-
-
Save rlpowell/7b6267f10fffa2c9abfc to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
type=AVC msg=audit(08/22/2014 10:41:29.619:4846322) : avc: denied { name_bind } for pid=1379 comm=shellinaboxd src=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket | |
type=AVC msg=audit(08/22/2014 10:41:29.619:4846323) : avc: denied { listen } for pid=1379 comm=shellinaboxd laddr=127.0.0.1 lport=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=tcp_socket | |
type=AVC msg=audit(08/22/2014 10:41:50.591:4846327) : avc: denied { noatsecure } for pid=1387 comm=sendmail scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:exim_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:41:50.591:4846327) : avc: denied { siginh } for pid=1387 comm=sendmail scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:exim_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:41:50.591:4846327) : avc: denied { rlimitinh } for pid=1387 comm=sendmail scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:exim_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:41:50.591:4846327) : avc: denied { write } for pid=1387 comm=sendmail path=/tmp/.fc31.27ed dev="tmpfs" ino=39860987 scontext=staff_u:staff_r:exim_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:41:50.950:4846328) : avc: denied { open } for pid=581 comm=spamd child path=/etc/shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:41:50.950:4846328) : avc: denied { read } for pid=581 comm=spamd child name=shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:41:50.950:4846329) : avc: denied { getattr } for pid=581 comm=spamd child path=/etc/shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:13.914:4846331) : avc: denied { accept } for pid=1379 comm=shellinaboxd laddr=127.0.0.1 lport=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=tcp_socket | |
type=AVC msg=audit(08/22/2014 10:42:14.179:4846332) : avc: denied { open } for pid=1380 comm=shellinaboxd path=/dev/ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file | |
type=AVC msg=audit(08/22/2014 10:42:14.179:4846332) : avc: denied { read write } for pid=1380 comm=shellinaboxd name=ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file | |
type=AVC msg=audit(08/22/2014 10:42:14.179:4846333) : avc: denied { ioctl } for pid=1380 comm=shellinaboxd path=/dev/ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file | |
type=AVC msg=audit(08/22/2014 10:42:24.016:4846335) : avc: denied { execute_no_trans } for pid=1394 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:24.016:4846335) : avc: denied { read open } for pid=1394 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:24.016:4846335) : avc: denied { execute } for pid=1394 comm=shellinaboxd name=ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:24.076:4846336) : avc: denied { name_connect } for pid=1394 comm=ssh dest=22 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_port_t:s0 tclass=tcp_socket | |
type=AVC msg=audit(08/22/2014 10:42:27.082:4846393) : avc: denied { getattr } for pid=581 comm=spamd child path=/etc/shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:28.006:4846399) : avc: denied { noatsecure } for pid=1445 comm=procmail scontext=system_u:system_r:exim_t:s0 tcontext=system_u:system_r:procmail_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:42:28.006:4846399) : avc: denied { siginh } for pid=1445 comm=procmail scontext=system_u:system_r:exim_t:s0 tcontext=system_u:system_r:procmail_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:42:28.006:4846399) : avc: denied { rlimitinh } for pid=1445 comm=procmail scontext=system_u:system_r:exim_t:s0 tcontext=system_u:system_r:procmail_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:42:26.239:4846343) : avc: denied { noatsecure } for pid=1398 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process | |
type=AVC msg=audit(08/22/2014 10:42:26.239:4846343) : avc: denied { siginh } for pid=1398 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process | |
type=AVC msg=audit(08/22/2014 10:42:26.239:4846343) : avc: denied { rlimitinh } for pid=1398 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process | |
type=AVC msg=audit(08/22/2014 10:42:27.082:4846392) : avc: denied { open } for pid=581 comm=spamd child path=/etc/shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:27.082:4846392) : avc: denied { read } for pid=581 comm=spamd child name=shadow dev="vda2" ino=265209 scontext=system_u:system_r:spamd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:37.877:4846401) : avc: denied { accept } for pid=1379 comm=shellinaboxd laddr=127.0.0.1 lport=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=tcp_socket | |
type=AVC msg=audit(08/22/2014 10:42:51.093:4846409) : avc: denied { write } for pid=1400 comm=sshd scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=unix_dgram_socket | |
type=AVC msg=audit(08/22/2014 10:42:56.004:4846417) : avc: denied { ioctl } for pid=1380 comm=shellinaboxd path=/dev/ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file | |
type=AVC msg=audit(08/22/2014 10:42:56.004:4846416) : avc: denied { open } for pid=1380 comm=shellinaboxd path=/dev/ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file | |
type=AVC msg=audit(08/22/2014 10:42:56.004:4846416) : avc: denied { read write } for pid=1380 comm=shellinaboxd name=ptmx dev="devtmpfs" ino=1121 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file | |
type=AVC msg=audit(08/22/2014 10:42:58.167:4846419) : avc: denied { execute_no_trans } for pid=1460 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:58.167:4846419) : avc: denied { read open } for pid=1460 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:58.167:4846419) : avc: denied { execute } for pid=1460 comm=shellinaboxd name=ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:42:58.178:4846420) : avc: denied { name_connect } for pid=1460 comm=ssh dest=22 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_port_t:s0 tclass=tcp_socket | |
type=AVC msg=audit(08/22/2014 10:43:00.280:4846427) : avc: denied { noatsecure } for pid=1467 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process | |
type=AVC msg=audit(08/22/2014 10:43:00.280:4846427) : avc: denied { siginh } for pid=1467 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process | |
type=AVC msg=audit(08/22/2014 10:43:00.280:4846427) : avc: denied { rlimitinh } for pid=1467 comm=unix_chkpwd scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process | |
type=AVC msg=audit(08/22/2014 10:43:13.798:4846442) : avc: denied { execute_no_trans } for pid=1471 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:43:13.798:4846442) : avc: denied { read open } for pid=1471 comm=shellinaboxd path=/usr/bin/ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:43:13.798:4846442) : avc: denied { execute } for pid=1471 comm=shellinaboxd name=ssh dev="vda2" ino=537028 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:ssh_exec_t:s0 tclass=file | |
type=AVC msg=audit(08/22/2014 10:43:29.463:4846464) : avc: denied { noatsecure } for pid=1478 comm=sudo scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_sudo_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:43:29.463:4846464) : avc: denied { siginh } for pid=1478 comm=sudo scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_sudo_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:43:29.463:4846464) : avc: denied { rlimitinh } for pid=1478 comm=sudo scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_sudo_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:43:29.475:4846468) : avc: denied { noatsecure } for pid=1479 comm=sesh scontext=staff_u:staff_r:staff_sudo_t:s0 tcontext=staff_u:unconfined_r:unconfined_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:43:29.475:4846468) : avc: denied { siginh } for pid=1479 comm=sesh scontext=staff_u:staff_r:staff_sudo_t:s0 tcontext=staff_u:unconfined_r:unconfined_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:43:29.475:4846468) : avc: denied { rlimitinh } for pid=1479 comm=sesh scontext=staff_u:staff_r:staff_sudo_t:s0 tcontext=staff_u:unconfined_r:unconfined_t:s0 tclass=process | |
type=AVC msg=audit(08/22/2014 10:43:29.505:4846481) : avc: denied { name_bind } for pid=1493 comm=shellinaboxd src=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket | |
type=AVC msg=audit(08/22/2014 10:43:29.505:4846482) : avc: denied { listen } for pid=1493 comm=shellinaboxd laddr=127.0.0.1 lport=4200 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=tcp_socket | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment