SELinux Is Preventing 11-dhclient From Add_name Access On The Directory Chrony.servers.wlp8s0.

Home » CentOS » SELinux Is Preventing 11-dhclient From Add_name Access On The Directory Chrony.servers.wlp8s0.
CentOS No Comments

SELinux is preventing 11-dhclient from add_name access on the directory chrony.servers.wlp8s0.

***** Plugin catchall (100. confidence) suggests
**************************

If you believe that 11-dhclient should be allowed add_name access on the chrony.servers.wlp8s0 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing:
# ausearch -c ’11-dhclient’ –raw | audit2allow -M my-11dhclient
# semodule -X 300 -i my-11dhclient.pp

Additional Information:
Source Context system_u:system_r:NetworkManager_t:s0
Target Context system_u:object_r:dhcpc_state_t:s0
Target Objects chrony.servers.wlp8s0 [ dir ]
Source 11-dhclient Source Path 11-dhclient Port
Host castor Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.14.4-40.fc31.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name castor Platform Linux castor 5.3.12-300.fc31.x86_64 #1 SMP
Thu Nov
21 22:52:07 UTC 2019 x86_64 x86_64
Alert Count 2
First Seen 2019-11-30 18:03:35 CET
Last Seen 2019-12-01 11:16:46 CET
Local ID 0370e7fd-a826-4c80-8239-747a7528c5af

Raw Audit Messages type=AVC msg=audit(1575195406.740:277): avc: denied { add_name } for pid66 comm=”11-dhclient” name=”chrony.servers.wlp8s0″
scontext=system_u:system_r:NetworkManager_t:s0
tcontext=system_u:object_r:dhcpc_state_t:s0 tclass=dir permissive=0

-dhclient,NetworkManager_t,dhcpc_state_t,dir,add_name