Re: SE alert

2015-07-21 Thread jd1008
On 07/21/2015 06:49 AM, Daniel J Walsh wrote: On 07/20/2015 03:49 PM, jd1008 wrote: On 07/20/2015 01:42 PM, Martin Cigorraga wrote: Hi, ~ getenforce Enforcing Please be aware that setenforce will only change the mode SELinux is running in. For a permanent change, you have to edit the confi

Re: SE alert

2015-07-21 Thread jd1008
On 07/21/2015 06:49 AM, Daniel J Walsh wrote: On 07/20/2015 03:49 PM, jd1008 wrote: On 07/20/2015 01:42 PM, Martin Cigorraga wrote: Hi, ~ getenforce Enforcing Please be aware that setenforce will only change the mode SELinux is running in. For a permanent change, you have to edit the confi

Re: SE alert

2015-07-21 Thread Daniel J Walsh
You can just run # restorecon -R -v / From the booted machine. On 07/20/2015 03:49 PM, jd1008 wrote: > > > On 07/20/2015 01:42 PM, Martin Cigorraga wrote: >> Hi, >> >> ~ getenforce >> Enforcing >> >> Please be aware that setenforce will only change the mode SELinux is >> running in. For a perman

Re: SE alert

2015-07-20 Thread jd1008
On 07/20/2015 01:42 PM, Martin Cigorraga wrote: Hi, ~ getenforce Enforcing Please be aware that setenforce will only change the mode SELinux is running in. For a permanent change, you have to edit the configuration file. I already stated that /etc/sysconfig/selinux says (and did say whe

Re: SE alert

2015-07-20 Thread Martin Cigorraga
Hi, ~ getenforce Enforcing Please be aware that setenforce will only change the mode SELinux is running in. For a permanent change, you have to edit the configuration file. On Mon, Jul 20, 2015 at 4:32 PM jd1008 wrote: > > > On 07/20/2015 12:38 PM, Martin Cigorraga wrote: > > Hi, > > > > I cre

Re: SE alert

2015-07-20 Thread jd1008
On 07/20/2015 12:38 PM, Martin Cigorraga wrote: Hi, I created the file /.autorelabel (# touch /.autorelabel), set SELinux to 'enforcing' and (/etc/sysconfig/selinux) and rebooted. May be I could do it without rebooting as stated in this question: https://serverfault.com/questions/453137/ho

Re: SE alert

2015-07-20 Thread jd1008
On 07/20/2015 12:38 PM, Martin Cigorraga wrote: > I created the file /.autorelabel (# touch /.autorelabel), set SELinux to 'enforcing' and (/etc/sysconfig/selinux) and rebooted. > > May be I could do it without rebooting as stated in this question: https://serverfault.com/questions/453137/how

Re: SE alert

2015-07-20 Thread Martin Cigorraga
Hi, I created the file /.autorelabel (# touch /.autorelabel), set SELinux to 'enforcing' and (/etc/sysconfig/selinux) and rebooted. May be I could do it without rebooting as stated in this question: https://serverfault.com/questions/453137/how-can-i-do-an-selinux-filesystem-relabel-without-reboot

Re: SE alert

2015-07-20 Thread jd1008
On 07/20/2015 12:23 PM, Martin Cigorraga wrote: Hello folks, It happened to me too that about a week or so ago SELinux automatically turned to 'Permissive' with an upgrade of selinux-related packages, I had to relabel everything to get things back to its previous state. Although I didn't

Re: SE alert

2015-07-20 Thread Martin Cigorraga
Hello folks, It happened to me too that about a week or so ago SELinux automatically turned to 'Permissive' with an upgrade of selinux-related packages, I had to relabel everything to get things back to its previous state. Although I didn't delve in the issue at that moment I will keep an eye on

Re: SE alert

2015-07-20 Thread Joe Zeff
On 07/20/2015 10:58 AM, jd1008 wrote: On 07/20/2015 11:50 AM, Joe Zeff wrote: On 07/20/2015 10:45 AM, jd1008 wrote: But I did not set it into permissive mode. I finished installing it mid-day yesterday, Why did you install a version that you knew was past EOL? For confidential apps I have

Re: SE alert

2015-07-20 Thread jd1008
On 07/20/2015 11:57 AM, Gordon Messmer wrote: On 07/20/2015 10:47 AM, jd1008 wrote: So, how did it become permissive?? We have no way to answer that. Your audit log would record the time at which the system entered permissive mode. How incredibly mysterious is that? here are a few of the

