Le 10/03/2018 à 18:18, Gordon Messmer a écrit :
> Start by running "ausearch -c 'ssl_crtd' --raw" by itself. Try to
> determine whether or not all of the affected files are mentioned in that
> output.
>
> Typically, to generate a complete policy, you'll need to run in
> permissive mode while you
On 03/09/2018 05:18 AM, Nicolas Kovacs wrote:
Do allow this
access for now by executing:
# ausearch -c 'ssl_crtd' --raw | audit2allow -M my-sslcrtd
# semodule -i my-sslcrtd.pp
Unfortunately the suggested solution doesn't work
Start by running "ausearch -c 'ssl_crtd' --raw" by itself. Try to
The ausearch is only identifying issues that there are logs for at that time.
Best to create a file context for that path permanantly.
Theres an example of how to do this in the selinux man pages. Typing on my
phone im tryinf to remember the command that the example in its man page.
Semanage f
3 matches
Mail list logo