Skip to content

Instantly share code, notes, and snippets.

@rlpowell

rlpowell/- Secret

Created August 22, 2014 17:43
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save rlpowell/7b6267f10fffa2c9abfc to your computer and use it in GitHub Desktop.
Save rlpowell/7b6267f10fffa2c9abfc to your computer and use it in GitHub Desktop.
type=AVC msg=audit(08/22/2014 10:41:29.619:4846322) : avc: denied { name_bind } for pid=1379 comm=shellinaboxd src=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket
type=AVC msg=audit(08/22/2014 10:41:29.619:4846323) : avc: denied { listen } for pid=1379 comm=shellinaboxd laddr=127.0.0.1 lport=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=tcp_socket
type=AVC msg=audit(08/22/2014 10:41:50.591:4846327) : avc: denied { noatsecure } for pid=1387 comm=sendmail scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:exim_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:41:50.591:4846327) : avc: denied { siginh } for pid=1387 comm=sendmail scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:exim_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:41:50.591:4846327) : avc: denied { rlimitinh } for pid=1387 comm=sendmail scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:exim_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:41:50.591:4846327) : avc: denied { write } for pid=1387 comm=sendmail path=/tmp/.fc31.27ed dev="tmpfs" ino=39860987 scontext=staff_u:staff_r:exim_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:41:50.950:4846328) : avc: denied { open } for pid=581 comm=spamd child path=/etc/shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:41:50.950:4846328) : avc: denied { read } for pid=581 comm=spamd child name=shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:41:50.950:4846329) : avc: denied { getattr } for pid=581 comm=spamd child path=/etc/shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:13.914:4846331) : avc: denied { accept } for pid=1379 comm=shellinaboxd laddr=127.0.0.1 lport=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=tcp_socket
type=AVC msg=audit(08/22/2014 10:42:14.179:4846332) : avc: denied { open } for pid=1380 comm=shellinaboxd path=/dev/ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file
type=AVC msg=audit(08/22/2014 10:42:14.179:4846332) : avc: denied { read write } for pid=1380 comm=shellinaboxd name=ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file
type=AVC msg=audit(08/22/2014 10:42:14.179:4846333) : avc: denied { ioctl } for pid=1380 comm=shellinaboxd path=/dev/ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file
type=AVC msg=audit(08/22/2014 10:42:24.016:4846335) : avc: denied { execute_no_trans } for pid=1394 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:24.016:4846335) : avc: denied { read open } for pid=1394 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:24.016:4846335) : avc: denied { execute } for pid=1394 comm=shellinaboxd name=ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:24.076:4846336) : avc: denied { name_connect } for pid=1394 comm=ssh dest=22 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_port_t:s0 tclass=tcp_socket
type=AVC msg=audit(08/22/2014 10:42:27.082:4846393) : avc: denied { getattr } for pid=581 comm=spamd child path=/etc/shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:28.006:4846399) : avc: denied { noatsecure } for pid=1445 comm=procmail scontext=system_u:system_r:exim_t:s0 tcontext=system_u:system_r:procmail_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:42:28.006:4846399) : avc: denied { siginh } for pid=1445 comm=procmail scontext=system_u:system_r:exim_t:s0 tcontext=system_u:system_r:procmail_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:42:28.006:4846399) : avc: denied { rlimitinh } for pid=1445 comm=procmail scontext=system_u:system_r:exim_t:s0 tcontext=system_u:system_r:procmail_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:42:26.239:4846343) : avc: denied { noatsecure } for pid=1398 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(08/22/2014 10:42:26.239:4846343) : avc: denied { siginh } for pid=1398 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(08/22/2014 10:42:26.239:4846343) : avc: denied { rlimitinh } for pid=1398 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(08/22/2014 10:42:27.082:4846392) : avc: denied { open } for pid=581 comm=spamd child path=/etc/shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:27.082:4846392) : avc: denied { read } for pid=581 comm=spamd child name=shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:37.877:4846401) : avc: denied { accept } for pid=1379 comm=shellinaboxd laddr=127.0.0.1 lport=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=tcp_socket
type=AVC msg=audit(08/22/2014 10:42:51.093:4846409) : avc: denied { write } for pid=1400 comm=sshd scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=unix_dgram_socket
type=AVC msg=audit(08/22/2014 10:42:56.004:4846417) : avc: denied { ioctl } for pid=1380 comm=shellinaboxd path=/dev/ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file
type=AVC msg=audit(08/22/2014 10:42:56.004:4846416) : avc: denied { open } for pid=1380 comm=shellinaboxd path=/dev/ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file
type=AVC msg=audit(08/22/2014 10:42:56.004:4846416) : avc: denied { read write } for pid=1380 comm=shellinaboxd name=ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file
type=AVC msg=audit(08/22/2014 10:42:58.167:4846419) : avc: denied { execute_no_trans } for pid=1460 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:58.167:4846419) : avc: denied { read open } for pid=1460 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:58.167:4846419) : avc: denied { execute } for pid=1460 comm=shellinaboxd name=ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:42:58.178:4846420) : avc: denied { name_connect } for pid=1460 comm=ssh dest=22 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_port_t:s0 tclass=tcp_socket
type=AVC msg=audit(08/22/2014 10:43:00.280:4846427) : avc: denied { noatsecure } for pid=1467 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(08/22/2014 10:43:00.280:4846427) : avc: denied { siginh } for pid=1467 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(08/22/2014 10:43:00.280:4846427) : avc: denied { rlimitinh } for pid=1467 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(08/22/2014 10:43:13.798:4846442) : avc: denied { execute_no_trans } for pid=1471 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:43:13.798:4846442) : avc: denied { read open } for pid=1471 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:43:13.798:4846442) : avc: denied { execute } for pid=1471 comm=shellinaboxd name=ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file
type=AVC msg=audit(08/22/2014 10:43:29.463:4846464) : avc: denied { noatsecure } for pid=1478 comm=sudo scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_sudo_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:43:29.463:4846464) : avc: denied { siginh } for pid=1478 comm=sudo scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_sudo_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:43:29.463:4846464) : avc: denied { rlimitinh } for pid=1478 comm=sudo scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_sudo_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:43:29.475:4846468) : avc: denied { noatsecure } for pid=1479 comm=sesh scontext=staff_u:staff_r:staff_sudo_t:s0 tcontext=staff_u:unconfined_r:unconfined_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:43:29.475:4846468) : avc: denied { siginh } for pid=1479 comm=sesh scontext=staff_u:staff_r:staff_sudo_t:s0 tcontext=staff_u:unconfined_r:unconfined_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:43:29.475:4846468) : avc: denied { rlimitinh } for pid=1479 comm=sesh scontext=staff_u:staff_r:staff_sudo_t:s0 tcontext=staff_u:unconfined_r:unconfined_t:s0 tclass=process
type=AVC msg=audit(08/22/2014 10:43:29.505:4846481) : avc: denied { name_bind } for pid=1493 comm=shellinaboxd src=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket
type=AVC msg=audit(08/22/2014 10:43:29.505:4846482) : avc: denied { listen } for pid=1493 comm=shellinaboxd laddr=127.0.0.1 lport=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=tcp_socket
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment