Le 08/04/2020 à 04:51, Russell Coker a écrit :
Package: fail2ban Version: 0.11.1-1 Severity: normaltype=AVC msg=audit(1586313861.749:37): avc: denied { search } for pid=704 comm="fail2ban-server" name=".local" dev="sdb2" ino=31516 scontext=system_u:system_r:fail2ban_t:s0 tcontext=unconfined_u:object_r:xdg_data_t:s0 tclass=dir permissive=0 Above is a SE Linux audit message generated by fail2ban starting on system boot. It is trying to access /root/.local which is inappropriate for a daemon. No system configuration should be under /root/ and any daemon which accesses that could give unexpected results.
Hello Russell, Could you please reply to https://github.com/fail2ban/fail2ban/issues/2688#issuecomment-613543589 ? (I also looked at the code and could not find where /root/.local would be loaded) Cheers, Sylvestre _______________________________________________ Python-modules-team mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/python-modules-team
