Summary: | SELinux is preventing winbindd from 'name_connect' accesses on the tcp_socket port 49261. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Brian J. Murrell <brian.murrell> |
Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 28 | CC: | abokovoy, anoopcs, asn, dwalsh, gdeschner, jrivera, lmohanty, lvrabec, madam, mgrepl, plautrba, pmoore, sbose, ssorce |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Unspecified | ||
Whiteboard: | abrt_hash:1a3ed3e0a291156b6100f0b83507fbc9cf0c5b8b24ee06f258aefef6334e9795;VARIANT_ID=workstation; | ||
Fixed In Version: | selinux-policy-3.14.1-36.fc28 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2018-07-29 03:25:04 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: |
Description
Brian J. Murrell
2018-07-12 13:26:29 UTC
type=AVC msg=audit(1531401831.730:175684): avc: denied { name_connect } for pid=8872 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 type=AVC msg=audit(1531401833.755:175685): avc: denied { name_connect } for pid=8872 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 type=AVC msg=audit(1531401837.279:175686): avc: denied { name_connect } for pid=8879 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 type=AVC msg=audit(1531401838.662:175687): avc: denied { name_connect } for pid=8880 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 type=AVC msg=audit(1531401840.061:175688): avc: denied { name_connect } for pid=8879 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 type=AVC msg=audit(1531401841.560:175689): avc: denied { name_connect } for pid=8880 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 type=AVC msg=audit(1531401843.807:175697): avc: denied { name_connect } for pid=8888 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 type=AVC msg=audit(1531401846.373:175698): avc: denied { name_connect } for pid=8888 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 type=AVC msg=audit(1531401854.567:175699): avc: denied { name_connect } for pid=8937 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 type=AVC msg=audit(1531401856.608:175700): avc: denied { name_connect } for pid=8937 comm="winbindd" dest=49261 scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:object_r:ephemeral_port_t:s0 tclass=tcp_socket permissive=0 Hi Samba folks, I have question. Winbindd is trying to connect to several ports see comment#1. Is there any "default" ports where winbind will try to connect? Thanks, Lukas. Lukas, these are ephemeral ports, dynamically allocated by an end-point mapper. From Samba documentation, smb.conf: rpc server dynamic port range (G) This parameter tells the RPC server which port range it is allowed to use to create a listening socket for LSA, SAM, Netlogon and others without wellknown tcp ports. The first value is the lowest number of the port range and the second the hightest. This applies to RPC servers in all server roles. Default: rpc server dynamic port range = 49152-65535 Okay, make sense, should I allow it? Yes. Thanks! selinux-policy-3.14.1-36.fc28 has been submitted as an update to Fedora 28. https://bodhi.fedoraproject.org/updates/FEDORA-2018-1050fb248b selinux-policy-3.14.1-36.fc28 has been pushed to the Fedora 28 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2018-1050fb248b selinux-policy-3.14.1-36.fc28 has been pushed to the Fedora 28 stable repository. If problems still persist, please make note of it in this bug report. |