⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.32
Server IP:
15.204.235.159
Server:
Linux srv.techlup.co.ke 4.18.0-553.5.1.el8_10.x86_64 #1 SMP Wed Jun 5 09:12:13 EDT 2024 x86_64
Server Software:
Apache
PHP Version:
8.2.27
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
setroubleshoot
/
plugins
/
__pycache__
/
View File Name :
connect_ports.cpython-36.opt-1.pyc
3 nm�a� � @ sD d dl Z e jddd�Zej Zd dlT d dlmZ G dd� de�ZdS ) � Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc @ sL e Zd Zed�Zed�Zed�ZdZed�ZdZ dd� Z d d � Zdd� Zd S )�pluginzR SELinux is preventing $SOURCE_PATH from connecting to port $PORT_NUMBER. a� SELinux has denied $SOURCE from connecting to a network port $PORT_NUMBER which does not have an SELinux type associated with it. If $SOURCE should be allowed to connect on $PORT_NUMBER, use the <i>semanage</i> command to assign $PORT_NUMBER to a port type that $SOURCE_TYPE can connect to (%s). If $SOURCE is not supposed to connect to $PORT_NUMBER, this could signal an intrusion attempt. z� If you want to allow $SOURCE to connect to $PORT_NUMBER, you can execute # semanage port -a -t PORT_TYPE -p %s $PORT_NUMBER where PORT_TYPE is one of the following: %s. � zIIf you want to allow $SOURCE_PATH to connect to network port $PORT_NUMBERz!you need to modify the port type.c C sB |d j d�}t|�dkr&td�| S td�|d |d f S d S )N� �,zc# semanage port -a -t PORT_TYPE -p %s $PORT_NUMBER where PORT_TYPE is one of the following: %s.z+# semanage port -a -t %s -p %s $PORT_NUMBERr )�split�len�_)�self�avcZoptionsZports� r �2/usr/share/setroubleshoot/plugins/connect_ports.py�get_do_text0 s zplugin.get_do_textc C s t j| t� | jd� d S )N�d )r �__init__�__name__Zset_priority)r r r r r 8 s zplugin.__init__c C sN |j ddddg�rJ|jdg�rJ|j� }|rJ| j|jjd�d dj|�f�S d S ) NZhi_reserved_port_tZreserved_port_tZport_tZunreserved_port_tZname_connectr r z, )Zmatches_target_typesZhas_any_access_inZallowed_target_typesZreportZtclassr �join)r r Z allowed_typesr r r �analyze<