Displaying 1 result from an estimated 1 matches for "dkim_milter_t".
2014 May 12
1
OpenDKIM and SELinux
...g seems normal.
I then checked audit2why and got this:
audit2allow: error: no such option: --
[root at inet08 opendkim]# audit2why -l -a
type=AVC msg=audit(1399898848.286:2317): avc: denied { dac_read_search } for
pid=15213 comm="opendkim" capability=2
scontext=unconfined_u:system_r:dkim_milter_t:s0
tcontext=unconfined_u:system_r:dkim_milter_t:s0 tclass=capability
Was caused by:
Missing type enforcement (TE) allow rule.
You can use audit2allow to generate a loadable module to allow this access.
type=AVC msg=audit(1399898848.286:2317): avc: denied { dac_override } for
pid=15213 com...