Hide Forgot
libreport version: 2.0.8 executable: /usr/bin/python hashmarkername: setroubleshoot kernel: 3.2.2-1.fc16.x86_64 reason: SELinux is preventing /usr/sbin/openvpn from 'open' accesses on the None pfsense-udp-33194-ca.crt. reported_to: file: /home/neil/abrt-log-output.txt time: Tue 31 Jan 2012 08:11:26 PM PST description: :SELinux is preventing /usr/sbin/openvpn from 'open' accesses on the None pfsense-udp-33194-ca.crt. : :***** Plugin catchall (100. confidence) suggests *************************** : :If you believe that openvpn should be allowed open access on the pfsense-udp-33194-ca.crt <Unknown> by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep openvpn /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:openvpn_t:s0 :Target Context unconfined_u:object_r:user_tmp_t:s0 :Target Objects pfsense-udp-33194-ca.crt [ None ] :Source openvpn :Source Path /usr/sbin/openvpn :Port <Unknown> :Host (removed) :Source RPM Packages openvpn-2.2.1-2.fc16.x86_64 :Target RPM Packages :Policy RPM selinux-policy-3.10.0-72.fc16.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Permissive :Host Name (removed) :Platform Linux (removed) 3.2.2-1.fc16.x86_64 #1 SMP Thu Jan : 26 03:21:58 UTC 2012 x86_64 x86_64 :Alert Count 1 :First Seen Tue 31 Jan 2012 08:08:37 PM PST :Last Seen Tue 31 Jan 2012 08:08:37 PM PST :Local ID 3b65bf41-1077-4a28-a59b-7a06c8dd01c7 : :Raw Audit Messages :type=AVC msg=audit(1328069317.785:92): avc: denied { open } for pid=1969 comm="openvpn" name="pfsense-udp-33194-ca.crt" dev=dm-1 ino=157743 scontext=system_u:system_r:openvpn_t:s0 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=filenode=(removed) type=SYSCALL msg=audit(1328069317.785:92): arch=c000003e syscall=2 success=yes exit=6 a0=7fffffa79f0f a1=0 a2=1b6 a3=238 items=0 ppid=1964 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="openvpn" exe="/usr/sbin/openvpn" subj=system_u:system_r:openvpn_t:s0 key=(null) : : :Hash: openvpn,openvpn_t,user_tmp_t,None,open : :audit2allow : : :audit2allow -R : : event_log: :2012-01-31-20:12:47> Logging into Bugzilla at https://bugzilla.redhat.com :2012-01-31-20:12:48 fatal: XML-RPC(300): RPC failed at server. The username or password you entered is not valid. :2012-01-31-20:12:48* (exited with 1) :2012-01-31-20:12:48> The report was appended to /home/neil/abrt-log-output.txt
Where is pfsense-udp-33194-ca.crt located? You will need to run restorecon on this cert $ restorecon -R -v PATHTO/pfsense-udp-33194-ca.crt certs should be located in HOME_DIR/\.cert