Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 309501 Details for
Bug 450027
selinux blocks NIS
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
audit2allow log
audit2allow.log (text/plain), 1.87 KB, created by
Peter Dawes
on 2008-06-16 14:00:35 UTC
(
hide
)
Description:
audit2allow log
Filename:
MIME Type:
Creator:
Peter Dawes
Created:
2008-06-16 14:00:35 UTC
Size:
1.87 KB
patch
obsolete
>#============= dhcpc_t ============== >allow dhcpc_t consoletype_t:process { siginh rlimitinh noatsecure }; > >#============= exim_t ============== >allow exim_t admin_home_t:dir search; >allow exim_t hi_reserved_port_t:tcp_socket { name_bind name_connect }; >allow exim_t hi_reserved_port_t:udp_socket name_bind; >allow exim_t inetd_child_port_t:tcp_socket name_bind; >allow exim_t inetd_child_port_t:udp_socket name_bind; >allow exim_t proc_t:file read; >allow exim_t security_t:dir search; >allow exim_t security_t:filesystem getattr; >allow exim_t selinux_config_t:dir search; > >#============= logrotate_t ============== >allow logrotate_t selinux_config_t:file read; > >#============= logwatch_t ============== >allow logwatch_t hi_reserved_port_t:udp_socket name_bind; >allow logwatch_t initrc_var_run_t:file write; >allow logwatch_t ldap_port_t:udp_socket name_bind; >allow logwatch_t shadow_t:file read; >allow logwatch_t system_mail_t:process { siginh rlimitinh noatsecure }; > >#============= sshd_t ============== >allow sshd_t system_chkpwd_t:process { siginh noatsecure rlimitinh }; >allow sshd_t unconfined_t:process { siginh noatsecure }; > >#============= system_chkpwd_t ============== >allow system_chkpwd_t hi_reserved_port_t:udp_socket name_bind; >allow system_chkpwd_t inetd_child_port_t:udp_socket name_bind; >allow system_chkpwd_t security_t:dir search; >allow system_chkpwd_t security_t:filesystem getattr; > >#============= system_dbusd_t ============== >allow system_dbusd_t hi_reserved_port_t:tcp_socket { name_bind name_connect }; >allow system_dbusd_t hi_reserved_port_t:udp_socket name_bind; > >#============= system_mail_t ============== >allow system_mail_t exim_t:process { siginh rlimitinh noatsecure }; >allow system_mail_t hi_reserved_port_t:tcp_socket name_bind; >allow system_mail_t hi_reserved_port_t:udp_socket name_bind; >allow system_mail_t security_t:dir search; >allow system_mail_t selinux_config_t:dir search; >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 450027
:
308394
|
308492
|
308493
|
308867
| 309501 |
310842
|
312933
|
312934
|
325257