- Dontaudit attempts by sosreport to read shadow_t

- Allow browser sandbox plugins to connect to cups to print
- Add new label mpd_home_t
- Label /srv/www/logs as httpd_log_t
- Add support for /var/lib/php/wsdlcache
- Add zarafa_setrlimit boolean
- Allow fetchmail to send mails
- Add labels for apache logs under miq package
- Allow irc_t to use tcp sockets
- fix labels in puppet.if
- Allow tcsd to read utmp file
- Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t to
- Define svirt_socket_t as a domain_type
- Take away transition from init_t to initrc_t when executing
- Fix label on pam_krb5 helper apps
This commit is contained in:
Miroslav Grepl 2013-09-19 09:53:57 +02:00
parent fcf0156ca3
commit 3d49b27279
3 changed files with 215 additions and 149 deletions

View File

@ -3239,7 +3239,7 @@ index 7590165..19aaaed 100644
+ fs_mounton_fusefs(seunshare_domain)
+')
diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
index 644d4d7..f9bcd44 100644
index 644d4d7..6e7dd83 100644
--- a/policy/modules/kernel/corecommands.fc
+++ b/policy/modules/kernel/corecommands.fc
@@ -1,9 +1,10 @@
@ -3423,7 +3423,7 @@ index 644d4d7..f9bcd44 100644
/usr/lib/rpm/rpmq -- gen_context(system_u:object_r:bin_t,s0)
/usr/lib/rpm/rpmv -- gen_context(system_u:object_r:bin_t,s0)
+/usr/lib/tumbler-[^/]*/tumblerd -- gen_context(system_u:object_r:bin_t,s0)
+/usr/lib/security/pam_krb5/pam_krb5_storetmp -- gen_context(system_u:object_r:bin_t,s0)
+/usr/lib/security/pam_krb5(/.*)? -- gen_context(system_u:object_r:bin_t,s0)
/usr/lib/sftp-server -- gen_context(system_u:object_r:bin_t,s0)
-/usr/lib/vte/gnome-pty-helper -- gen_context(system_u:object_r:bin_t,s0)
+/usr/lib/systemd/system-sleep(/.*)? gen_context(system_u:object_r:bin_t,s0)
@ -27646,7 +27646,7 @@ index 24e7804..c4155c7 100644
+ files_etc_filetrans($1, machineid_t, file, "machine-id" )
+')
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index dd3be8d..729cc4f 100644
index dd3be8d..c56175f 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -11,10 +11,24 @@ gen_require(`
@ -27735,16 +27735,7 @@ index dd3be8d..729cc4f 100644
type initrc_exec_t, init_script_file_type;
domain_type(initrc_t)
domain_entry_file(initrc_t, initrc_exec_t)
@@ -66,6 +99,8 @@ role system_r types initrc_t;
# of the below init_upstart tunable
# but this has a typeattribute in it
corecmd_shell_entry_type(initrc_t)
+corecmd_bin_entry_type(initrc_t)
+corecmd_bin_domtrans(init_t, initrc_t)
type initrc_devpts_t;
term_pty(initrc_devpts_t)
@@ -98,7 +133,8 @@ ifdef(`enable_mls',`
@@ -98,7 +131,8 @@ ifdef(`enable_mls',`
#
# Use capabilities. old rule:
@ -27754,7 +27745,7 @@ index dd3be8d..729cc4f 100644
# is ~sys_module really needed? observed:
# sys_boot
# sys_tty_config
@@ -110,12 +146,33 @@ allow init_t self:fifo_file rw_fifo_file_perms;
@@ -110,12 +144,33 @@ allow init_t self:fifo_file rw_fifo_file_perms;
# Re-exec itself
can_exec(init_t, init_exec_t)
@ -27794,7 +27785,7 @@ index dd3be8d..729cc4f 100644
allow init_t initctl_t:fifo_file manage_fifo_file_perms;
dev_filetrans(init_t, initctl_t, fifo_file)
@@ -125,13 +182,17 @@ allow init_t initrc_var_run_t:file { rw_file_perms setattr };
@@ -125,13 +180,17 @@ allow init_t initrc_var_run_t:file { rw_file_perms setattr };
kernel_read_system_state(init_t)
kernel_share_state(init_t)
@ -27813,7 +27804,7 @@ index dd3be8d..729cc4f 100644
domain_getpgid_all_domains(init_t)
domain_kill_all_domains(init_t)
@@ -139,14 +200,20 @@ domain_signal_all_domains(init_t)
@@ -139,14 +198,20 @@ domain_signal_all_domains(init_t)
domain_signull_all_domains(init_t)
domain_sigstop_all_domains(init_t)
domain_sigchld_all_domains(init_t)
@ -27834,7 +27825,7 @@ index dd3be8d..729cc4f 100644
# file descriptors inherited from the rootfs:
files_dontaudit_rw_root_files(init_t)
files_dontaudit_rw_root_chr_files(init_t)
@@ -156,28 +223,49 @@ fs_list_inotifyfs(init_t)
@@ -156,28 +221,49 @@ fs_list_inotifyfs(init_t)
fs_write_ramfs_sockets(init_t)
mcs_process_set_categories(init_t)
@ -27887,7 +27878,7 @@ index dd3be8d..729cc4f 100644
ifdef(`distro_gentoo',`
allow init_t self:process { getcap setcap };
@@ -186,29 +274,186 @@ ifdef(`distro_gentoo',`
@@ -186,29 +272,187 @@ ifdef(`distro_gentoo',`
')
ifdef(`distro_redhat',`
@ -28051,6 +28042,7 @@ index dd3be8d..729cc4f 100644
+
+auth_use_nsswitch(init_t)
+auth_rw_login_records(init_t)
+auth_domtrans_chk_passwd(init_t)
+
+optional_policy(`
+ lvm_rw_pipes(init_t)
@ -28082,7 +28074,7 @@ index dd3be8d..729cc4f 100644
')
optional_policy(`
