Bug 474527 - SELinux is preventing the npviewer.bin (nsplugin_t) from connecting to port xxxx
SELinux is preventing the npviewer.bin (nsplugin_t) from connecting to port xxxx
Product: Fedora
Classification: Fedora
Component: selinux-policy (Show other bugs)
i386 Linux
low Severity high
: ---
: ---
Assigned To: Daniel Walsh
Fedora Extras Quality Assurance
Depends On:
  Show dependency treegraph
Reported: 2008-12-04 05:05 EST by petri.j.laine
Modified: 2009-11-18 08:00 EST (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2009-11-18 08:00:16 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description petri.j.laine 2008-12-04 05:05:50 EST
Description of problem: SELinux prevents flex application in a firefox browser to connect to a TCP port in the network

Version-Release number of selected component (if applicable):


How reproducible: When the flex application is downloaded into the Firefox browser and when the flex application is trying to connect to the port xx on a network server. 

Steps to Reproduce:
1. Download swf application with firefox
2. Application tries to connect to port xx
3. SELinux prevents the npviewer.bin to allow this connection
Actual results:

Expected results:

Additional info:

Trying to allow access using:

  semanage port -a -t PORT_TYPE -p PROTOCOL xx

Seems not to help.


  setsebool -P allow_unconfined_nsplugin_transition 0

Seems not to help either...

- - - - - - - - - 

SELinux Additional Information:

Target Context:  system_u:object_r:port_t:s0
Target Objects:  None [ tcp_socket ]
Source:  npviewer.bin
Source Path:  /usr/lib/nspluginwrapper/npviewer.binPort:  xx
Source RPM Packages:  nspluginwrapper-1.1.2-4.fc10
Target RPM Packages:  
Policy RPM:  selinux-policy-3.5.13-18.fc10
Selinux Enabled:  True
Policy Type:  targeted
MLS Enabled:  True
Enforcing Mode:  Enforcing
Plugin Name:  connect_ports

Raw Audit Messages :node=xxxx type=AVC msg=audit(1228239276.420:44): avc: denied { name_connect } for pid=3611 comm="npviewer.bin" dest=xxxx scontext=unconfined_u:unconfined_r:nsplugin_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket 

node=xxxx type=SYSCALL msg=audit(1228239276.420:44): arch=40000003 syscall=102 success=no exit=-13 a0=3 a1=43b82c0 a2=18a5924 a3=0 items=0 ppid=3592 pid=3611 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="npviewer.bin" exe="/usr/lib/nspluginwrapper/npviewer.bin" subj=unconfined_u:unconfined_r:nsplugin_t:s0 key=(null)
Comment 1 Daniel Walsh 2008-12-04 09:11:25 EST
Turn off the plugin transition

# setsebool -P allow_unconfined_nsplugin_transition 0
Then restart firefox, it should work then.

I am changing the default since this is happening to too many people.

Fixed in selinux-policy-3.5.13-31.fc10
Comment 2 Samster 2008-12-10 12:44:59 EST
Similar SELinux error report involving npviewer.bin:

Source Context:  unconfined_u:unconfined_r:nsplugin_t:s0
Target Context:  system_u:object_r:mmcc_port_t:s0
Target Objects:  None [ tcp_socket ]
Source:  npviewer.binSource 
Path:  /usr/lib64/nspluginwrapper/npviewer.bin
Port:  5050
Host: <hostname>
Source RPM Packages:  nspluginwrapper-1.1.2-4.fc10
Target RPM Packages:  
Policy RPM:  selinux-policy-3.5.13-26.fc10
Selinux Enabled:  True
Policy Type:  targeted
MLS Enabled:  True
Enforcing Mode:  Enforcing
Plugin Name:  catchall
Host Name: 
Platform:  Linux <hostname> #1 SMP Mon Dec 1 22:21:35 EST 2008 x86_64 x86_64
Alert Count:  56
First Seen:  Sat 06 Dec 2008 02:54:03 PM EST
Last Seen:  Wed 10 Dec 2008 12:16:12 PM EST
Local ID:  9d407ca6-3283-465f-ae00-20941c8510fb
Line Numbers:  

Raw Audit Messages :

node=<hostname> type=AVC msg=audit(1228929372.600:66): avc: denied { name_connect } for pid=8103 comm="npviewer.bin" dest=5050 scontext=unconfined_u:unconfined_r:nsplugin_t:s0 tcontext=system_u:object_r:mmcc_port_t:s0 tclass=tcp_socket 

node=<hostname> type=SYSCALL msg=audit(1228929372.600:66): arch=c000003e syscall=42 success=no exit=-13 a0=d a1=e54dc0 a2=10 a3=3 items=0 ppid=8070 pid=8103 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=2 comm="npviewer.bin" exe="/usr/lib64/nspluginwrapper/npviewer.bin"  subj=unconfined_u:unconfined_r:nsplugin_t:s0 key=(null)
Comment 3 Bug Zapper 2009-11-18 04:38:00 EST
This message is a reminder that Fedora 10 is nearing its end of life.
Approximately 30 (thirty) days from now Fedora will stop maintaining
and issuing updates for Fedora 10.  It is Fedora's policy to close all
bug reports from releases that are no longer maintained.  At that time
this bug will be closed as WONTFIX if it remains open with a Fedora 
'version' of '10'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version prior to Fedora 10's end of life.

Bug Reporter: Thank you for reporting this issue and we are sorry that 
we may not be able to fix it before Fedora 10 is end of life.  If you 
would still like to see this bug fixed and are able to reproduce it 
against a later version of Fedora please change the 'version' of this 
bug to the applicable version.  If you are unable to change the version, 
please add a comment here and someone will do it for you.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events.  Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

The process we are following is described here: 
Comment 4 Daniel Walsh 2009-11-18 08:00:16 EST
Closing as current release

Note You need to log in before you can comment on or make changes to this bug.