Jump to content

ESET File Security with snmpd under SELinux


seb2020
 Share

Recommended Posts

Hi,

I have errors with EFS and the snmpd process when SELinux is enabled. EFS denied access to some folder and snmpd throw and error.

I have already check if the SELinux policy is up to date with :

 /opt/eset/RemoteAdministrator/Agent/setup/selinux/eraagent.sh --update
SELinux is preventing /usr/sbin/snmpd from search access on the directory 154741.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that snmpd should be allowed search access on the 154741 directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'snmpd' --raw | audit2allow -M my-snmpd
# semodule -i my-snmpd.pp


Additional Information:
Source Context                system_u:system_r:snmpd_t:s0
Target Context                system_u:system_r:eset_efs_execd_t:s0
Target Objects                154741 [ dir ]
Source                        snmpd
Source Path                   /usr/sbin/snmpd
Port                          <Unknown>
Host                          <Unknown>
Source RPM Packages           net-snmp-5.7.2-48.el7_8.1.x86_64
Target RPM Packages
Policy RPM                    selinux-policy-3.13.1-266.el7_8.1.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     XXXX
Platform                      XXXX
                              3.10.0-1127.18.2.el7.x86_64 #1 SMP Sun Jul 26
                              15:27:06 UTC 2020 x86_64 x86_64
Alert Count                   3
First Seen                    2020-08-31 14:26:09 CEST
Last Seen                     2020-09-02 15:08:29 CEST
Local ID                      1fb5e024-8a5b-4d2c-9c09-c62513d957da

Raw Audit Messages
type=AVC msg=audit(1599052109.46:44685): avc:  denied  { search } for  pid=1051 comm="snmpd" name="154741" dev="proc" ino=2001526 scontext=system_u:system_r:snmpd_t:s0 tcontext=system_u:system_r:eset_efs_execd_t:s0 tclass=dir permissive=0


type=SYSCALL msg=audit(1599052109.46:44685): arch=x86_64 syscall=open success=no exit=EACCES a0=7ffde95f1ff0 a1=0 a2=1b6 a3=24 items=0 ppid=1 pid=1051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none)
ses=4294967295 comm=snmpd exe=/usr/sbin/snmpd subj=system_u:system_r:snmpd_t:s0 key=(null)

What can I do ? Do I need to create a custom SELinux policy ?

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...