@@ -216,7 +461,29 @@ optional_policy(`
@@ -216,7 +460,29 @@ optional_policy(`
')
optional_policy(`
@ -28112,7 +28104,7 @@ index dd3be8d..729cc4f 100644
')
########################################
@@ -225,8 +492,9 @@ optional_policy(`
@@ -225,8 +491,9 @@ optional_policy(`
#
allow initrc_t self:process { getpgid setsched setpgid setrlimit getsched };
@ -28124,7 +28116,7 @@ index dd3be8d..729cc4f 100644
allow initrc_t self:passwd rootok;
allow initrc_t self:key manage_key_perms;
@@ -257,12 +525,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
@@ -257,12 +524,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
allow initrc_t initrc_var_run_t:file manage_file_perms;
files_pid_filetrans(initrc_t, initrc_var_run_t, file)
@ -28141,7 +28133,7 @@ index dd3be8d..729cc4f 100644
manage_dirs_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
manage_files_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
@@ -278,23 +550,36 @@ kernel_change_ring_buffer_level(initrc_t)
@@ -278,23 +549,36 @@ kernel_change_ring_buffer_level(initrc_t)
kernel_clear_ring_buffer(initrc_t)
kernel_get_sysvipc_info(initrc_t)
kernel_read_all_sysctls(initrc_t)
@ -28184,7 +28176,7 @@ index dd3be8d..729cc4f 100644
corenet_tcp_sendrecv_all_ports(initrc_t)
corenet_udp_sendrecv_all_ports(initrc_t)
corenet_tcp_connect_all_ports(initrc_t)
@@ -302,9 +587,11 @@ corenet_sendrecv_all_client_packets(initrc_t)
@@ -302,9 +586,11 @@ corenet_sendrecv_all_client_packets(initrc_t)
dev_read_rand(initrc_t)
dev_read_urand(initrc_t)
@ -28196,7 +28188,7 @@ index dd3be8d..729cc4f 100644
dev_rw_sysfs(initrc_t)
dev_list_usbfs(initrc_t)
dev_read_framebuffer(initrc_t)
@@ -312,8 +599,10 @@ dev_write_framebuffer(initrc_t)
@@ -312,8 +598,10 @@ dev_write_framebuffer(initrc_t)
dev_read_realtime_clock(initrc_t)
dev_read_sound_mixer(initrc_t)
dev_write_sound_mixer(initrc_t)
@ -28207,7 +28199,7 @@ index dd3be8d..729cc4f 100644
dev_delete_lvm_control_dev(initrc_t)
dev_manage_generic_symlinks(initrc_t)
dev_manage_generic_files(initrc_t)
@@ -321,8 +610,7 @@ dev_manage_generic_files(initrc_t)
@@ -321,8 +609,7 @@ dev_manage_generic_files(initrc_t)
dev_delete_generic_symlinks(initrc_t)
dev_getattr_all_blk_files(initrc_t)
dev_getattr_all_chr_files(initrc_t)
@ -28217,7 +28209,7 @@ index dd3be8d..729cc4f 100644
domain_kill_all_domains(initrc_t)
domain_signal_all_domains(initrc_t)
@@ -331,7 +619,6 @@ domain_sigstop_all_domains(initrc_t)
@@ -331,7 +618,6 @@ domain_sigstop_all_domains(initrc_t)
domain_sigchld_all_domains(initrc_t)
domain_read_all_domains_state(initrc_t)
domain_getattr_all_domains(initrc_t)
@ -28225,7 +28217,7 @@ index dd3be8d..729cc4f 100644
domain_getsession_all_domains(initrc_t)
domain_use_interactive_fds(initrc_t)
# for lsof which is used by alsa shutdown:
@@ -339,6 +626,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
@@ -339,6 +625,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
domain_dontaudit_getattr_all_tcp_sockets(initrc_t)
domain_dontaudit_getattr_all_dgram_sockets(initrc_t)
domain_dontaudit_getattr_all_pipes(initrc_t)
@ -28233,7 +28225,7 @@ index dd3be8d..729cc4f 100644
files_getattr_all_dirs(initrc_t)
files_getattr_all_files(initrc_t)
@@ -346,14 +634,15 @@ files_getattr_all_symlinks(initrc_t)
@@ -346,14 +633,15 @@ files_getattr_all_symlinks(initrc_t)
files_getattr_all_pipes(initrc_t)
files_getattr_all_sockets(initrc_t)
files_purge_tmp(initrc_t)
@ -28251,7 +28243,7 @@ index dd3be8d..729cc4f 100644
files_read_usr_files(initrc_t)
files_manage_urandom_seed(initrc_t)
files_manage_generic_spool(initrc_t)
@@ -363,8 +652,12 @@ files_list_isid_type_dirs(initrc_t)
@@ -363,8 +651,12 @@ files_list_isid_type_dirs(initrc_t)
files_mounton_isid_type_dirs(initrc_t)
files_list_default(initrc_t)
files_mounton_default(initrc_t)
@ -28265,7 +28257,7 @@ index dd3be8d..729cc4f 100644
fs_list_inotifyfs(initrc_t)
fs_register_binary_executable_type(initrc_t)
# rhgb-console writes to ramfs
@@ -374,10 +667,11 @@ fs_mount_all_fs(initrc_t)
@@ -374,10 +666,11 @@ fs_mount_all_fs(initrc_t)
fs_unmount_all_fs(initrc_t)
fs_remount_all_fs(initrc_t)
fs_getattr_all_fs(initrc_t)
@ -28279,7 +28271,7 @@ index dd3be8d..729cc4f 100644
mcs_process_set_categories(initrc_t)
mls_file_read_all_levels(initrc_t)
@@ -386,6 +680,7 @@ mls_process_read_up(initrc_t)
@@ -386,6 +679,7 @@ mls_process_read_up(initrc_t)
mls_process_write_down(initrc_t)
mls_rangetrans_source(initrc_t)
mls_fd_share_all_levels(initrc_t)
@ -28287,7 +28279,7 @@ index dd3be8d..729cc4f 100644
selinux_get_enforce_mode(initrc_t)
