Description of problem: Trying to connect to SSH Tunnel using GNOME Network Manager SSH plugin. SELinux is preventing ssh from 'write' accesses on the sock_file ssh. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that ssh should be allowed write access on the ssh sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'ssh' --raw | audit2allow -M my-ssh # semodule -X 300 -i my-ssh.pp Additional Information: Source Context system_u:system_r:NetworkManager_ssh_t:s0 Target Context unconfined_u:object_r:user_tmp_t:s0 Target Objects ssh [ sock_file ] Source ssh Source Path ssh Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.14.1-24.fc28.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 4.16.5-300.fc28.x86_64 #1 SMP Fri Apr 27 17:38:36 UTC 2018 x86_64 x86_64 Alert Count 1 First Seen 2018-05-02 20:12:29 EET Last Seen 2018-05-02 20:12:29 EET Local ID c1f00b27-a742-44c4-a869-7023d1d28713 Raw Audit Messages type=AVC msg=audit(1525284749.36:463): avc: denied { write } for pid=14075 comm="ssh" name="ssh" dev="tmpfs" ino=38668 scontext=system_u:system_r:NetworkManager_ssh_t:s0 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=sock_file permissive=1 Hash: ssh,NetworkManager_ssh_t,user_tmp_t,sock_file,write Version-Release number of selected component: selinux-policy-3.14.1-24.fc28.noarch Additional info: component: selinux-policy reporter: libreport-2.9.5 hashmarkername: setroubleshoot kernel: 4.16.5-300.fc28.x86_64 type: libreport
*** This bug has been marked as a duplicate of bug 1574159 ***