Bug 857823 - Possible SELinux problem with postfix on a system made directory
Summary: Possible SELinux problem with postfix on a system made directory
Keywords:
Status: CLOSED DEFERRED
Alias: None
Product: Red Hat Satellite 5
Classification: Red Hat
Component: Server
Version: unspecified
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Michael Mráka
QA Contact: Red Hat Satellite QA List
URL:
Whiteboard:
Depends On:
Blocks: 462714
TreeView+ depends on / blocked
 
Reported: 2012-09-17 06:45 UTC by Fred van Zwieten
Modified: 2023-09-14 01:37 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-05-29 20:03:03 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Fred van Zwieten 2012-09-17 06:45:26 UTC
Description of problem:
On a standard install of RHEL 6.3 there seems to be a process that creates the directory "1" in /root. Subsequently, this AVC is generated:

SELinux is preventing /usr/sbin/sendmail.postfix from write access on the file /root/1.

*****  Plugin leaks (86.2 confidence) suggests  ******************************

If you want to ignore sendmail.postfix trying to write access the 1 file, because you believe it should not need this access.
Then you should report this as a bug.  
You can generate a local policy module to dontaudit this access.
Do
# grep /usr/sbin/sendmail.postfix /var/log/audit/audit.log | audit2allow -D -M mypol
# semodule -i mypol.pp

*****  Plugin leaks (86.2 confidence) suggests  ******************************

If you want to ignore sendmail.postfix trying to write access the 1 file, because you believe it should not need this access.
Then you should report this as a bug.  
You can generate a local policy module to dontaudit this access.
Do
# grep /usr/sbin/sendmail.postfix /var/log/audit/audit.log | audit2allow -D -M mypol
# semodule -i mypol.pp

*****  Plugin catchall (14.7 confidence) suggests  ***************************

If you believe that sendmail.postfix should be allowed write access on the 1 file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep sendmail /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

The SELinux info for the directory /root/1 is:
-rw-r--r--. root root system_u:object_r:admin_home_t:s0 1

Version-Release number of selected component (if applicable):
postfix-2.6.6-2.2.el6_1.x86_64

How reproducible:
Don't know

Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:

Comment 1 Fred van Zwieten 2012-09-17 06:47:10 UTC
Sorry, /root/1 is a file, not a directory

Comment 2 Milos Malik 2012-09-17 06:51:17 UTC
What AVCs do you see?

# ausearch -m avc -ts today

Comment 4 Fred van Zwieten 2012-09-17 07:06:16 UTC
Lot's of these:

time->Mon Sep 17 04:24:06 2012
type=SYSCALL msg=audit(1347848646.313:66786): arch=c000003e syscall=59 success=yes exit=0 a0=22d3330 a1=22cafc0 a2=1e3c330 a3=20 items=0 ppid=9449 pid=9452 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1569 comm="sendmail" exe="/usr/sbin/sendmail.postfix" subj=system_u:system_r:system_mail_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1347848646.313:66786): avc:  denied  { write } for  pid=9452 comm="sendmail" path="/root/1" dev=dm-0 ino=3201 scontext=system_u:system_r:system_mail_t:s0-s0:c0.c1023 tcontext=system_u:object_r:admin_home_t:s0 tclass=file

BTW, I've traced the origin of /root/1 as being created by a cron job:

0 1 * * * root perl -le 'sleep rand 9000' && satellite-sync --email >/dev/null 2>1

This is an exact copy from the RHN Satellite User Guide (https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Network_Satellite/5.4/html-single/User_Guide/index.html#chap-User_Guide-Automatic_Synchronization)

So, my guess is the "--mail" invokes postfix and postfix wants to write into 1 but is prevented by SElinux.

Comment 5 Miroslav Grepl 2012-10-09 19:05:56 UTC
If it is really needed to use /root/1 file then it should be appended instead of write access.

Comment 6 Fred van Zwieten 2012-10-18 11:28:33 UTC
In general, procedures in product documentation should work on a default install, or should describe the variations.

Comment 7 Clifford Perry 2013-07-08 15:51:29 UTC
By default we do sendmail not postfix. 

https://access.redhat.com/site/documentation/en-US/Red_Hat_Network_Satellite/5.4/html-single/Installation_Guide/index.html#sect-Installation_Guide-Installation-Sendmail_Configuration

My recommendation is to open a support case with Red Hat to replicate and confirm bug and align appropriately. 

Cliff

Comment 9 Red Hat Bugzilla 2023-09-14 01:37:30 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days


Note You need to log in before you can comment on or make changes to this bug.