Re: SE alert

2015-07-20 Thread jd1008
On 07/20/2015 11:50 AM, Joe Zeff wrote: On 07/20/2015 10:45 AM, jd1008 wrote: But I did not set it into permissive mode. I finished installing it mid-day yesterday, Why did you install a version that you knew was past EOL? For confidential apps I have no source for, only binaries which dema

Re: SE alert

2015-07-20 Thread Gordon Messmer
On 07/20/2015 10:47 AM, jd1008 wrote: So, how did it become permissive?? We have no way to answer that. Your audit log would record the time at which the system entered permissive mode. -- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription options: https:/

Re: SE alert

2015-07-20 Thread Joe Zeff
On 07/20/2015 10:45 AM, jd1008 wrote: But I did not set it into permissive mode. I finished installing it mid-day yesterday, Why did you install a version that you knew was past EOL? -- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription options: https://admin

Re: SE alert

2015-07-20 Thread jd1008
On 07/20/2015 11:43 AM, Gordon Messmer wrote: On 07/20/2015 09:44 AM, jd1008 wrote: Source RPM Packages python-2.7.5-16.fc20.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-197.fc20.noarch Fedora 20 is EOL. There will be no further updates. Troubleshooting policy errors in outd

Re: SE alert

2015-07-20 Thread jd1008
On 07/20/2015 11:43 AM, Gordon Messmer wrote: On 07/20/2015 09:44 AM, jd1008 wrote: Source RPM Packages python-2.7.5-16.fc20.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-197.fc20.noarch Fedora 20 is EOL. There will be no further updates. Troubleshooting policy errors in outd

Re: SE alert

2015-07-20 Thread Gordon Messmer
On 07/20/2015 09:44 AM, jd1008 wrote: Source RPM Packages python-2.7.5-16.fc20.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-197.fc20.noarch Fedora 20 is EOL. There will be no further updates. Troubleshooting policy errors in outdated packages is largely a waste of tim

Re: SE alert

2015-07-20 Thread jd1008
On 07/19/2015 08:27 PM, Ed Greshko wrote: On 07/20/15 09:39, jd1008 wrote: I forgot the file I touch in / to force a relabel, something like .relabel=true ??? touch /.autorelabel google would have found that for you. Yep! I found it in a fedoraproject forum message right after I sent the em

Re: SE alert

2015-07-19 Thread Ed Greshko
On 07/20/15 09:39, jd1008 wrote: > > I forgot the file I touch in / to force a relabel, something like > .relabel=true ??? > touch /.autorelabel google would have found that for you. -- If I wanted a blog or social media I'd go elsewhere -- users mailing list users@lists.fedoraproject.org To

Re: SE alert

2015-07-19 Thread jd1008
On 07/19/2015 07:00 PM, Ed Greshko wrote: On 07/20/15 08:47, jd1008 wrote: On 07/19/2015 05:45 PM, Ed Greshko wrote: On 07/20/15 07:31, jd1008 wrote: On 07/18/2015 09:18 PM, Ed Greshko wrote: On 07/19/15 11:12, Ed Greshko wrote: If they are enabled, disable them for the time being and che

Re: SE alert

2015-07-19 Thread Ed Greshko
On 07/20/15 08:47, jd1008 wrote: > > > On 07/19/2015 05:45 PM, Ed Greshko wrote: >> On 07/20/15 07:31, jd1008 wrote: >>> >>> On 07/18/2015 09:18 PM, Ed Greshko wrote: On 07/19/15 11:12, Ed Greshko wrote: > If they are enabled, disable them for the time being and check to see if > the

Re: SE alert

2015-07-19 Thread jd1008
On 07/19/2015 05:45 PM, Ed Greshko wrote: On 07/20/15 07:31, jd1008 wrote: On 07/18/2015 09:18 PM, Ed Greshko wrote: On 07/19/15 11:12, Ed Greshko wrote: If they are enabled, disable them for the time being and check to see if the sealerts cease. I should have said "stop" and "disable" th

Re: SE alert

2015-07-19 Thread Ed Greshko
On 07/20/15 07:31, jd1008 wrote: > > > On 07/18/2015 09:18 PM, Ed Greshko wrote: >> On 07/19/15 11:12, Ed Greshko wrote: >>> If they are enabled, disable them for the time being and check to see if >>> the sealerts cease. >> I should have said "stop" and "disable" them. >> > Done! and problem solv

