Red Hat Bugzilla – Bug 890647
SELinux don't allow postqueue to run under sysadm_t
Last modified: 2013-11-21 05:12:07 EST
Description of problem: SELinux don't allow postqueue to run under sysadm_t How reproducible: Run postqueue -p with selinux in enforced mode with sysadmin_t user type. Actual results: postqueue -p postqueue: fatal: Connect to the Postfix showq service: Permission denied and audit2allow show: allow sysadm_t postfix_master_t:unix_stream_socket connectto; allow sysadm_t postfix_public_t:sock_file write; Expected results: Show postqueue results Additional info: When I add this macro: domtrans_pattern(sysadm_t, postfix_postqueue_exec_t, postfix_postqueue_t) then all start working fine.
Dan added fixes to Fedora which need to be backported. Thank you for using confined users.
#============= sysadm_t ============== #!!!! This avc is allowed in the current policy allow sysadm_t postfix_master_t:unix_stream_socket connectto;
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-1598.html