myzabbix.*" > > I also did search using 'yum provides' to find something similar. But > wasn't' able to find anything.What we're asking for is the contents of the .te file that is created when you run audit2allow. -- Jonathan Billings <billings at negate.org>
On 06/17/2015 04:03 PM, Jonathan Billings wrote:> On Wed, Jun 17, 2015 at 03:30:51PM -0400, Tim Dunphy wrote: >> No prob! Thanks for all the help! But in searching my system I don't find >> anything of the sort. >> >> [root at monitor2:~] #updatedb >> [root at monitor2:~] #locate myzabbix.te >> [root at monitor2:~] #find / -name "myzabbix.*" >> >> I also did search using 'yum provides' to find something similar. But >> wasn't' able to find anything. > What we're asking for is the contents of the .te file that is created > when you run audit2allow. >Go back to the original email and do what you were told # grep zabbix /var/log/audit/audit.log | audit2allow -M myzabbix # semodule -i myzabbix.pp You did audit2allow -M zabbix Which created zabbix.te and zabbix.pp, which is bad. It will attempt to replace the system module. If you use myzappix, it will add the allow rules.