Description of problem: SELinux is preventing /usr/sbin/ssmtp from 'add_name' accesses on the directory . ***** Plugin catchall (100. confidence) suggests ************************** If you believe that ssmtp should be allowed add_name access on the directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep sendmail /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:system_mail_t:s0-s0:c0.c1023 Target Context system_u:object_r:munin_var_lib_t:s0 Target Objects [ dir ] Source sendmail Source Path /usr/sbin/ssmtp Port <Unknown> Host (removed) Source RPM Packages ssmtp-2.64-11.fc20.i686 Target RPM Packages Policy RPM selinux-policy-3.12.1-183.fc20.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.16.2-200.fc20.i686 #1 SMP Mon Sep 8 12:17:59 UTC 2014 i686 i686 Alert Count 9 First Seen 2014-09-22 20:00:16 BST Last Seen 2014-09-22 21:55:34 BST Local ID b67f2ea3-4bae-4a25-98ac-7a5940d8016f Raw Audit Messages type=AVC msg=audit(1411419334.94:389): avc: denied { add_name } for pid=2476 comm="sendmail" name="dead.letter" scontext=system_u:system_r:system_mail_t:s0-s0:c0.c1023 tcontext=system_u:object_r:munin_var_lib_t:s0 tclass=dir permissive=0 type=SYSCALL msg=audit(1411419334.94:389): arch=i386 syscall=open success=no exit=EACCES a0=881d428 a1=441 a2=1b6 a3=88484f8 items=0 ppid=2052 pid=2476 auid=990 uid=990 gid=986 euid=990 suid=990 fsuid=990 egid=12 sgid=12 fsgid=12 tty=(none) ses=2 comm=sendmail exe=/usr/sbin/ssmtp subj=system_u:system_r:system_mail_t:s0-s0:c0.c1023 key=(null) Hash: sendmail,system_mail_t,munin_var_lib_t,dir,add_name Additional info: reporter: libreport-2.2.3 hashmarkername: setroubleshoot kernel: 3.16.2-200.fc20.i686 type: libreport
Looks like Munins homedir is setup to be in /var/lib/munin?
do you need extra info ? should in other directory by default ? Cheers David
105ab1f6b7a101ccfe936285dd6cbd14e3806b17 allows this in git.
commit d9935b2f4df357e9da1073a62bda5d2c959a01e6 Author: Dan Walsh <dwalsh> Date: Sat Jan 3 08:50:45 2015 -0500 Allow system_mail_t to create content in /var/lib/munin
selinux-policy-3.12.1-197.fc20 has been submitted as an update for Fedora 20. https://admin.fedoraproject.org/updates/selinux-policy-3.12.1-197.fc20
Package selinux-policy-3.12.1-197.fc20: * should fix your issue, * was pushed to the Fedora 20 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.12.1-197.fc20' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2015-1398/selinux-policy-3.12.1-197.fc20 then log in and leave karma (feedback).
selinux-policy-3.12.1-197.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.