Hide Forgot
The current selinux policy prevents krb5kdc_t access to disrv_var_run_t to write to sock_file. Dan suggested adding the following to the policy: optional_policy(` ldap_stream_connect(krb5kdc_t) ') optional_policy(` dirsrv_stream_connect(krb5kdc_t) ') I locally fixed it by creating a local policy with the following 2 allows: allow krb5kdc_t dirsrv_var_run_t:sock_file write; allow krb5kdc_t dirsrv_t:unix_stream_socket connectto; HTH
Fixed in selinux-policy-3.9.13-4.fc15
Is it going to be fixed in F14? It is still our testing platform for another three weeks.
I have asked miroslav to back port changes to F13/14/RHEL6
Fixed in F13/14/RHEL6.