Summary: SELinux is preventing /usr/sbin/httpd "name_bind" access . Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by httpd. It is not expected that this access is required by httpd and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context unconfined_u:system_r:httpd_t:s0 Target Context system_u:object_r:soundd_port_t:s0 Target Objects None [ tcp_socket ] Source httpd Source Path /usr/sbin/httpd Port 8000 Host (removed) Source RPM Packages httpd-2.2.14-1.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-110.fc12 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.32.11-99.fc12.i686.PAE #1 SMP Mon Apr 5 16:15:03 EDT 2010 i686 i686 Alert Count 8 First Seen Tue 27 Apr 2010 02:13:50 PM PDT Last Seen Fri 30 Apr 2010 08:03:02 AM PDT Local ID eb604883-a26b-4124-b2b8-37155b1b7acb Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1272639782.56:31): avc: denied { name_bind } for pid=2436 comm="httpd" src=8000 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u:object_r:soundd_port_t:s0 tclass=tcp_socket node=(removed) type=SYSCALL msg=audit(1272639782.56:31): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfce4800 a2=4f91e4 a3=d6bc00 items=0 ppid=2435 pid=2436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm="httpd" exe="/usr/sbin/httpd" subj=unconfined_u:system_r:httpd_t:s0 key=(null) Hash String generated from catchall,httpd,httpd_t,soundd_port_t,tcp_socket,name_bind audit2allow suggests: #============= httpd_t ============== allow httpd_t soundd_port_t:tcp_socket name_bind;
allow httpd_t soundd_port_t:tcp_socket name_bind; ?!
Did you setup your httpd server to listen on port 8000?
yes, sometimes i need to test php app, that for some reason demand everything to be in document root, i have recently set virtualhost configured in apache to listen and respond to http://localhost:8000 for one such app. But even before i established that virtual host and added "Listen 8000" directive in apache configuration files, I regularly have in /var/log/httpd/error_log lines like that ( when httpd starts) [error] avahi_entry_group_add_service_strlst("marina-home") failed: Invalid host name I am not sure if that has something to do with "name_bind" in /etc/hosts I have: -------------------------------------------------------------------------- 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4 marina-home.localdomain ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6 marina-home.localdomain
Listen 8000 <VirtualHost _default_:8000> ServerAdmin marinalan DocumentRoot /home/marina/<some_directory_webroot_of_tested_php_app> ServerName marina-home Options FollowSymLinks </VirtualHost>
I needed to use some port, because i use ssh remote port forwarding to have public url
You can add this port by using audit2allow # grep name_bind /var/log/audit/audit.log | audit2allow -M myhttp # semodule -i myhttp.pp If you want to have a document root in /home/marina you will need to setup this directory to have labeling of httpd_sys_content_t. # semanage fcontext -a -t httpd_sys_content_t /home/marina ' /<some_directory_webroot_of_tested_php_app>(/.*)?' # restorecon -R -v /home/marina /home/marina/<some_directory_webroot_of_tested_php_app>