@@ -397,6 +692,7 @@ term_use_all_terms(initrc_t)
@@ -397,6 +691,7 @@ term_use_all_terms(initrc_t)
term_reset_tty_labels(initrc_t)
auth_rw_login_records(initrc_t)
@ -28295,7 +28287,7 @@ index dd3be8d..729cc4f 100644
auth_setattr_login_records(initrc_t)
auth_rw_lastlog(initrc_t)
auth_read_pam_pid(initrc_t)
@@ -415,20 +711,18 @@ logging_read_all_logs(initrc_t)
@@ -415,20 +710,18 @@ logging_read_all_logs(initrc_t)
logging_append_all_logs(initrc_t)
logging_read_audit_config(initrc_t)
@ -28319,7 +28311,7 @@ index dd3be8d..729cc4f 100644
ifdef(`distro_debian',`
dev_setattr_generic_dirs(initrc_t)
@@ -450,7 +744,6 @@ ifdef(`distro_gentoo',`
@@ -450,7 +743,6 @@ ifdef(`distro_gentoo',`
allow initrc_t self:process setfscreate;
dev_create_null_dev(initrc_t)
dev_create_zero_dev(initrc_t)
@ -28327,7 +28319,7 @@ index dd3be8d..729cc4f 100644
term_create_console_dev(initrc_t)
# unfortunately /sbin/rc does stupid tricks
@@ -485,6 +778,10 @@ ifdef(`distro_gentoo',`
@@ -485,6 +777,10 @@ ifdef(`distro_gentoo',`
sysnet_setattr_config(initrc_t)
optional_policy(`
@ -28338,7 +28330,7 @@ index dd3be8d..729cc4f 100644
alsa_read_lib(initrc_t)
')
@@ -505,7 +802,7 @@ ifdef(`distro_redhat',`
@@ -505,7 +801,7 @@ ifdef(`distro_redhat',`
# Red Hat systems seem to have a stray
# fd open from the initrd
@ -28347,7 +28339,7 @@ index dd3be8d..729cc4f 100644
files_dontaudit_read_root_files(initrc_t)
# These seem to be from the initrd
@@ -520,6 +817,7 @@ ifdef(`distro_redhat',`
@@ -520,6 +816,7 @@ ifdef(`distro_redhat',`
files_create_boot_dirs(initrc_t)
files_create_boot_flag(initrc_t)
files_rw_boot_symlinks(initrc_t)
@ -28355,7 +28347,7 @@ index dd3be8d..729cc4f 100644
# wants to read /.fonts directory
files_read_default_files(initrc_t)
files_mountpoint(initrc_tmp_t)
@@ -540,6 +838,7 @@ ifdef(`distro_redhat',`
@@ -540,6 +837,7 @@ ifdef(`distro_redhat',`
miscfiles_rw_localization(initrc_t)
miscfiles_setattr_localization(initrc_t)
miscfiles_relabel_localization(initrc_t)
@ -28363,7 +28355,7 @@ index dd3be8d..729cc4f 100644
miscfiles_read_fonts(initrc_t)
miscfiles_read_hwdata(initrc_t)
@@ -549,8 +848,44 @@ ifdef(`distro_redhat',`
@@ -549,8 +847,44 @@ ifdef(`distro_redhat',`
')
optional_policy(`
@ -28408,7 +28400,7 @@ index dd3be8d..729cc4f 100644
')
optional_policy(`
@@ -558,14 +893,31 @@ ifdef(`distro_redhat',`
@@ -558,14 +892,31 @@ ifdef(`distro_redhat',`
rpc_write_exports(initrc_t)
rpc_manage_nfs_state_data(initrc_t)
')
@ -28440,7 +28432,7 @@ index dd3be8d..729cc4f 100644
')
')
@@ -576,6 +928,39 @@ ifdef(`distro_suse',`
@@ -576,6 +927,39 @@ ifdef(`distro_suse',`
')
')
@ -28480,7 +28472,7 @@ index dd3be8d..729cc4f 100644
optional_policy(`
amavis_search_lib(initrc_t)
amavis_setattr_pid_files(initrc_t)
@@ -588,6 +973,8 @@ optional_policy(`
@@ -588,6 +972,8 @@ optional_policy(`
optional_policy(`
apache_read_config(initrc_t)
apache_list_modules(initrc_t)
@ -28489,7 +28481,7 @@ index dd3be8d..729cc4f 100644
')
optional_policy(`
@@ -609,6 +996,7 @@ optional_policy(`
@@ -609,6 +995,7 @@ optional_policy(`
optional_policy(`
cgroup_stream_connect_cgred(initrc_t)
@ -28497,7 +28489,7 @@ index dd3be8d..729cc4f 100644
')
optional_policy(`
@@ -625,6 +1013,17 @@ optional_policy(`
@@ -625,6 +1012,17 @@ optional_policy(`
')
optional_policy(`
@ -28515,7 +28507,7 @@ index dd3be8d..729cc4f 100644
dev_getattr_printer_dev(initrc_t)
cups_read_log(initrc_t)
@@ -641,9 +1040,13 @@ optional_policy(`
@@ -641,9 +1039,13 @@ optional_policy(`
dbus_connect_system_bus(initrc_t)
dbus_system_bus_client(initrc_t)
dbus_read_config(initrc_t)
@ -28529,7 +28521,7 @@ index dd3be8d..729cc4f 100644
')
optional_policy(`
@@ -656,15 +1059,11 @@ optional_policy(`
@@ -656,15 +1058,11 @@ optional_policy(`
')
optional_policy(`
@ -28547,7 +28539,7 @@ index dd3be8d..729cc4f 100644
')
optional_policy(`
@@ -685,6 +1084,15 @@ optional_policy(`
@@ -685,6 +1083,15 @@ optional_policy(`
')
optional_policy(`
@ -28563,7 +28555,7 @@ index dd3be8d..729cc4f 100644
inn_exec_config(initrc_t)
')
@@ -725,6 +1133,7 @@ optional_policy(`
@@ -725,6 +1132,7 @@ optional_policy(`
lpd_list_spool(initrc_t)
lpd_read_config(initrc_t)
@ -28571,7 +28563,7 @@ index dd3be8d..729cc4f 100644
')
optional_policy(`
@@ -742,7 +1151,13 @@ optional_policy(`
@@ -742,7 +1150,13 @@ optional_policy(`
')
optional_policy(`
@ -28586,7 +28578,7 @@ index dd3be8d..729cc4f 100644
mta_dontaudit_read_spool_symlinks(initrc_t)
')
@@ -765,6 +1180,10 @@ optional_policy(`
@@ -765,6 +1179,10 @@ optional_policy(`
')
optional_policy(`
@ -28597,7 +28589,7 @@ index dd3be8d..729cc4f 100644
