Hi, I just installed the last stable version of isc-bind on a fresh and uptodate Almalinux 9 and I've got trouble with the selinux implementation. The isc-bind-named service don't start if selinux is enforcing, I traced the log :
---- time->Thu Sep 12 11:41:13 2024 type=PROCTITLE msg=audit(1726134073.757:2284): proctitle=2F6F70742F6973632F6973632D62696E642F726F6F742F7573722F7362696E2F6E616D6564002D75006E616D6564 type=PATH msg=audit(1726134073.757:2284): item=1 name="/lib64/ld-linux-x86-64.so.2" inode=2143341 dev=fd:02 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:ld_so_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 type=PATH msg=audit(1726134073.757:2284): item=0 name="/opt/isc/isc-bind/root/usr/sbin/named" inode=966732 dev=fd:08 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:named_exec_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 type=CWD msg=audit(1726134073.757:2284): cwd="/" type=EXECVE msg=audit(1726134073.757:2284): argc=3 a0="/opt/isc/isc-bind/root/usr/sbin/named" a1="-u" a2="named" type=SYSCALL msg=audit(1726134073.757:2284): arch=c000003e syscall=59 success=yes exit=0 a0=555e756f9130 a1=555e7573fe40 a2=555e75743fb0 a3=0 items=2 ppid=1 pid=14367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="named" exe="/opt/isc/isc-bind/root/usr/sbin/named" subj=system_u:system_r:init_t:s0 key=(null) type=SELINUX_ERR msg=audit(1726134073.757:2284): op=security_bounded_transition seresult=denied oldcontext=system_u:system_r:init_t:s0 newcontext=system_u:system_r:named_t:s0 type=AVC msg=audit(1726134073.757:2284): avc: denied { nosuid_transition } for pid=14367 comm="(named)" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:named_t:s0 tclass=process2 permissive=0 ---- time->Thu Sep 12 11:41:13 2024 type=PROCTITLE msg=audit(1726134073.778:2285): proctitle=2F6F70742F6973632F6973632D62696E642F726F6F742F7573722F7362696E2F6E616D6564002D75006E616D6564 type=PATH msg=audit(1726134073.778:2285): item=0 name="/var/opt/isc/scls/isc-bind/run/named/" inode=2118083 dev=fd:05 mode=040770 ouid=990 ogid=990 rdev=00:00 obj=system_u:object_r:named_var_run_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 type=CWD msg=audit(1726134073.778:2285): cwd="/var/opt/isc/scls/isc-bind/named/data" type=SYSCALL msg=audit(1726134073.778:2285): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=5641ec1bbf58 a2=c1 a3=1a4 items=1 ppid=14367 pid=14368 auid=4294967295 uid=990 gid=990 euid=990 suid=990 fsuid=990 egid=990 sgid=990 fsgid=990 tty=(none) ses=4294967295 comm="named" exe="/opt/isc/isc-bind/root/usr/sbin/named" subj=system_u:system_r:init_t:s0 key=(null) type=AVC msg=audit(1726134073.778:2285): avc: denied { create } for pid=14368 comm="named" name="named.pid" scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:named_var_run_t:s0 tclass=file permissive=0 ---- time->Thu Sep 12 11:41:13 2024 type=PROCTITLE msg=audit(1726134073.778:2286): proctitle=2F6F70742F6973632F6973632D62696E642F726F6F742F7573722F7362696E2F6E616D6564002D75006E616D6564 type=PATH msg=audit(1726134073.778:2286): item=0 name="/var/opt/isc/scls/isc-bind/run/named/" inode=2118083 dev=fd:05 mode=040770 ouid=990 ogid=990 rdev=00:00 obj=system_u:object_r:named_var_run_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 type=CWD msg=audit(1726134073.778:2286): cwd="/var/opt/isc/scls/isc-bind/named/data" type=SYSCALL msg=audit(1726134073.778:2286): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=5641ec1bbf58 a2=c1 a3=1a4 items=1 ppid=14367 pid=14368 auid=4294967295 uid=990 gid=990 euid=990 suid=990 fsuid=990 egid=990 sgid=990 fsgid=990 tty=(none) ses=4294967295 comm="named" exe="/opt/isc/isc-bind/root/usr/sbin/named" subj=system_u:system_r:init_t:s0 key=(null) type=AVC msg=audit(1726134073.778:2286): avc: denied { create } for pid=14368 comm="named" name="named.pid" scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:named_var_run_t:s0 tclass=file permissive=0 ---- time->Thu Sep 12 11:41:13 2024 type=PROCTITLE msg=audit(1726134073.778:2287): proctitle=2F6F70742F6973632F6973632D62696E642F726F6F742F7573722F7362696E2F6E616D6564002D75006E616D6564 type=PATH msg=audit(1726134073.778:2287): item=0 name="/var/opt/isc/scls/isc-bind/run/named/" inode=2118083 