Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Christian,
The following line:
opendnssec_stream_connect(ipa_dnskey_t)
is not present in RHEL 8.3. It was added as a part of freeipa commit
commit e881e35783bb250bbdbc575cee4df2af6bc2eb88
Author: Christian Heimes <cheimes>
Date: Tue Apr 21 09:39:29 2020 +0200
Fix various OpenDNSSEC 2.1 issues
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory (Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.
https://access.redhat.com/errata/RHSA-2020:4670
Description of problem: Following avc denial seen during ipa dnssec-master install Jul 2 03:28:08 master systemd[1]: Started IPA key daemon. Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: ipa-dnskeysyncd: INFO LDAP bind... Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: ipa-dnskeysyncd: INFO Commencing sync process Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: ipaserver.dnssec.keysyncer: INFO Initial LDAP dump is done, sychronizing with ODS and BIND Jul 2 03:28:10 master platform-python[40704]: detected unhandled Python exception in '/usr/libexec/ipa/ipa-dnskeysyncd' Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: Traceback (most recent call last): Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: File "/usr/libexec/ipa/ipa-dnskeysyncd", line 116, in <module> Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: while ldap_connection.syncrepl_poll(all=1, msgid=ldap_search): Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: File "/usr/lib64/python3.6/site-packages/ldap/syncrepl.py", line 457, in syncrepl_poll Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: self.syncrepl_refreshdone() Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: File "/usr/lib/python3.6/site-packages/ipaserver/dnssec/keysyncer.py", line 125, in syncrepl_refreshdone Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: self.ods_sync() Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: File "/usr/lib/python3.6/site-packages/ipaserver/dnssec/keysyncer.py", line 183, in ods_sync Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: self.odsmgr.sync() Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: File "/usr/lib/python3.6/site-packages/ipaserver/dnssec/odsmgr.py", line 221, in sync Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: zl_ods = self.get_ods_zonelist() Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: File "/usr/lib/python3.6/site-packages/ipaserver/dnssec/odsmgr.py", line 143, in get_ods_zonelist Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: stdout = self.ksmutil(['zonelist', 'export']) Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: File "/usr/lib/python3.6/site-packages/ipaserver/dnssec/odsmgr.py", line 139, in ksmutil Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: result = tasks.run_ods_manager(params, capture_output=True) Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: File "/usr/lib/python3.6/site-packages/ipaserver/dnssec/_ods21.py", line 115, in run_ods_manager Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: return ipautil.run(cmd, **kwargs) Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: File "/usr/lib/python3.6/site-packages/ipapython/ipautil.py", line 598, in run Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: p.returncode, arg_string, output_log, error_log Jul 2 03:28:10 master ipa-dnskeysyncd[40704]: ipapython.ipautil.CalledProcessError: CalledProcessError(Command ['/usr/sbin/ods-enforcer', 'zonelist', 'export'] returned non-zero exit status 201: 'Unable to connect to engine. connect() failed: Permission denied ("/var/run/opendnssec/enforcer.sock")\n') Jul 2 03:28:10 master abrt-server[40710]: Deleting problem directory Python3-2020-07-02-03:28:10-40704 (dup of Python3-2020-07-02-02:00:49-32186) Jul 2 03:28:10 master systemd[1]: ipa-dnskeysyncd.service: Main process exited, code=exited, status=1/FAILURE Jul 2 03:28:10 master systemd[1]: ipa-dnskeysyncd.service: Failed with result 'exit-code'. Jul 2 03:28:10 master dbus-daemon[738]: [system] Activating service name='org.fedoraproject.Setroubleshootd' requested by ':1.201' (uid=0 pid=700 comm="/usr/sbin/sedispatch " label="system_u:system_r:auditd_t:s0") (using servicehelper) Jul 2 03:28:10 master dbus-daemon[40721]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted Jul 2 03:28:10 master abrt-server[40710]: /bin/sh: reporter-systemd-journal: command not found Jul 2 03:28:11 master dbus-daemon[738]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' Jul 2 03:28:11 master dbus-daemon[738]: [system] Activating service name='org.fedoraproject.SetroubleshootPrivileged' requested by ':1.858' (uid=995 pid=40721 comm="/usr/libexec/platform-python -Es /usr/sbin/setroub" label="system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023") (using servicehelper) Jul 2 03:28:11 master dbus-daemon[40735]: [system] Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted Jul 2 03:28:12 master dbus-daemon[738]: [system] Successfully activated service 'org.fedoraproject.SetroubleshootPrivileged' Jul 2 03:28:13 master setroubleshoot[40721]: SELinux is preventing /usr/sbin/ods-enforcer from write access on the sock_file enforcer.sock. For complete SELinux messages run: sealert -l 829e84f4-20aa-4110-a104-a9200879eb95 Jul 2 03:28:13 master platform-python[40721]: SELinux is preventing /usr/sbin/ods-enforcer from write access on the sock_file enforcer.sock.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that ods-enforcer should be allowed write access on the enforcer.sock sock_file by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'ods-enforcer' --raw | audit2allow -M my-odsenforcer#012# semodule -X 300 -i my-odsenforcer.pp#012 #============= ipa_dnskey_t ============== allow ipa_dnskey_t opendnssec_var_run_t:sock_file write; Version-Release number of selected component (if applicable): [root@master ~]# rpm -q ipa-server selinux-policy ipa-server-4.8.7-4.module+el8.3.0+7221+eedbd403.x86_64 selinux-policy-3.14.3-48.el8.noarch [root@master ~]# How reproducible: Always Steps to Reproduce: 1. Install IPA with dns 2. Install 3. Actual results: Following avc denial seen Expected results: No avc denial Additional info: