[Ayuda] Script PHP para enviar formas por E-mail

Miguel Cardenas warlockxxi en yahoo.com
Jue Dic 28 13:57:21 CST 2006


Listeros he estado montando el los plugins check_quota y quota_usage del SM y
el mismo me reporta en los logs [1]. He seguido al pie del detalle lo que los
files "INSTALL" expresan pero no he tenido resultado alguno. Utilizo RHEL4,
con SM 1.4.6-1, con sendmail como MTA y Dovecot para el POP e IMAP.

Alguien tiene alguna sugerencia del porque? Gracias.

[1]
Dec 28 15:31:57 mx2 kernel: audit(1167337917.001:0): avc:  denied  { search }
for  pid=3667 exe=/usr/bin/sudo name=selinux dev=cciss/c0d0p1 ino=916104
scontext=root:system_r:httpd_sys_script_t
tcontext=system_u:object_r:selinux_config_t tclass=dir
Dec 28 15:31:57 mx2 kernel: audit(1167337917.001:0): avc:  denied  { read }
for  pid=3667 exe=/usr/bin/sudo name=mounts dev=proc ino=240320528
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=file
Dec 28 15:31:57 mx2 kernel: audit(1167337917.001:0): avc:  denied  {
setrlimit } for  pid=3667 exe=/usr/bin/sudo
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=process
Dec 28 15:31:57 mx2 kernel: audit(1167337917.002:0): avc:  denied  { read }
for  pid=3667 exe=/usr/bin/sudo name=shadow dev=cciss/c0d0p1 ino=917302
scontext=root:system_r:httpd_sys_script_t tcontext=system_u:object_r:shadow_t
tclass=file
Dec 28 15:31:57 mx2 kernel: audit(1167337917.002:0): avc:  denied  { read }
for  pid=3667 exe=/usr/bin/sudo name=shadow dev=cciss/c0d0p1 ino=917302
scontext=root:system_r:httpd_sys_script_t tcontext=system_u:object_r:shadow_t
tclass=file
Dec 28 15:31:57 mx2 kernel: audit(1167337917.002:0): avc:  denied  { setgid }
for  pid=3667 exe=/usr/bin/sudo capability=6
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=capability
Dec 28 15:31:57 mx2 kernel: audit(1167337917.002:0): avc:  denied  { setuid }
for  pid=3667 exe=/usr/bin/sudo capability=7
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=capability
Dec 28 15:31:57 mx2 kernel: audit(1167337917.002:0): avc:  denied  { setgid }
for  pid=3667 exe=/usr/bin/sudo capability=6
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=capability
Dec 28 15:31:57 mx2 kernel: audit(1167337917.164:0): avc:  denied  { search }
for  pid=3671 exe=/usr/bin/sudo name=selinux dev=cciss/c0d0p1 ino=916104
scontext=root:system_r:httpd_sys_script_t
tcontext=system_u:object_r:selinux_config_t tclass=dir
Dec 28 15:31:57 mx2 kernel: audit(1167337917.164:0): avc:  denied  { read }
for  pid=3671 exe=/usr/bin/sudo name=mounts dev=proc ino=240582672
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=file
Dec 28 15:31:57 mx2 kernel: audit(1167337917.164:0): avc:  denied  {
setrlimit } for  pid=3671 exe=/usr/bin/sudo
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=process
Dec 28 15:31:57 mx2 kernel: audit(1167337917.165:0): avc:  denied  { read }
for  pid=3671 exe=/usr/bin/sudo name=shadow dev=cciss/c0d0p1 ino=917302
scontext=root:system_r:httpd_sys_script_t tcontext=system_u:object_r:shadow_t
tclass=file
Dec 28 15:31:57 mx2 kernel: audit(1167337917.165:0): avc:  denied  { read }
for  pid=3671 exe=/usr/bin/sudo name=shadow dev=cciss/c0d0p1 ino=917302
scontext=root:system_r:httpd_sys_script_t tcontext=system_u:object_r:shadow_t
tclass=file
Dec 28 15:31:57 mx2 kernel: audit(1167337917.165:0): avc:  denied  { setgid }
for  pid=3671 exe=/usr/bin/sudo capability=6
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=capability
Dec 28 15:31:57 mx2 kernel: audit(1167337917.165:0): avc:  denied  { setuid }
for  pid=3671 exe=/usr/bin/sudo capability=7
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=capability
Dec 28 15:31:57 mx2 kernel: audit(1167337917.165:0): avc:  denied  { setgid }
for  pid=3671 exe=/usr/bin/sudo capability=6
scontext=root:system_r:httpd_sys_script_t
tcontext=root:system_r:httpd_sys_script_t tclass=capability
--
Hernán Valero
Administrador de red.
linux counter: 304904
Jabber UID: hernan en sime.cu
                   hvalero2001 en softwarelibre.cu

-- 
Este mensaje ha sido analizado por MailScanner
en busca de virus y otros contenidos peligrosos,
y se considera que está limpio.


 
_______________________________________________
Ayuda mailing list
Ayuda en linux.org.mx
Para salir de la lista: http://mail.linux.org.mx/cgi-bin/mailman/listinfo/ayuda/




Más información sobre la lista de distribución Ayuda