Description of problem: httpd wsgi application can no longer connect to dirsrv socket. I assume this is a regression in Fedora 17, the wsgi script worked for us earlier. /var/log/audit/audit.log: type=AVC msg=audit(1339412496.858:270): avc: denied { connectto } for pid=10769 comm="httpd" path="/run/slapd-IDM-LAB-BOS-REDHAT-COM.socket" scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:dirsrv_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1339412496.858:270): arch=c000003e syscall=42 success=no exit=-13 a0=2e a1=7f8de1cac2e0 a2=6e a3=7f8de1cac2e2 items=0 ppid=10690 pid=10769 auid=4294967295 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) ses=4294967295 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) Version-Release number of selected component (if applicable): selinux-policy-targeted-3.10.0-128.fc17.noarch How reproducible: Steps to Reproduce: 1. Install freeipa-server package 2. Run ipa-server-install with default options to install an IPA server on host $HOST 3. Open https://$HOST/ipa/migration/ 4. Insert admin user credentials that were entered during ipa-server-install Actual results: Page reports error, AVC is added to audit.log Expected results: Operation is allowed Additional info:
We just tested that an older selinux-polixy version (selinux-policy-targeted-3.10.0-125.fc17.noarch) allowed this connection.
I tested that when I set authlogin_nsswitch_use_ldap sebool to true, connection to socket worked. But I don't think we want to always set this option to true when installing IPA, httpd connectes to dirsrv socket for a reason not related to authentication or nsswitch. There was already a similar discussion in Bug 748366 where named_t could not connect to dirsrv_t.
Miroslav, you may be right. When I run the tests today, I could not find a selinux-policy version where I would not get the AVC (earlier negative test with selinux-policy-targeted-3.10.0-125.fc17.noarch was done by my colleague). Still, current selinux-policy does not allow our WSGI script to connect to dirsrv, although now I get slightly different AVC: type=AVC msg=audit(1339488123.752:1453): avc: denied { write } for pid=21251 comm="httpd" name="slapd-IDM-LAB-BOS-REDHAT-COM.socket" dev="tmpfs" ino=161531 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:slapd_var_run_t:s0 tclass=sock_file I can test any scratch build of the policy it this would help or provide access to the VM I am testing on.
Fixed in selinux-policy-targeted-3.10.0-131.fc17
selinux-policy-3.10.0-132.fc17 has been submitted as an update for Fedora 17. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-132.fc17
selinux-policy-3.10.0-132.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.