Description of problem: After a recent upgrade (I am not sure if it was selinux-policy or open ssh), ssh connections to the upgraded machines started failing after a password was entered. Switching to permissive prevented the issue. Looking at the audit, I found that adding the rule: allow sshd_t user_devpts_t:chr_file setattr; made things work again. Version-Release number of selected component (if applicable): openssh-server-5.3p1-22.fc13.i686 selinux-policy-targeted-3.7.9-4.fc13.noarch How reproducible: 100% Steps to Reproduce: 1. ssh to the affected server while it is running in enforcing mode 2. 3. Actual results: Expected results: Additional info:
Fixed in selinux-policy-3.7.10-2.fc13
I tested selinux-policy-targeted-3.7.10-2.fc13.noarch and I am still seeing what looks like the same problem: type=AVC msg=audit(1266946901.773:210): avc: denied { setattr } for pid=5050 comm="sshd" name="7" dev=devpts ino=10 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_devpts_t:s0 tclass=chr_file
Shoot lets try again. Fixed in selinux-policy-3.7.10-3.fc13
*** Bug 567707 has been marked as a duplicate of this bug. ***
selinux-policy-targeted-3.7.10-3.fc13.noarch does seem to fix the problem. Thanks!
I can confirm the fix with selinux-policy-targeted-3.7.10-3.fc13.