Re: SE alert

2015-07-19 Thread jd1008
On 07/18/2015 09:18 PM, Ed Greshko wrote: On 07/19/15 11:12, Ed Greshko wrote: If they are enabled, disable them for the time being and check to see if the sealerts cease. I should have said "stop" and "disable" them. Done! and problem solved!!! Thanx a lot!!! Much appreciated!!! -- users

Re: SE alert

2015-07-19 Thread jd1008
On 07/18/2015 09:11 PM, Joe Zeff wrote: On 07/18/2015 08:02 PM, jd1008 wrote: egid=0 sgid=0 fsgid=0 ses=37 tty=(none) comm=sa1 exe=/usr/bin/sh subj=system_u:system_r:sysstat_t:s0-s0:c0.c1023 Right there's you're answer: /usr/bin/sh, AKA bash. Well, who, or more exactly, what is forking a ba

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 11:26, inode0 wrote: > sa1 appears to be the culprit. It is normally run from a cronjob > typically every 10 minutes. See my other message [root@meimei ~]# systemctl is-enabled sysstat-collect.timer enabled [root@meimei ~]# systemctl is-enabled sysstat.service enabled If they are

Re: SE alert

2015-07-18 Thread inode0
On Sat, Jul 18, 2015 at 10:02 PM, jd1008 wrote: > > > On 07/18/2015 08:46 PM, Ed Greshko wrote: >> >> On 07/19/15 10:17, jd1008 wrote: >>> >>> The original I posted says: >>> >>> type=SYSCALL msg=audit(1437267001.953:644): arch=x86_64 syscall=openat >>> success=no exit=EACCES a0=ff9c a

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 11:12, Ed Greshko wrote: > If they are enabled, disable them for the time being and check to see if the > sealerts cease. I should have said "stop" and "disable" them. -- If I wanted a blog or social media I'd go elsewhere -- users mailing list users@lists.fedoraproject.org To unsu

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 10:57, jd1008 wrote: > It is gosh darned fast > Like every 2 minutes. > > $ sudo systemctl -l | grep sysstat > sysstat.service loaded active exitedResets System Activity Logs Sorry I wasn't explicit [root@meimei ~]# systemctl is-enabled sysstat-collect.timer enabled [roo

Re: SE alert

2015-07-18 Thread Joe Zeff
On 07/18/2015 08:02 PM, jd1008 wrote: egid=0 sgid=0 fsgid=0 ses=37 tty=(none) comm=sa1 exe=/usr/bin/sh subj=system_u:system_r:sysstat_t:s0-s0:c0.c1023 Right there's you're answer: /usr/bin/sh, AKA bash. -- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription op

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 08:46 PM, Ed Greshko wrote: On 07/19/15 10:17, jd1008 wrote: The original I posted says: type=SYSCALL msg=audit(1437267001.953:644): arch=x86_64 syscall=openat success=no exit=EACCES a0=ff9c a1=4fcb93 a2=80800 a3=0 items=0 ppid=6474 pid=6476 auid=0 uid=0 gid=0 euid

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 08:46 PM, Ed Greshko wrote: On 07/19/15 10:17, jd1008 wrote: The original I posted says: type=SYSCALL msg=audit(1437267001.953:644): arch=x86_64 syscall=openat success=no exit=EACCES a0=ff9c a1=4fcb93 a2=80800 a3=0 items=0 ppid=6474 pid=6476 auid=0 uid=0 gid=0 euid

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 10:17, jd1008 wrote: > The original I posted says: > > type=SYSCALL msg=audit(1437267001.953:644): arch=x86_64 syscall=openat > success=no exit=EACCES a0=ff9c a1=4fcb93 a2=80800 a3=0 items=0 > ppid=6474 pid=6476 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 > fsg

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 08:20 PM, Ed Greshko wrote: On 07/19/15 10:15, jd1008 wrote: Well, now, this is interesting: $ sudo ls -l -i -R /root | grep 47972353< Produced no output $ sudo ls -l -d -i -R /root | grep 47972353 << adding the -d option, however: 47972353 dr-xr-x---. 9 root root 4

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 10:15, jd1008 wrote: > Well, now, this is interesting: > > $ sudo ls -l -i -R /root | grep 47972353< Produced no output > $ sudo ls -l -d -i -R /root | grep 47972353 << adding the -d option, > however: > 47972353 dr-xr-x---. 9 root root 4096 Jul 2 14:03 /root > $ > > I rea

