Displaying 2 results from an estimated 2 matches for "chroot_user_t".
2015 Jul 09
3
C-6.6 - sshd_config chroot SELinux issues
...inux messages. run sealert -l d77a3254-8aba-4a13-bd78-0bcf14e67035
/var/log/secure
Jul 9 09:22:34 inet02 sshd[17681]: error: socket: Permission denied
Jul 9 09:22:34 inet02 sshd[17684]: error: /dev/pts/5: Permission denied
# grep sshd /var/log/audit/audit.log | audit2allow
#============= chroot_user_t ==============
#!!!! This avc is allowed in the current policy
allow chroot_user_t admin_home_t:dir search;
#!!!! This avc is allowed in the current policy
allow chroot_user_t net_conf_t:file read;
allow chroot_user_t self:netlink_route_socket create;
allow chroot_user_t self:tcp_socket create;
a...
2015 Oct 09
2
CentOS-6 SSHD chroot SELinux problem
....
We have a problem with SELinux in that chrooted users cannot tunnel
https requests unless SELinux is set to permissive (or turned off
altogether). This problem does not evidence itself unless the account
is chrooted.
The output from audit2allow is this:
sudo audit2allow -l -a
#============= chroot_user_t ==============
allow chroot_user_t cyphesis_port_t:tcp_socket name_connect;
allow chroot_user_t user_home_t:chr_file open;
#============= syslogd_t ==============
#!!!! The source type 'syslogd_t' can write to a 'dir' of the
following types:
# var_log_t, var_run_t, syslogd_tmp_t, s...