Bug 212893 - SELinux targeted policy + NFS mounted /home blocks procmail
Summary: SELinux targeted policy + NFS mounted /home blocks procmail
Keywords:
Status: CLOSED RAWHIDE
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy-targeted
Version: 6
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Ben Levenson
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-10-30 00:33 UTC by W. Michael Petullo
Modified: 2008-06-16 10:12 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2006-11-01 20:34:39 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
Log of procmail running with SELinux in permissive mode (6.76 KB, text/plain)
2006-10-30 00:33 UTC, W. Michael Petullo
no flags Details

Description W. Michael Petullo 2006-10-30 00:33:13 UTC
Description of problem:
I have an NFS-mounted /home.  When I use fetchmail to retrieve my mail, procmail
can not process it because SELinux's targeted policy does not grant the
appropriate operations.  The context of objects in /home is
system_u:object_r:nfs_t:s0.

Version-Release number of selected component (if applicable):
selinux-policy-targeted-2.3.18-10

How reproducible:
Every time

Steps to Reproduce:
1. Set SELinux to enforce the targeted policy
2. NFS mount /home
3. Fetch mail and try to process using procmail
  
Actual results:
Mail is not processed by procmail.  See attached log.

Expected results:


Additional info:
My .procmailrc includes /etc/mail/spamassassin/spamassassin-default.rc.

Comment 1 W. Michael Petullo 2006-10-30 00:33:13 UTC
Created attachment 139687 [details]
Log of procmail running with SELinux in permissive mode

Comment 2 Daniel Walsh 2006-10-30 19:28:46 UTC
fixed in selinux-policy-2.4.2-2

Comment 3 W. Michael Petullo 2006-11-01 20:34:39 UTC
Confirmed fixed.  Thank you.

Comment 4 Tethys 2008-06-05 23:43:24 UTC
I'm still getting what appears to be that same problem in F9.
The following additions seem to fix it:

allow procmail_t nfs_t:file { execute execute_no_trans };

I would reopen this bug, but apparently I don't have permissions
to do so...

Comment 5 Daniel Walsh 2008-06-16 10:12:22 UTC
You could open a new bug.  What is procmail attempting to execute in the home
directory?

You can add this rule using 

grep procmail /var/log/audit/audit.log | audit2allow -M myprocmail
semodule -i myprocmail.pp



Note You need to log in before you can comment on or make changes to this bug.