Description of problem: After dnf upgrade, httpd service won't run dur to time out while waiting for systemd-tty-ask-password-agent. # service httpd start Redirecting to /bin/systemctl start httpd.service Broadcast message from root (Sun 2015-10-04 17:40:26 ICT): Password entry required for 'Enter SSL pass phrase for localhost.localdomain:443 (RSA) :' (PID 8395). Please enter password with the systemd-tty-ask-password-agent tool! Job for httpd.service failed. See "systemctl status httpd.service" and "journalctl -xe" for details. SELinux is preventing systemd-ask-pas from 'search' accesses on the directory 1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that systemd-ask-pas should be allowed search access on the 1 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep systemd-ask-pas /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:httpd_passwd_t:s0 Target Context system_u:system_r:init_t:s0 Target Objects 1 [ dir ] Source systemd-ask-pas Source Path systemd-ask-pas Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-128.16.fc22.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.0.4-301.fc22.x86_64 #1 SMP Thu May 21 13:10:33 UTC 2015 x86_64 x86_64 Alert Count 7 First Seen 2015-10-04 13:16:59 ICT Last Seen 2015-10-04 16:39:45 ICT Local ID 020f012d-6389-4286-a967-3cc93ef0c3a7 Raw Audit Messages type=AVC msg=audit(1443951585.145:677): avc: denied { search } for pid=6970 comm="systemd-ask-pas" name="1" dev="proc" ino=10371 scontext=system_u:system_r:httpd_passwd_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir permissive=0 Hash: systemd-ask-pas,httpd_passwd_t,init_t,dir,search Version-Release number of selected component: selinux-policy-3.13.1-128.16.fc22.noarch Additional info: reporter: libreport-2.6.2 hashmarkername: setroubleshoot kernel: 4.0.4-301.fc22.x86_64 type: libreport
Fedora 22 changed to end-of-life (EOL) status on 2016-07-19. Fedora 22 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of Fedora please feel free to reopen this bug against that version. If you are unable to reopen this bug, please file a new report against the current release. If you experience problems, please add a comment to this bug. Thank you for reporting this bug and we are sorry it could not be fixed.