we have remote server running as a guest instance on a kvm host. This
server acts as a public MX service for our domains along with
providing a backup for our Mailman mailing lists. It also has a slave
named service.
while tracking down a separate problem I discovered these avc
anomalies and ran audit2allow to see what was required to eliminate
them. All the software is either from CentOS or EPEL.
#============= amavis_t =============allow amavis_t sysfs_t:dir open;
#============= clamd_t =============allow clamd_t sysctl_vm_t:dir search;
#============= mailman_mail_t =============#!!!! The source type
'mailman_mail_t' can write to a 'dir' of the
following types:
# mailman_log_t, mailman_data_t, mailman_lock_t, mailman_archive_t,
var_lock_t, tmp_t, mailman_mail_tmp_t, var_log_t, root_t
allow mailman_mail_t lib_t:dir write;
#============= named_t =============allow named_t sysctl_vm_t:dir search;
#============= postfix_postdrop_t =============allow postfix_postdrop_t
fail2ban_tmp_t:file { read write };
#============= syslogd_t =============allow syslogd_t sysctl_vm_t:dir search;
Is there an epel/selinux forum to report these for repair or are they
caused by something I am doing wrong? If so then what do I need to do
to eliminate them?
--
*** e-Mail is NOT a SECURE channel ***
Do NOT transmit sensitive data via e-Mail
James B. Byrne mailto:ByrneJB at Harte-Lyne.ca
Harte & Lyne Limited http://www.harte-lyne.ca
9 Brockley Drive vox: +1 905 561 1241
Hamilton, Ontario fax: +1 905 561 0757
Canada L8E 3C3