dev=fd:05 mode=040770 ouid=990 ogid=990 rdev=00:00 obj=system_u:object_r:named_var_run_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 type=CWD msg=audit(1726134073.778:2287): cwd="/var/opt/isc/scls/isc-bind/named/data" type=SYSCALL msg=audit(1726134073.778:2287): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=5641ec1bbf88 a2=c1 a3=180 items=1 ppid=14367 pid=14368 auid=4294967295 uid=990 gid=990 euid=990 suid=990 fsuid=990 egid=990 sgid=990 fsgid=990 tty=(none) ses=4294967295 comm="named" exe="/opt/isc/isc-bind/root/usr/sbin/named" subj=system_u:system_r:init_t:s0 key=(null) type=AVC msg=audit(1726134073.778:2287): avc: denied { create } for pid=14368 comm="named" name="session.key" scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:named_var_run_t:s0 tclass=file permissive=0 ---- time->Thu Sep 12 11:41:13 2024 type=PROCTITLE msg=audit(1726134073.778:2288): proctitle=2F6F70742F6973632F6973632D62696E642F726F6F742F7573722F7362696E2F6E616D6564002D75006E616D6564 type=PATH msg=audit(1726134073.778:2288): item=0 name="/var/opt/isc/scls/isc-bind/run/named/" inode=2118083 dev=fd:05 mode=040770 ouid=990 ogid=990 rdev=00:00 obj=system_u:object_r:named_var_run_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 type=CWD msg=audit(1726134073.778:2288): cwd="/var/opt/isc/scls/isc-bind/named/data" type=SYSCALL msg=audit(1726134073.778:2288): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=5641ec1bbf88 a2=c1 a3=180 items=1 ppid=14367 pid=14368 auid=4294967295 uid=990 gid=990 euid=990 suid=990 fsuid=990 egid=990 sgid=990 fsgid=990 tty=(none) ses=4294967295 comm="named" exe="/opt/isc/isc-bind/root/usr/sbin/named" subj=system_u:system_r:init_t:s0 key=(null) type=AVC msg=audit(1726134073.778:2288): avc: denied { create } for pid=14368 comm="named" name="session.key" scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:named_var_run_t:s0 tclass=file permissive=0 ---- time->Thu Sep 12 11:41:13 2024 type=PROCTITLE msg=audit(1726134073.781:2289): proctitle=2F6F70742F6973632F6973632D62696E642F726F6F742F7573722F7362696E2F6E616D6564002D75006E616D6564 type=PATH msg=audit(1726134073.781:2289): item=1 name="named.run" inode=3159 dev=fd:05 mode=0100644 ouid=990 ogid=990 rdev=00:00 obj=system_u:object_r:named_cache_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 type=PATH msg=audit(1726134073.781:2289): item=0 name="/var/opt/isc/scls/isc-bind/named/data" inode=3168 dev=fd:05 mode=040770 ouid=990 ogid=990 rdev=00:00 obj=system_u:object_r:named_cache_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 type=CWD msg=audit(1726134073.781:2289): cwd="/var/opt/isc/scls/isc-bind/named/data" type=SYSCALL msg=audit(1726134073.781:2289): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f265be9ff60 a2=441 a3=1b6 items=2 ppid=14367 pid=14368 auid=4294967295 uid=990 gid=990 euid=990 suid=990 fsuid=990 egid=990 sgid=990 fsgid=990 tty=(none) ses=4294967295 comm="named" exe="/opt/isc/isc-bind/root/usr/sbin/named" subj=system_u:system_r:init_t:s0 key=(null) type=AVC msg=audit(1726134073.781:2289): avc: denied { append } for pid=14368 comm="named" name="named.run" dev="dm-5" ino=3159 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:named_cache_t:s0 tclass=file permissive=0 #============= init_t ============== allow init_t named_cache_t:file append; allow init_t named_t:process2 nosuid_transition; allow init_t named_var_run_t:file create; O installed binfd with the command : dnf copr enable isc/bind dnf install epel-release dnf install isc-bind What I have to do, I don't want to add custom selinux rules as I'm not such that they will not be over-write with the next update. Best regards, Mathieu TABAKA Administrateur Systèmes et Réseaux Service Informatique [Logo Crit.] Tél. : 02 32 09 35 60 - Port. : 06 25 73 54 57 mathieu.tab...@groupe-crit.com<mailto:mathieu.tab...@groupe-crit.com> 9 voie des clouets BP 204 27100 VAL DE REUIL www.crit-job.com<http://www.crit-job.com/> [Logo Facebook]<https://www.facebook.com/CritFrance> [Logo Twitter] <https://twitter.com/CritFrance> [Logo LinkedIn] <https://fr.linkedin.com/company/crit> [Logo Viadeo] <https://www.instagram.com/crit_france>
-- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users