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 08:09 PM, Ed Greshko wrote: On 07/19/15 09:57, jd1008 wrote: On 07/18/2015 07:53 PM, Ed Greshko wrote: On 07/19/15 09:17, jd1008 wrote: debugfs -R 'ncheck 47972353' /dev/sda3 2>/dev/null Inode Pathname 47972353//root So, why is it trying to do that? I am not logged

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 08:07 PM, Ed Greshko wrote: On 07/19/15 09:55, jd1008 wrote: Ooops, Sorry. Here it is: $ sudo ls -l -i /* | grep 47972353 OK How about sudo ls -l -i -R /root | grep 47972353 Well, now, this is interesting: $ sudo ls -l -i -R /root | grep 47972353< Produced no ou

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 09:57, jd1008 wrote: > > > On 07/18/2015 07:53 PM, Ed Greshko wrote: >> On 07/19/15 09:17, jd1008 wrote: >>> debugfs -R 'ncheck 47972353' /dev/sda3 2>/dev/null >>> Inode Pathname >>> 47972353//root >>> >>> So, why is it trying to do that? >>> I am not logged in as root. >>> >>

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 09:55, jd1008 wrote: > Ooops, Sorry. Here it is: > $ sudo ls -l -i /* | grep 47972353 OK How about sudo ls -l -i -R /root | grep 47972353 -- If I wanted a blog or social media I'd go elsewhere -- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscr

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 07:53 PM, Ed Greshko wrote: On 07/19/15 09:17, jd1008 wrote: debugfs -R 'ncheck 47972353' /dev/sda3 2>/dev/null Inode Pathname 47972353//root So, why is it trying to do that? I am not logged in as root. How can I find out the process(es) that spawned sh to access /roo

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 07:53 PM, Ed Greshko wrote: On 07/19/15 09:51, jd1008 wrote: On 07/18/2015 07:46 PM, Ed Greshko wrote: sudo ls -l -i /* | grep 47972353 $ ls -l -i /* | grep 47972353 $ Nop! And why did you not use "sudo" as shown? Ooops, Sorry. Here it is: $ sudo ls -l -i /* | grep 4797235

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 09:17, jd1008 wrote: > debugfs -R 'ncheck 47972353' /dev/sda3 2>/dev/null > Inode Pathname > 47972353//root > > So, why is it trying to do that? > I am not logged in as root. > > How can I find out the process(es) that spawned sh > to access /root? OK, so you have determined

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 09:51, jd1008 wrote: > > > On 07/18/2015 07:46 PM, Ed Greshko wrote: >> sudo ls -l -i /* | grep 47972353 > $ ls -l -i /* | grep 47972353 > $ > > Nop! And why did you not use "sudo" as shown? -- If I wanted a blog or social media I'd go elsewhere -- users mailing list users@lists.fed

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 07:46 PM, Ed Greshko wrote: sudo ls -l -i /* | grep 47972353 $ ls -l -i /* | grep 47972353 $ Nop! -- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Fedora Code of Conduct: htt

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 09:20, jd1008 wrote: > Also, /dev/sda3 has no dir named root: > > $ ls /sda3/root > /bin/ls: cannot access /sda3/root: No such file or directory Of course not, since there probably is no /sda3 directory. Does sudo ls -l -i /* | grep 47972353 return a filename? -- If I wanted a

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 07:10 PM, Ed Greshko wrote: On 07/19/15 09:00, jd1008 wrote: The sealert below does not tell me exactly which dir that the shell tried to access. I have run the suggested commands (below) but they did not do any good. The alerts keep popping up. SELinux is preventing /usr/bin/

Re: SE alert

2015-07-18 Thread jd1008
On 07/18/2015 07:10 PM, Ed Greshko wrote: sudo debugfs -R 'ncheck 47972353' /dev/sda3 2>/dev/null debugfs -R 'ncheck 47972353' /dev/sda3 2>/dev/null Inode Pathname 47972353//root So, why is it trying to do that? I am not logged in as root. How can I find out the process(es) that sp

Re: SE alert

2015-07-18 Thread Ed Greshko
On 07/19/15 09:00, jd1008 wrote: > The sealert below does not tell me exactly which dir > that the shell tried to access. > I have run the suggested commands (below) > but they did not do any good. > The alerts keep popping up. > > > > SELinux is preventing /usr/bin/sh from read access on the direc

SE alert

2015-07-18 Thread jd1008
The sealert below does not tell me exactly which dir that the shell tried to access. I have run the suggested commands (below) but they did not do any good. The alerts keep popping up. SELinux is preventing /usr/bin/sh from read access on the directory . * Plugin catchall (100. confidence