httpd avc denied problem

Daniel J Walsh dwalsh at redhat.com
Thu Dec 2 18:46:55 UTC 2004


Arthur Stephens wrote:

>I installed the policy sources on my fedora core 3. :)
>Got to step one
>Edit /etc/selinux/targeted/src/policy/file_contexts/file_contexts
>
>There is no such file  :(
>[root at webmail ~]# ls /etc/selinux/targeted/src/policy/file_contexts/
>distros.fc  misc  program  types.fc
>[root at webmail ~]#
>  
>
Ok create a file in the misc directory called custom.fc, file_context 
file is only created via the make file.

echo "/var/www/.*/logs(/.*)?            system_u:object_r:httpd_log_t" >> misc/customer.fc
Then rebuild policy

make load
Now restorecon



>Arthur Stephens
>Sales Technician
>Ptera Wireless Internet
>astephens at ptera.net
>509-927-Ptera
>
>----- Original Message ----- 
>From: "Karsten Wade" <kwade at redhat.com>
>To: "Fedora SELinux support list for users & developers."
><fedora-selinux-list at redhat.com>
>Sent: Tuesday, November 30, 2004 2:01 PM
>Subject: Re: httpd avc denied problem
>
>
>  
>
>>On Tue, 2004-11-30 at 13:12, Karsten Wade wrote:
>>
>>    
>>
>>>  chcon -R -t httpd_log_t /var/www/*/logs/*
>>>  service httpd start
>>>      
>>>
>>BTW, if this works, you'll want to do something to make the change
>>permanent.  Otherwise, the next running of restorecon will hose your
>>configuration.
>>
>>Two options jump to mind:
>>
>>* Move the logs into a path that will receive httpd_log_t, i.e.,
>>/var/logs/httpd/
>>
>>* Install the policy sources (yum install
>>selinux-policy-targeted-sources), and do the following:
>>
>>1. Edit /etc/selinux/targeted/src/policy/file_contexts/file_contexts
>>
>>2. Add this line:
>>/var/www/.*/logs(/.*)?            system_u:object_r:httpd_log_t
>>
>>Feel free to correct my regexp, but I think it's right. :)
>>
>>3. In /etc/selinux/targeted/src/policy rebuild the policy with 'make
>>load'.  This will build and load the new policy directly into memory.
>>
>>4. If you now do restorecon, the /var/www/*/logs directories should get
>>the proper context.
>>
>>Be aware that if you make another change to SELinux, especially using
>>system-config-securitylevel, the file /.autorelabel may get created.
>>That triggers a relabeling on reboot, and may hose any manual
>>customizations not fixed in policy.
>>
>>- Karsten
>>-- 
>>Karsten Wade, RHCE, Tech Writer
>>a lemon is just a melon in disguise
>>http://people.redhat.com/kwade/
>>gpg fingerprint: 2680 DBFD D968 3141 0115  5F1B D992 0E06 AD0E 0C41
>>
>>--
>>fedora-selinux-list mailing list
>>fedora-selinux-list at redhat.com
>>http://www.redhat.com/mailman/listinfo/fedora-selinux-list
>>    
>>
>
>--
>fedora-selinux-list mailing list
>fedora-selinux-list at redhat.com
>http://www.redhat.com/mailman/listinfo/fedora-selinux-list
>  
>




More information about the fedora-selinux-list mailing list