postgresql_manage_db(initrc_t)
postgresql_read_config(initrc_t)
')
@@ -774,10 +1193,20 @@ optional_policy(`
@@ -774,10 +1192,20 @@ optional_policy(`
')
optional_policy(`
@ -28618,7 +28610,7 @@ index dd3be8d..729cc4f 100644
quota_manage_flags(initrc_t)
')
@@ -786,6 +1215,10 @@ optional_policy(`
@@ -786,6 +1214,10 @@ optional_policy(`
')
optional_policy(`
@ -28629,7 +28621,7 @@ index dd3be8d..729cc4f 100644
fs_write_ramfs_sockets(initrc_t)
fs_search_ramfs(initrc_t)
@@ -807,8 +1240,6 @@ optional_policy(`
@@ -807,8 +1239,6 @@ optional_policy(`
# bash tries ioctl for some reason
files_dontaudit_ioctl_all_pids(initrc_t)
@ -28638,7 +28630,7 @@ index dd3be8d..729cc4f 100644
')
optional_policy(`
@@ -817,6 +1248,10 @@ optional_policy(`
@@ -817,6 +1247,10 @@ optional_policy(`
')
optional_policy(`
@ -28649,7 +28641,7 @@ index dd3be8d..729cc4f 100644
# shorewall-init script run /var/lib/shorewall/firewall
shorewall_lib_domtrans(initrc_t)
')
@@ -826,10 +1261,12 @@ optional_policy(`
@@ -826,10 +1260,12 @@ optional_policy(`
squid_manage_logs(initrc_t)
')
@ -28662,7 +28654,7 @@ index dd3be8d..729cc4f 100644
optional_policy(`
ssh_dontaudit_read_server_keys(initrc_t)
@@ -856,12 +1293,28 @@ optional_policy(`
@@ -856,12 +1292,28 @@ optional_policy(`
')
optional_policy(`
@ -28692,7 +28684,7 @@ index dd3be8d..729cc4f 100644
ifdef(`distro_redhat',`
# system-config-services causes avc messages that should be dontaudited
@@ -871,6 +1324,18 @@ optional_policy(`
@@ -871,6 +1323,18 @@ optional_policy(`
optional_policy(`
mono_domtrans(initrc_t)
')
@ -28711,7 +28703,7 @@ index dd3be8d..729cc4f 100644
')
optional_policy(`
@@ -886,6 +1351,10 @@ optional_policy(`
@@ -886,6 +1350,10 @@ optional_policy(`
')
optional_policy(`
@ -28722,7 +28714,7 @@ index dd3be8d..729cc4f 100644
# Set device ownerships/modes.
xserver_setattr_console_pipes(initrc_t)
@@ -896,3 +1365,196 @@ optional_policy(`
@@ -896,3 +1364,196 @@ optional_policy(`
optional_policy(`
zebra_read_config(initrc_t)
')

View File

@ -2957,10 +2957,10 @@ index 0000000..fd48ed9
+ spamassassin_read_pid_files(antivirus_domain)
+')
diff --git a/apache.fc b/apache.fc
index 550a69e..53e5708 100644
index 550a69e..842225c 100644
--- a/apache.fc
+++ b/apache.fc
@@ -1,161 +1,196 @@
@@ -1,161 +1,199 @@
-HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
-HOME_DIR/((www)|(web)|(public_html))/cgi-bin(/.+)? gen_context(system_u:object_r:httpd_user_script_exec_t,s0)
+HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
@ -3024,6 +3024,7 @@ index 550a69e..53e5708 100644
-/usr/.*\.cgi -- gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
+/srv/([^/]*/)?www(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
+/srv/([^/]*/)?www/logs(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
+/srv/gallery2(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
-/usr/bin/htsslpass -- gen_context(system_u:object_r:httpd_helper_exec_t,s0)
@ -3166,6 +3167,8 @@ index 550a69e..53e5708 100644
+/var/lib/mod_security(/.*)? gen_context(system_u:object_r:httpd_var_lib_t,s0)
+/var/lib/nginx(/.*)? gen_context(system_u:object_r:httpd_var_lib_t,s0)
+/var/lib/php/session(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
+/var/lib/php/wsdlcache(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
+
/var/lib/squirrelmail/prefs(/.*)? gen_context(system_u:object_r:httpd_squirrelmail_t,s0)
-/var/lib/stickshift/.httpd.d(/.*)? gen_context(system_u:object_r:httpd_config_t,s0)
-/var/lib/svn(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
@ -3230,6 +3233,7 @@ index 550a69e..53e5708 100644
+/var/www/[^/]*/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
+/var/www/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
+/var/www/icons(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
+/var/www/miq/vmdb/log(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
+/var/www/perl(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
-/var/run/apache.* gen_context(system_u:object_r:httpd_var_run_t,s0)
@ -3292,7 +3296,6 @@ index 550a69e..53e5708 100644
+/var/www/svn/conf(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
+
+/var/log/dirsrv/admin-serv(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
+
+/var/run/dirsrv/admin-serv.* gen_context(system_u:object_r:httpd_var_run_t,s0)
+/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
diff --git a/apache.if b/apache.if
@ -10778,10 +10781,10 @@ index 0000000..5977d96
+')
diff --git a/chrome.te b/chrome.te
new file mode 100644
