⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.32
Server IP:
15.204.235.159
Server:
Linux srv.techlup.co.ke 4.18.0-553.5.1.el8_10.x86_64 #1 SMP Wed Jun 5 09:12:13 EDT 2024 x86_64
Server Software:
Apache
PHP Version:
8.2.27
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
setroubleshoot
/
plugins
/
__pycache__
/
View File Name :
sandbox_connect.cpython-36.opt-1.pyc
3 nm�a� � @ sD d dl Z e jddd�Zej Zd dlT d dlmZ G dd� de�ZdS ) � Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc @ sH e Zd Zed�Zed�Zed�ZdZed�Zed�Z dd� Z d d � ZdS )�pluginzR SELinux is preventing $SOURCE_PATH from connecting to port $PORT_NUMBER. a� SELinux has denied $SOURCE from connecting to a network port $PORT_NUMBER within a sandbox. If $SOURCE should be allowed to connect on $PORT_NUMBER, you need to use a different sandbox type like sandbox_web_t or sandbox_net_t. # sandbox -X -t sandbox_net_t $SOURCE If $SOURCE is not supposed to connect to $PORT_NUMBER, this could signal an intrusion attempt. z~ If you want to allow $SOURCE to connect to $PORT_NUMBER, you can execute # sandbox -X -t sandbox_net_t $SOURCE � zIIf you want to allow $SOURCE_PATH to connect to network port $PORT_NUMBERz�you need to modify the sandbox type. sandbox_web_t or sandbox_net_t. For example: sandbox -X -t sandbox_net_t $SOURCE_PATH Please read 'sandbox' man page for more details. c C s t j| t� | jd� d S )N�K )r �__init__�__name__Zset_priority)�self� r �4/usr/share/setroubleshoot/plugins/sandbox_connect.pyr 7 s zplugin.__init__c C s$ |j dg�r |jdg�r | j� S d S )NZsandbox_x_client_tZname_connect)Zmatches_source_typesZhas_any_access_inZreport)r Zavcr r r �analyze; s zplugin.analyzeN)r � __module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ then_textr r r r r r r s r )�gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r r r r �<module> s