Bug 413841

Summary: using dovecot deliver by postfix will not be allowed by selinux
Product: [Fedora] Fedora Reporter: Gunnar Hilling <redhat.gunnar>
Component: selinux-policy-targetedAssignee: Daniel Walsh <dwalsh>
Status: CLOSED CURRENTRELEASE QA Contact: Ben Levenson <benl>
Severity: medium Docs Contact:
Priority: low    
Version: 8CC: mkanat
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Current Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-01-30 19:06:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Gunnar Hilling 2007-12-06 12:46:33 UTC
Description of problem:


Version-Release number of selected component (if applicable):
dovecot-1.0.7-2.fc8
postfix-2.4.5-2.fc8
selinux-policy-targeted-3.0.8-62.fc8

How reproducible:


Steps to Reproduce:
1. install postfix
2. install dovecot
3. configure postfix to deliver mail via dovecot-devlier:
in main.cf set: "mailbox_command = /usr/libexec/dovecot/deliver"


  
Actual results:

denied access to execute dovecot-deliver and to access /etc/dovecot.conf afterwards:

avc: denied { execute_no_trans } for comm=deliver dev=dm-0 egid=500 euid=500
exe=/usr/libexec/dovecot/deliver exit=0 fsgid=500 fsuid=500 gid=500 items=0
name=deliver path=/usr/libexec/dovecot/deliver pid=8671
scontext=system_u:system_r:postfix_local_t:s0 sgid=500
subj=system_u:system_r:postfix_local_t:s0 suid=500 tclass=file
tcontext=system_u:object_r:dovecot_deliver_exec_t:s0 tty=(none) uid=500 

avc: denied { getattr } for comm=deliver dev=dm-0 egid=500 euid=500
exe=/usr/libexec/dovecot/deliver exit=0 fsgid=500 fsuid=500 gid=500 items=0
path=/etc/dovecot.conf pid=8559 scontext=system_u:system_r:postfix_local_t:s0
sgid=500 subj=system_u:system_r:postfix_local_t:s0 suid=500 tclass=file
tcontext=system_u:object_r:dovecot_etc_t:s0 tty=(none) uid=500 

Expected results:

access should be allowed by the policy because this should be an expected
combination of the mta and the default imap-server

Additional info:

Comment 1 Daniel Walsh 2007-12-06 16:04:02 UTC
Fixed in selinux-policy-3.0.8-66.fc8

Comment 2 Max Kanat-Alexander 2007-12-06 21:36:29 UTC
This also affects RHEL5. Should I file a separate bug for that?

Comment 3 Daniel Walsh 2007-12-06 21:42:47 UTC
Yes


Comment 4 Daniel Walsh 2008-01-30 19:06:39 UTC
Bulk closing a old selinux policy bugs that were in the modified state.  If the
bug is still not fixed.  Please reopen.