Description of problem: For samba to work as a member of an ADS/domain, kerberos must be properly configured. Samba's winbind daemon does this by creating its own krb5 configuration file in /var/cache/samba/smb_krb5/ directory (it creates the directory too). But selinux doesn't allow winbind to create the directory. Version-Release number of selected component (if applicable): selinux-policy-targeted-1.17.30-2.150.el4.noarch How reproducible: Configure an ADS, run rhts:///CoreOS/samba/Sanity/domain-join against it Actual results: ---- time->Mon Feb 23 11:20:50 2009 type=PATH msg=audit(1235406050.900:503): name="/var/cache/samba/smb_krb5" flags=10 inode=5538024 dev=68:02 mode=040755 ouid=0 ogid=0 rdev=00:00 type=CWD msg=audit(1235406050.900:503): cwd="/" type=SYSCALL msg=audit(1235406050.900:503): arch=c000003e syscall=83 success=no exit=-13 a0=552ae988f0 a1=1ed a2=e814ec70 a3=53 items=1 pid=8681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 comm="winbindd" exe="/usr/sbin/winbindd" type=AVC msg=audit(1235406050.900:503): avc: denied { create } for pid=8681 comm="winbindd" name="smb_krb5" scontext=root:system_r:winbind_t tcontext=root:object_r:samba_var_t tclass=dir Expected results: no AVC denial
Fixed in selinux-policy-targeted-1.17.30-2.152.el4
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2009-1026.html