Bug 2129438
| Summary: | Cannot use systemd to start up wireguard | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Brigham Keys <bkeys> |
| Component: | selinux-policy | Assignee: | Nikola Knazekova <nknazeko> |
| Status: | CLOSED DUPLICATE | QA Contact: | Milos Malik <mmalik> |
| Severity: | medium | Docs Contact: | |
| Priority: | high | ||
| Version: | CentOS Stream | CC: | bstinson, davide.principi, haliu, jianliu, jwboyer, lvrabec, mmalik, network-qe, ssekidde, zpytela |
| Target Milestone: | rc | Keywords: | Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | No Doc Update | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-01-12 14:42:00 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Brigham Keys
2022-09-23 18:48:27 UTC
(In reply to Brigham Keys from comment #0) > Sep 23 14:42:44 pserver wg-quick[1531376]: [#] firewall-cmd --zone=public --add-port 51820/udp && firewall-cmd --zone=public --add-masquerade > Sep 23 14:42:44 pserver wg-quick[1531418]: Error: DBUS_ERROR: Failed to connect to socket /run/dbus/system_bus_socket: Permission denied This looks like the wg-quick was stop by selinux due to run firewall-cmd. Hi Brigham, would you like to share your wg-quick file? Thanks Hangbin [Interface] Address = <REDACTED> PrivateKey = <REDACTED> PostUp = firewall-cmd --zone=public --add-port 51820/udp && firewall-cmd --zone=public --add-masquerade PostDown = firewall-cmd --zone=public --remove-port 51820/udp && firewall-cmd --zone=public --remove-masquerade ListenPort = 51820 [Peer] PublicKey = <REDACTED> AllowedIPs = <REDACTED> (In reply to Brigham Keys from comment #2) > [Interface] Thanks Brigham, I can reproduce this issue with your config file. This looks like a SELinux policy issue. I will ask the SELinux team first. Are there any AVC denials audited? It would also be good to see if the script snippets work out of the box or also need to be backed by SELinux rules. (In reply to Zdenek Pytela from comment #5) > Are there any AVC denials audited? > > It would also be good to see if the script snippets work out of the box or > also need to be backed by SELinux rules. Here is the report # aureport -a AVC Report =============================================================== # date time comm subj syscall class permission obj result event =============================================================== 1. 09/28/2022 00:06:14 wg system_u:system_r:wireguard_t:s0 41 udp_socket create system_u:system_r:wireguard_t:s0 denied 81 2. 09/28/2022 00:06:14 wg system_u:system_r:wireguard_t:s0 41 udp_socket create system_u:system_r:wireguard_t:s0 denied 82 3. 09/28/2022 00:06:14 firewall-cmd system_u:system_r:wireguard_t:s0 257 dir search system_u:object_r:cert_t:s0 denied 84 4. 09/28/2022 00:06:14 firewall-cmd system_u:system_r:wireguard_t:s0 42 dir search system_u:object_r:system_dbusd_var_run_t:s0 denied 85 *** Bug 2155773 has been marked as a duplicate of this bug. *** *** This bug has been marked as a duplicate of bug 2149452 *** |