The following was filed automatically by setroubleshoot: Summary: SELinux is preventing the httpd (httpd_t) from binding to port 7163. Detailed Description: SELinux has denied the httpd from binding to a network port 7163 which does not have an SELinux type associated with it. If httpd should be allowed to listen on 7163, use the semanage command to assign 7163 to a port type that httpd_t can bind to (http_cache_port_t, http_port_t). If httpd is not supposed to bind to 7163, this could signal a intrusion attempt. Allowing Access: If you want to allow httpd to bind to 7163, you can execute semanage port -a -t PORT_TYPE -p tcp 7163, where PORT_TYPE is one of the following: http_cache_port_t, http_port_t. If this system is running as an NIS Client, turning on the allow_ypbind boolean may fix the problem. setsebool -P allow_ypbind=1. Additional Information: Source Context unconfined_u:system_r:httpd_t:s0 Target Context system_u:object_r:port_t:s0 Target Objects None [ tcp_socket ] Source httpd Source Path /usr/sbin/httpd Port 7163 Host (removed) Source RPM Packages httpd-2.2.11-8 Target RPM Packages Policy RPM selinux-policy-3.6.12-47.fc11 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name bind_ports Host Name (removed) Platform Linux (removed) 2.6.29.4-167.fc11.i586 #1 SMP Wed May 27 17:14:37 EDT 2009 i686 i686 Alert Count 2 First Seen Tue 23 Jun 2009 02:15:13 PM EDT Last Seen Tue 23 Jun 2009 02:15:13 PM EDT Local ID 3e32abbf-e35d-4da9-92c8-176b9fbb2d8a Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1245780913.479:1091): avc: denied { name_bind } for pid=22897 comm="httpd" src=7163 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket node=(removed) type=SYSCALL msg=audit(1245780913.479:1091): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa01e40 a2=bbf1ec a3=2ac19b8 items=0 ppid=22896 pid=22897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts9 ses=1 comm="httpd" exe="/usr/sbin/httpd" subj=unconfined_u:system_r:httpd_t:s0 key=(null) audit2allow suggests: #============= httpd_t ============== allow httpd_t port_t:tcp_socket name_bind;