Now, it this supposed to block? And I should manually allow it as described by SELinux?
`If you believe that nm-l2tp-service should have the dac_override capability by default.`
`Then you should report this as a bug.`
`You can generate a local policy module to allow this access.`
`Do`
`allow this access for now by executing:`
`# ausearch -c 'nm-l2tp-service' --raw | audit2allow -M my-nml2tpservice`
`# semodule -X 300 -i my-nml2tpservice.pp`
And if I’m supposed to report a bug, where would be the correct place?
dac_override provides the ability to bypass standard UNIX file permissions. DAC is short for Discretionary Access Control. I have no idea why it is happening for you or seen this issue before.
You could try the following to see what file nm-l2tp-service was trying to access:
ausearch -m avc -ts recent
Maybe then fix the Unix file permissions on that file/folder.
The NetworkManager-l2tp package doesn’t come with any SELinux files or subpackages, the package to report SELinux bugs against is the selinux-policy package on Fedora Bugzilla (bugzilla.redhat.com). But having said that, as I haven’t seen others report this issue yet, I suspect it is your local Unix file permissions that are causing the issue.
I wonder whether it has something to do with the certificate I import. If I go with password then I don’t see the SELinux error, though it doesn’t work at the end (because I need to auth via a certificate).
Please click first on the preformed </> text button and paste the output. This way it displays in the black output window and is also good readable when someone is using the dark theme.
I almost need sun glasses to read such topics
I know it is not really your fault .. it is the new rich-text-editor which is default. You might click on the right top A-button to change in between them.
I would probably switch SELinux to permissive, run the application as normal and collect all the rules given for l2tp by audit2allow and create a custom te file (maybe ausearch has an option to filter things out, I’d manually copy paste those and ask an LLM for instructions).
With that sorted out, I would also open a bug report with the rules you had to apply. On GitHub it seems that rules for l2tp have been last changed 2 and 6 years ago. Maybe software has changed and this feature/plugin is not as popular to be caught until now?
I think the certificate issue is related to CVE-2025-9615, which allowed non-admin users to access other users’ certificates.
NetworkManager-l2tp 1.52.0 was released last month (and is in Fedora Updates) which in combination with NetworkManager 1.52.2, 1.54.3 or 1.56.0 and later is supposed to fix CVE-2025-9615.
There is a bit more info here:
NetworkManager-l2tp 1.52.0 now uses the nm_utils_copy_cert_as_user() function to copy the corresponding certificate file as the user to temp location /run/NetworkManager/cert/. More info on that function here:
So, I think this SElinux certificate issue was introduced with NetworkManager-l2tp 1.52.0. There aren’t that many L2TP users using a machine certificate as there are using a PSK, so this issue went unnoticed for the past month, plus it didn’t help that there was a kl2tpd SELinux issue (that was only fixed last month in the selinux-policy package) that many Fedora 43 L2TP users disabled SELinux or changed to permissive. note: kl2tpd is the new L2TP daemon used by Fedora 43’s NeworkManger-l2tp.
I get a whole heap of nm-libnm-helper AVC denied errors before the { dac_override } for nm-l2tp-service, when I tried with a dummy machine certificate :
I suspect nm-libnm-helper is being used to copy the certificate to /run/NetworkManager/cert/ as the user, as part of the fix for CVE-2025-9615.
I’m the upstream NetworkManager-l2tp maintainer and I would have received the bug report had you posted to the GitHub nm-l2tp issues page. I disable or set SELinux to permissive as it gets in the way while developing code, so don’t really deal with SELinux issues much. Also, there is no NetworkManager-l2tp-selinux RPM as SELinux for L2TP is taken care of by the selinux-policy RPM.
It would be best to file a Fedora bug on bugzilla.redhat.com/ and select selinux-policy as the component.