Summary: SELinux is preventing /usr/sbin/openvpn "read" access on client.conf. Detailed Description: SELinux denied access requested by openvpn. It is not expected that this access is required by openvpn and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context unconfined_u:system_r:openvpn_t:s0 Target Context unconfined_u:object_r:admin_home_t:s0 Target Objects client.conf [ file ] Source openvpn Source Path /usr/sbin/openvpn Port <Unknown> Host (removed) Source RPM Packages openvpn-2.1-0.37.rc20.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-41.fc12 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31.5-127.fc12.x86_64 #1 SMP Sat Nov 7 21:11:14 EST 2009 x86_64 x86_64 Alert Count 1 First Seen Thu 07 Jan 2010 21:50:05 GMT Last Seen Thu 07 Jan 2010 21:50:05 GMT Local ID ef89fdb4-37c5-4f55-93e2-1564f773bbd5 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1262901005.968:38192): avc: denied { read } for pid=2307 comm="openvpn" name="client.conf" dev=dm-0 ino=131221 scontext=unconfined_u:system_r:openvpn_t:s0 tcontext=unconfined_u:object_r:admin_home_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1262901005.968:38192): arch=c000003e syscall=2 success=no exit=-13 a0=7fff20a7af3f a1=0 a2=1b6 a3=0 items=0 ppid=2298 pid=2307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm="openvpn" exe="/usr/sbin/openvpn" subj=unconfined_u:system_r:openvpn_t:s0 key=(null) Hash String generated from catchall,openvpn,openvpn_t,admin_home_t,file,read audit2allow suggests: #============= openvpn_t ============== allow openvpn_t admin_home_t:file read;
Why is client.conf under the root home dir, rather then in /etc/openvpn/?
Or was it created and mv'd to /etc/openvpn, in which case you would only need to run restorecon on it restorecon -R -v /etc/openvpn