On Feb 3, 2011, at 1:39 PM, Troy Dawson wrote: > Don Krause wrote: >> Ok, this is definitely a bug. Well 2 actually. >> But It doesn't appear in the publicly accessible bugzilla at RH. >> Package ypbind actually depends on policycoreutils-python. > > This is a problem for both SL and RedHat. I just checked the dependencies. > >> A fresh install of SL6 Beta1, using "Software Development Workstation", and selecting NIS under "Use Network Login", fails >> to install policycoreutils-python, which contains "sesetbool". "sesetbool" is called by /etc/init.d/ypbind to allow ypbind access. >> Installing as "Basic Server" at least includes policycoreutils-python. >> Unfortunately, bug number 2, is that "sesetbool allow_ypbind=1" doesn't work, since the default selinux policy doesn't have >> "allow_ypbind" > > I'm trying to test this on a real RHEL6 system. > Aside from ypbind still not working, how can we tell "sesetbool allow_ypbind=1" doesn't work? > > Troy > On both test boxes I tried, one installed as "Software Development" and one installed as "Basic Server", I just tried to start ypbind via "service ypbind start". It would actually start ypbind, but it wouldn't connect to the ypmaster. In /var/log/audit/audit.log I'd get: type=USER_AVC msg=audit(1296764305.009:32965): user pid=2503 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_call interface =org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=3718 tpid=3449 scontext=unconfined_u:system_r:ypbind_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=dbu s : exe="/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' Then I'd run "sesetbool allow_ypbind=1" as it's found in /etc/init.d/ypbind, and attempt to restart ypbind. I got the same denial in audit.log I ran the denial through audit2allow, which gave me: module ypbind 1.0; require { type unconfined_t; type ypbind_t; class dbus send_msg; } #============= ypbind_t ============== allow ypbind_t unconfined_t:dbus send_msg; Compile that to a module and install, then ypbind runs and connects as expected. As Stephan recommend, I did a "getsebool -a | grep yp" which returned "allow_ypbind --> on", (this is AFTER I did "sesetbool allow_ypbind=1") but ypbind still wouldn't bind to the master. On a completely fresh installation, "getsebool -a | grep yp" returns "allow_ypbind --> off". Thanks for looking! -- Don Krause Head Systems Geek, Waver of Deceased Chickens. Optivus Proton Therapy, Inc. P.O. Box 608 Loma Linda, California 92354 909.799.8327 Tel 909.799.8366 Fax [log in to unmask] www.optivus.com "This message represents the official view of the voices in my head."