index 0000000..25f2d55
index 0000000..406f3a0
--- /dev/null
+++ b/chrome.te
@@ -0,0 +1,238 @@
@@ -0,0 +1,242 @@
+policy_module(chrome,1.0.0)
+
+########################################
@ -10958,6 +10961,10 @@ index 0000000..25f2d55
+')
+
+optional_policy(`
+ cups_stream_connect(chrome_sandbox_t)
+')
+
+optional_policy(`
+ sandbox_use_ptys(chrome_sandbox_t)
+')
+
@ -23744,7 +23751,7 @@ index c3f7916..cab3954 100644
admin_pattern($1, fetchmail_etc_t)
diff --git a/fetchmail.te b/fetchmail.te
index f0388cb..8e7f99e 100644
index f0388cb..2e94f0e 100644
--- a/fetchmail.te
+++ b/fetchmail.te
@@ -32,15 +32,13 @@ files_type(fetchmail_uidl_cache_t)
@ -23786,7 +23793,7 @@ index f0388cb..8e7f99e 100644
corenet_all_recvfrom_netlabel(fetchmail_t)
corenet_tcp_sendrecv_generic_if(fetchmail_t)
corenet_tcp_sendrecv_generic_node(fetchmail_t)
@@ -84,15 +86,19 @@ fs_search_auto_mountpoints(fetchmail_t)
@@ -84,15 +86,23 @@ fs_search_auto_mountpoints(fetchmail_t)
domain_use_interactive_fds(fetchmail_t)
@ -23804,6 +23811,10 @@ index f0388cb..8e7f99e 100644
-userdom_search_user_home_dirs(fetchmail_t)
+
+optional_policy(`
+ mta_send_mail(fetchmail_t)
+')
+
+optional_policy(`
+ kerberos_use(fetchmail_t)
+')
@ -30375,7 +30386,7 @@ index ac00fb0..36ef2e5 100644
+ userdom_user_home_dir_filetrans($1, irssi_home_t, dir, "irclogs")
')
diff --git a/irc.te b/irc.te
index ecad9c7..86d790f 100644
index ecad9c7..e413e5a 100644
--- a/irc.te
+++ b/irc.te
@@ -31,13 +31,35 @@ typealias irc_home_t alias { user_irc_home_t staff_irc_home_t sysadm_irc_home_t
@ -30449,7 +30460,7 @@ index ecad9c7..86d790f 100644
fs_getattr_all_fs(irc_t)
fs_search_auto_mountpoints(irc_t)
@@ -106,13 +120,15 @@ auth_use_nsswitch(irc_t)
@@ -106,15 +120,18 @@ auth_use_nsswitch(irc_t)
init_read_utmp(irc_t)
init_dontaudit_lock_utmp(irc_t)
@ -30466,8 +30477,11 @@ index ecad9c7..86d790f 100644
+userdom_use_inherited_user_terminals(irc_t)
tunable_policy(`irc_use_any_tcp_ports',`
+ allow irc_t self:tcp_socket create_stream_socket_perms;
corenet_sendrecv_all_server_packets(irc_t)
@@ -122,18 +138,71 @@ tunable_policy(`irc_use_any_tcp_ports',`
corenet_tcp_bind_all_unreserved_ports(irc_t)
corenet_sendrecv_all_client_packets(irc_t)
@@ -122,18 +139,71 @@ tunable_policy(`irc_use_any_tcp_ports',`
corenet_tcp_sendrecv_all_ports(irc_t)
')
@ -39971,7 +39985,7 @@ index 6194b80..bb32d40 100644
')
+
diff --git a/mozilla.te b/mozilla.te
index 6a306ee..2108bc7 100644
index 6a306ee..a74ab9d 100644
--- a/mozilla.te
+++ b/mozilla.te
@@ -1,4 +1,4 @@
@ -40242,11 +40256,11 @@ index 6a306ee..2108bc7 100644
miscfiles_dontaudit_setattr_fonts_dirs(mozilla_t)
-userdom_use_user_ptys(mozilla_t)
+userdom_use_inherited_user_ptys(mozilla_t)
-
-userdom_manage_user_tmp_dirs(mozilla_t)
-userdom_manage_user_tmp_files(mozilla_t)
-
+userdom_use_inherited_user_ptys(mozilla_t)
-userdom_manage_user_home_content_dirs(mozilla_t)
-userdom_manage_user_home_content_files(mozilla_t)
-userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
@ -40415,7 +40429,7 @@ index 6a306ee..2108bc7 100644
')
optional_policy(`
@@ -300,221 +324,184 @@ optional_policy(`
@@ -300,259 +324,234 @@ optional_policy(`
########################################
#
@ -40498,12 +40512,12 @@ index 6a306ee..2108bc7 100644
allow mozilla_plugin_t mozilla_plugin_rw_t:dir list_dir_perms;
-allow mozilla_plugin_t mozilla_plugin_rw_t:file read_file_perms;
-allow mozilla_plugin_t mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
-
-dgram_send_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
-stream_connect_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
+read_lnk_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
+read_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
-dgram_send_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
-stream_connect_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
-
-can_exec(mozilla_plugin_t, { mozilla_exec_t mozilla_plugin_home_t mozilla_plugin_tmp_t })
+can_exec(mozilla_plugin_t, mozilla_exec_t)
@ -40673,12 +40687,12 @@ index 6a306ee..2108bc7 100644
-userdom_manage_user_tmp_dirs(mozilla_plugin_t)
-userdom_manage_user_tmp_files(mozilla_plugin_t)
-
+systemd_read_logind_sessions_files(mozilla_plugin_t)
-userdom_manage_user_home_content_dirs(mozilla_plugin_t)
-userdom_manage_user_home_content_files(mozilla_plugin_t)
-userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })
+systemd_read_logind_sessions_files(mozilla_plugin_t)
-
-userdom_write_user_tmp_sockets(mozilla_plugin_t)
+term_getattr_all_ttys(mozilla_plugin_t)
