Bug 544546 - SELinux is preventing /usr/bin/tor "name_bind" access.
Summary: SELinux is preventing /usr/bin/tor "name_bind" access.
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: tor
Version: 12
Hardware: i386
OS: Linux
low
medium
Target Milestone: ---
Assignee: Enrico Scholz
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:85b428052c7...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-12-05 11:09 UTC by Sergei LITVINENKO
Modified: 2009-12-06 16:09 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-12-06 08:46:27 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Sergei LITVINENKO 2009-12-05 11:09:32 UTC
service tor start
Hash String generated from  selinux-policy-3.6.32-49.fc12,catchall,tor,tor_t,hplip_port_t,tcp_socket,name_bind
audit2allow suggests:

Comment 1 Daniel Walsh 2009-12-05 23:37:01 UTC
Is tor supposed to bind to the hplip port?

What port did it try to bind to?


hplip_port_t                   tcp      1782, 2207, 2208, 8290, 50000, 50002, 8292, 9100, 9101, 9102, 9220, 9221, 9222, 9280, 9281, 9282, 9290, 9291, 9292

Comment 2 Enrico Scholz 2009-12-06 01:59:38 UTC
port can be configured freely; sample config uses port 9050 (socks5), 9051 (control) and 9001 (orport).  Binding orport to 443 is very common too.

Comment 3 Sergei LITVINENKO 2009-12-06 08:45:54 UTC
sorry, but this report is my mistake.

Tor was configured to use alternative port jetdirect (9100/tcp).
It is not necessary.

This BugReport have to be closed.

Comment 4 Daniel Walsh 2009-12-06 15:04:09 UTC
Enrico tor can currently bind to 

 tcp, 6969, s0, tcp,9001,s0, tcp,9030,s0, tcp,9050,s0, tcp,9051,s0

But not 443.  Should I add a boolean to allow tor to connect to apache ports?

Comment 5 Enrico Scholz 2009-12-06 15:51:32 UTC
I suggest a boolean (defaulting to 'off') which allows binding to arbitrary ports.  This eases setup of relay servers (see https://www.torproject.org/docs/tor-doc-relay) which are disabled by the sample configuration.  Using non standard ports resp. ports like HTTPS makes it difficult to block access to the TOR network.

Most users will need the socks5 and perhaps control ports only which default to 9050 + 9051.

Comment 6 Daniel Walsh 2009-12-06 16:09:02 UTC
Fixed in selinux-policy-3.6.32-56.fc12.noarch

Add tor_bind_all_unreserved_ports boolean which allows it to bind to any port > 1024


Note You need to log in before you can comment on or make changes to this bug.