Hide Forgot
Description of problem: I have spent a non-trivial amount of time checking why some users are given the following message after ssh login after I upgraded to F16 and enabled SElinux: Could not chdir to home directory /home/<loginname>: Permission denied after that, the cwd of their shell was /, but they could do "cd ~" without problem. Later, after seeing no AVCs in the audit.log and verifying that "setenforce 0" made the problem disappear, I have allowed the "dontaudit" messages to be logged. Only then I have then discovered that only users with their home on NFS volume had this problem, so "setsebool use_nfs_home_dirs 1" was the correct fix. I would however suggest that AVCs about sshd_t accessing nfs_t should be logged, not dontaudited (unless there is a good reason to actually dontaudit them). It would make the whole debugging much easier. Thanks for considering this modification to the policy. Version-Release number of selected component (if applicable): selinux-policy-targeted-3.10.0-56.fc16.noarch selinux-policy-3.10.0-56.fc16.noarch
Miroslav I think f5650ab535ffd9536fe948834bee5b0b0eb3149b will fix this problem.
We will see. Fixed in -63.fc16 release.
selinux-policy-3.10.0-64.fc16 has been submitted as an update for Fedora 16. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-64.fc16
Package selinux-policy-3.10.0-64.fc16: * should fix your issue, * was pushed to the Fedora 16 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.10.0-64.fc16' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2011-16698/selinux-policy-3.10.0-64.fc16 then log in and leave karma (feedback).
Works for me, thanks. Karma updated.
selinux-policy-3.10.0-64.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
I'm having the same problem on a fully updated RHEL 6.2 box. What's the fix?
Well you could try the 6.3 policy, which has a preview release on people.redhat.com/dwalsh/SELinux/RHEL6 Or you could add a custom policy module with a dontaudit rule.