Felix
12.02.14, 18:39
Zitat von Peter Littmann
Kannst du es eventuell nochmal probieren und screenshots anlegen, um sicherzustellen das wir nicht aneinander vorbeireden?
Felix
# ls -al /boot total 10218 drwxr-xr-x 4 root root 1024 Feb 10 19:46 . drwxr-xr-x 23 root root 4096 Feb 10 19:50 .. -rw-r--r-- 1 root root 7665600 Dec 20 17:32 bzImage-3.10.23-xxxx-std-ipv6-64 drwxr-xr-x 3 root root 8192 Feb 10 19:46 grub drwx------ 2 root root 12288 Feb 10 19:45 lost+found -rw-r--r-- 1 root root 2727448 Dec 10 15:50 System.map-3.10.23-xxxx-std-ipv6-64
Abhängigkeit installiert: audit-libs-python.x86_64 0:2.3.3-1.fc20 checkpolicy.x86_64 0:2.1.12-5.fc20 libcgroup.x86_64 0:0.38-7.fc20 libsemanage-python.x86_64 0:2.1.10-14.fc20 python-IPy.noarch 0:0.75-6.fc20 setools-libs.x86_64 0:3.3.7-41.fc20
[root@furlab ~]# semanage port -a -t ssh_port_t -p tcp 7022 OSError: Protocol not supported [root@furlab ~]# semanage port -l OSError: Protocol not supported
PORT STATE SERVICE 53/tcp open domain No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
[peter@furlab ~]$ cat /etc/selinux/config # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these two values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted
[peter@furlab ~]$ sudo /usr/sbin/getenforce Disabled