As root
audit2allow -M mypol -i /var/log/audit/audit.log
semodule -i mypol.pp
This will go through your audit log and enable everything blocked by
SELINUX. (It's a good idea to make sure that you want everything
blocked so far permitted.)
- --
Steve
Steve,
This opened up a can of
G.W. Haywood schrieb:
On Wed, 2 Jan 2008 Joseph L. Casale wrote:
Reading the docs, root needs to start clamd for the service to drop
to a non privileged user, so why can't root start clamd in my
config?
Root can do anything. :)
Not on CentOS it can't. CentOS has SELinux enabled by
Not on CentOS it can't. CentOS has SELinux enabled by default.
HTH
T.
Yup, that was the ticket. Looking on rpmforge's mailing list there was an issue
raised about the package not setting up selinux correctly, and had a fix that
involved integration with amavisd. I don't have amavisd, so I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 01/02/2008 07:23 AM, Joseph L. Casale wrote:
Not on CentOS it can't. CentOS has SELinux enabled by default.
HTH
T.
Yup, that was the ticket. Looking on rpmforge's mailing list there was an
issue raised about the package not setting up
I did a yum install from rpmforge of the 0.92 release under CentOS 5.1 and
created the users using the pdf document as guide. If I issue #service clamd
start it errors out with ERROR: Unable to open file or directory. I have
searched the mailing list archives and it seems this is a common