+term_getattr_all_ptys(mozilla_plugin_t)
@ -40702,14 +40716,22 @@ index 6a306ee..2108bc7 100644
-ifndef(`enable_mls',`
- fs_list_dos(mozilla_plugin_t)
- fs_read_dos_files(mozilla_plugin_t)
-
+userdom_read_user_home_content_files(mozilla_plugin_t)
+userdom_read_user_home_content_symlinks(mozilla_plugin_t)
+userdom_read_home_certs(mozilla_plugin_t)
+userdom_read_home_audio_files(mozilla_plugin_t)
+userdom_exec_user_tmp_files(mozilla_plugin_t)
- fs_search_removable(mozilla_plugin_t)
- fs_read_removable_files(mozilla_plugin_t)
- fs_read_removable_symlinks(mozilla_plugin_t)
-
+userdom_home_manager(mozilla_plugin_t)
- fs_read_iso9660_files(mozilla_plugin_t)
-')
-
+tunable_policy(`mozilla_plugin_can_network_connect',`
+ corenet_tcp_connect_all_ports(mozilla_plugin_t)
')
-tunable_policy(`allow_execmem',`
- allow mozilla_plugin_t self:process execmem;
-')
@ -40717,43 +40739,46 @@ index 6a306ee..2108bc7 100644
-tunable_policy(`mozilla_execstack',`
- allow mozilla_plugin_t self:process { execmem execstack };
-')
+userdom_read_user_home_content_files(mozilla_plugin_t)
+userdom_read_user_home_content_symlinks(mozilla_plugin_t)
+userdom_read_home_certs(mozilla_plugin_t)
+userdom_read_home_audio_files(mozilla_plugin_t)
+userdom_exec_user_tmp_files(mozilla_plugin_t)
-
-tunable_policy(`use_nfs_home_dirs',`
- fs_manage_nfs_dirs(mozilla_plugin_t)
- fs_manage_nfs_files(mozilla_plugin_t)
- fs_manage_nfs_symlinks(mozilla_plugin_t)
-')
+userdom_home_manager(mozilla_plugin_t)
+optional_policy(`
+ alsa_read_rw_config(mozilla_plugin_t)
+ alsa_read_home_files(mozilla_plugin_t)
')
-tunable_policy(`use_samba_home_dirs',`
- fs_manage_cifs_dirs(mozilla_plugin_t)
- fs_manage_cifs_files(mozilla_plugin_t)
- fs_manage_cifs_symlinks(mozilla_plugin_t)
+tunable_policy(`mozilla_plugin_can_network_connect',`
+ corenet_tcp_connect_all_ports(mozilla_plugin_t)
+optional_policy(`
+ apache_list_modules(mozilla_plugin_t)
')
optional_policy(`
@@ -523,36 +510,44 @@ optional_policy(`
- alsa_read_rw_config(mozilla_plugin_t)
- alsa_read_home_files(mozilla_plugin_t)
+ cups_stream_connect(mozilla_plugin_t)
')
optional_policy(`
- automount_dontaudit_getattr_tmp_dirs(mozilla_plugin_t)
+ apache_list_modules(mozilla_plugin_t)
+ dbus_system_bus_client(mozilla_plugin_t)
+ dbus_session_bus_client(mozilla_plugin_t)
+ dbus_connect_session_bus(mozilla_plugin_t)
+ dbus_read_lib_files(mozilla_plugin_t)
')
optional_policy(`
- dbus_all_session_bus_client(mozilla_plugin_t)
- dbus_connect_all_session_bus(mozilla_plugin_t)
dbus_system_bus_client(mozilla_plugin_t)
+ dbus_session_bus_client(mozilla_plugin_t)
+ dbus_connect_session_bus(mozilla_plugin_t)
+ dbus_read_lib_files(mozilla_plugin_t)
- dbus_system_bus_client(mozilla_plugin_t)
+ gnome_manage_config(mozilla_plugin_t)
+ gnome_read_usr_config(mozilla_plugin_t)
+ gnome_filetrans_home_content(mozilla_plugin_t)
+ gnome_exec_gstreamer_home_files(mozilla_plugin_t)
')
optional_policy(`
@ -40761,13 +40786,6 @@ index 6a306ee..2108bc7 100644
- gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome")
- gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2")
- gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2_private")
+ gnome_manage_config(mozilla_plugin_t)
+ gnome_read_usr_config(mozilla_plugin_t)
+ gnome_filetrans_home_content(mozilla_plugin_t)
+ gnome_exec_gstreamer_home_files(mozilla_plugin_t)
+')
+
+optional_policy(`
+ gpm_dontaudit_getattr_gpmctl(mozilla_plugin_t)
')
@ -40797,7 +40815,7 @@ index 6a306ee..2108bc7 100644
')
optional_policy(`
@@ -560,7 +555,7 @@ optional_policy(`
@@ -560,7 +559,7 @@ optional_policy(`
')
optional_policy(`
@ -40806,7 +40824,7 @@ index 6a306ee..2108bc7 100644
')
optional_policy(`
@@ -568,108 +563,128 @@ optional_policy(`
@@ -568,108 +567,128 @@ optional_policy(`
')
optional_policy(`
@ -40993,10 +41011,16 @@ index 6a306ee..2108bc7 100644
+ fs_manage_dos_files(mozilla_plugin_t)
')
diff --git a/mpd.fc b/mpd.fc
index 313ce52..6aa46d2 100644
index 313ce52..ae93e07 100644
--- a/mpd.fc
+++ b/mpd.fc
@@ -9,3 +9,5 @@
@@ -1,3 +1,5 @@
+HOME_DIR/\.mpd(/.*)? gen_context(system_u:object_r:mpd_home_t,s0)
+
/etc/mpd\.conf -- gen_context(system_u:object_r:mpd_etc_t,s0)
/etc/rc\.d/init\.d/mpd -- gen_context(system_u:object_r:mpd_initrc_exec_t,s0)
@@ -9,3 +11,5 @@
/var/lib/mpd/playlists(/.*)? gen_context(system_u:object_r:mpd_data_t,s0)
/var/log/mpd(/.*)? gen_context(system_u:object_r:mpd_log_t,s0)
@ -41048,13 +41072,16 @@ index 5fa77c7..2e01c7d 100644
domain_system_change_exemption($1)
role_transition $2 mpd_initrc_exec_t system_r;
diff --git a/mpd.te b/mpd.te
index 7c8afcc..29d8881 100644
index 7c8afcc..41f4352 100644
--- a/mpd.te
+++ b/mpd.te
@@ -62,18 +62,22 @@ files_type(mpd_var_lib_t)
@@ -62,18 +62,25 @@ files_type(mpd_var_lib_t)
type mpd_user_data_t;
userdom_user_home_content(mpd_user_data_t) # customizable
+type mpd_home_t;
+userdom_user_home_content(mpd_home_t)
+
+type mpd_var_run_t;
+files_pid_file(mpd_var_run_t)
+
@ -41075,7 +41102,7 @@ index 7c8afcc..29d8881 100644
allow mpd_t mpd_data_t:dir manage_dir_perms;
allow mpd_t mpd_data_t:file manage_file_perms;
@@ -104,13 +108,18 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
@@ -104,13 +111,22 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
manage_lnk_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
files_var_lib_filetrans(mpd_t, mpd_var_lib_t, dir)
@ -41084,6 +41111,10 @@ index 7c8afcc..29d8881 100644
+manage_sock_files_pattern(mpd_t, mpd_var_run_t, mpd_var_run_t)
+manage_lnk_files_pattern(mpd_t, mpd_var_run_t, mpd_var_run_t)
+files_pid_filetrans(mpd_t, mpd_var_run_t, { file dir sock_file })
+
+manage_files_pattern(mpd_t, mpd_home_t, mpd_home_t)
+manage_dirs_pattern(mpd_t, mpd_home_t, mpd_home_t)
+manage_lnk_files_pattern(mpd_t, mpd_home_t, mpd_home_t)
+
kernel_getattr_proc(mpd_t)
kernel_read_system_state(mpd_t)
@ -41095,7 +41126,7 @@ index 7c8afcc..29d8881 100644
corenet_all_recvfrom_netlabel(mpd_t)
corenet_tcp_sendrecv_generic_if(mpd_t)
corenet_tcp_sendrecv_generic_node(mpd_t)
@@ -139,9 +148,9 @@ dev_read_sound(mpd_t)
@@ -139,9 +155,9 @@ dev_read_sound(mpd_t)
dev_write_sound(mpd_t)
dev_read_sysfs(mpd_t)
@ -41106,7 +41137,7 @@ index 7c8afcc..29d8881 100644
fs_list_inotifyfs(mpd_t)
fs_rw_anon_inodefs_files(mpd_t)
fs_search_auto_mountpoints(mpd_t)
@@ -150,7 +159,9 @@ auth_use_nsswitch(mpd_t)
@@ -150,7 +166,9 @@ auth_use_nsswitch(mpd_t)
logging_send_syslog_msg(mpd_t)
@ -41117,7 +41148,7 @@ index 7c8afcc..29d8881 100644
tunable_policy(`mpd_enable_homedirs',`
userdom_search_user_home_dirs(mpd_t)
@@ -191,7 +202,7 @@ optional_policy(`
@@ -191,7 +209,7 @@ optional_policy(`
')
optional_policy(`
@ -41126,7 +41157,7 @@ index 7c8afcc..29d8881 100644
')
optional_policy(`
@@ -199,6 +210,16 @@ optional_policy(`
@@ -199,6 +217,16 @@ optional_policy(`
')
optional_policy(`
@ -51833,7 +51864,7 @@ index 0000000..fdc4a03
+')
diff --git a/openshift.te b/openshift.te
new file mode 100644
index 0000000..9724884
index 0000000..55c843c
--- /dev/null
+++ b/openshift.te
@@ -0,0 +1,549 @@
@ -52383,7 +52414,7 @@ index 0000000..9724884
+')
+
+optional_policy(`
+ ssh_exec_keygen(openshift_cron_t)
+ ssh_domtrans_keygen(openshift_cron_t)
+ ssh_dontaudit_read_server_keys(openshift_cron_t)
+')
diff --git a/openvpn.fc b/openvpn.fc
@ -53732,7 +53763,7 @@ index bf59ef7..c050b37 100644
+ manage_dirs_pattern($1, passenger_tmp_t, passenger_tmp_t)
')
diff --git a/passenger.te b/passenger.te
index 4e114ff..6691677 100644
index 4e114ff..1b1cb71 100644
--- a/passenger.te
+++ b/passenger.te
@@ -1,4 +1,4 @@
@ -53783,7 +53814,7 @@ index 4e114ff..6691677 100644
manage_dirs_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
manage_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
@@ -45,19 +50,20 @@ manage_fifo_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
@@ -45,19 +50,22 @@ manage_fifo_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
manage_sock_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
files_pid_filetrans(passenger_t, passenger_var_run_t, { file dir sock_file })
@ -53796,6 +53827,8 @@ index 4e114ff..6691677 100644
kernel_read_system_state(passenger_t)
kernel_read_kernel_sysctls(passenger_t)
+kernel_read_network_state(passenger_t)
+kernel_read_net_sysctls(passenger_t)
corenet_all_recvfrom_netlabel(passenger_t)
-corenet_all_recvfrom_unlabeled(passenger_t)
@ -53809,7 +53842,7 @@ index 4e114ff..6691677 100644
corecmd_exec_bin(passenger_t)
corecmd_exec_shell(passenger_t)
@@ -66,8 +72,6 @@ dev_read_urand(passenger_t)
@@ -66,14 +74,14 @@ dev_read_urand(passenger_t)
domain_read_all_domains_state(passenger_t)
@ -53818,7 +53851,15 @@ index 4e114ff..6691677 100644
auth_use_nsswitch(passenger_t)
logging_send_syslog_msg(passenger_t)
@@ -90,14 +94,21 @@ optional_policy(`
miscfiles_read_localization(passenger_t)
+sysnet_exec_ifconfig(passenger_t)
+
userdom_dontaudit_use_user_terminals(passenger_t)
optional_policy(`
@@ -90,14 +98,21 @@ optional_policy(`
')
optional_policy(`
@ -63265,7 +63306,7 @@ index 4ecda09..8c0b242 100644
+/var/log/puppet(/.*)? gen_context(system_u:object_r:puppet_log_t,s0)
+/var/run/puppet(/.*)? gen_context(system_u:object_r:puppet_var_run_t,s0)
diff --git a/puppet.if b/puppet.if
index 7cb8b1f..46650f0 100644
index 7cb8b1f..9422c90 100644
--- a/puppet.if
+++ b/puppet.if
@@ -1,4 +1,32 @@
@ -63293,11 +63334,11 @@ index 7cb8b1f..46650f0 100644
+#
+interface(`puppet_domtrans_master',`
+ gen_require(`
+ type puppetmaster_t, puppetmaster_t_exec_t;
+ type puppetmaster_t, puppetmaster_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, puppetmaster_t_exec_t, puppetmaster_t)
+ domtrans_pattern($1, puppetmaster_exec_t, puppetmaster_t)
+')
########################################
@ -63576,7 +63617,7 @@ index 7cb8b1f..46650f0 100644
- files_search_var_lib($1)
- admin_pattern($1, puppet_var_lib_t)
+ logging_search_logs($1)
+ files_search_etc($1)
+ list_dirs_pattern($1, puppet_etc_t, puppet_etc_t)
+ read_files_pattern($1, puppet_etc_t, puppet_etc_t)
+')
@ -82749,7 +82790,7 @@ index 634c6b4..e1edfd9 100644
########################################
diff --git a/sosreport.te b/sosreport.te
index 703efa3..f9d6ed6 100644
index 703efa3..9610be1 100644
--- a/sosreport.te
+++ b/sosreport.te
@@ -19,6 +19,9 @@ files_tmp_file(sosreport_tmp_t)
@ -82814,7 +82855,7 @@ index 703efa3..f9d6ed6 100644
files_read_var_lib_files(sosreport_t)
files_read_var_symlinks(sosreport_t)
files_read_kernel_modules(sosreport_t)
@@ -79,27 +95,41 @@ files_manage_etc_runtime_files(sosreport_t)
@@ -79,27 +95,42 @@ files_manage_etc_runtime_files(sosreport_t)
files_etc_filetrans_etc_runtime(sosreport_t, file)
fs_getattr_all_fs(sosreport_t)
@ -82833,6 +82874,7 @@ index 703efa3..f9d6ed6 100644
+files_read_non_security_files(sosreport_t)
+
auth_use_nsswitch(sosreport_t)
+auth_dontaudit_read_shadow(sosreport_t)
init_domtrans_script(sosreport_t)
+init_getattr_initctl(sosreport_t)
@ -82858,7 +82900,7 @@ index 703efa3..f9d6ed6 100644
')
optional_policy(`
@@ -111,6 +141,11 @@ optional_policy(`
@@ -111,6 +142,11 @@ optional_policy(`
')
optional_policy(`
@ -86063,10 +86105,10 @@ index b42ec1d..91b8f71 100644
tcsd_initrc_domtrans($1)
domain_system_change_exemption($1)
diff --git a/tcsd.te b/tcsd.te
index ac8213a..20fa71f 100644
index ac8213a..14da480 100644
--- a/tcsd.te
+++ b/tcsd.te
@@ -41,10 +41,6 @@ corenet_tcp_sendrecv_tcs_port(tcsd_t)
@@ -41,10 +41,8 @@ corenet_tcp_sendrecv_tcs_port(tcsd_t)
dev_read_urand(tcsd_t)
dev_rw_tpm(tcsd_t)
@ -86074,9 +86116,11 @@ index ac8213a..20fa71f 100644
-
auth_use_nsswitch(tcsd_t)
logging_send_syslog_msg(tcsd_t)
-
-logging_send_syslog_msg(tcsd_t)
+init_read_utmp(tcsd_t)
-miscfiles_read_localization(tcsd_t)
+logging_send_syslog_msg(tcsd_t)
diff --git a/telepathy.fc b/telepathy.fc
index c7de0cf..03fc880 100644
--- a/telepathy.fc
@ -92543,7 +92587,7 @@ index 9dec06c..4e31afe 100644
+ allow $1 svirt_image_t:chr_file rw_file_perms;
')
diff --git a/virt.te b/virt.te
index 1f22fba..348df8f 100644
index 1f22fba..50f7cf9 100644
--- a/virt.te
+++ b/virt.te
@@ -1,94 +1,104 @@
@ -94302,7 +94346,7 @@ index 1f22fba..348df8f 100644
allow virt_bridgehelper_t self:process { setcap getcap };
allow virt_bridgehelper_t self:capability { setpcap setgid setuid net_admin };
allow virt_bridgehelper_t self:tcp_socket create_stream_socket_perms;
@@ -1198,5 +1352,122 @@ kernel_read_network_state(virt_bridgehelper_t)
@@ -1198,5 +1352,123 @@ kernel_read_network_state(virt_bridgehelper_t)
corenet_rw_tun_tap_dev(virt_bridgehelper_t)
@ -94419,6 +94463,7 @@ index 1f22fba..348df8f 100644
+#
+
+type svirt_socket_t;
+domain_type(svirt_socket_t)
+role system_r types svirt_socket_t;
+allow virtd_t svirt_socket_t:unix_stream_socket { connectto create_stream_socket_perms };
+allow virt_domain svirt_socket_t:unix_stream_socket { connectto create_stream_socket_perms };
@ -97518,25 +97563,32 @@ index 36e32df..3d08962 100644
+ manage_dirs_pattern($1, zarafa_var_lib_t, zarafa_var_lib_t)
')
diff --git a/zarafa.te b/zarafa.te
index a4479b1..7a9f1b6 100644
index a4479b1..a40d580 100644
--- a/zarafa.te
+++ b/zarafa.te
@@ -1,4 +1,4 @@
@@ -1,13 +1,18 @@
-policy_module(zarafa, 1.1.4)
+policy_module(zarafa, 1.1.0)
########################################
#
@@ -6,8 +6,6 @@ policy_module(zarafa, 1.1.4)
# Declarations
#
+## <desc>
+## <p>
+## Allow zarafa domains to setrlimit/sys_rouserce.
+## </p>
+## </desc>
+gen_tunable(zarafa_setrlimit, false)
+
attribute zarafa_domain;
-attribute zarafa_logfile;
-attribute zarafa_pidfile;
zarafa_domain_template(deliver)
@@ -17,9 +15,6 @@ files_tmp_file(zarafa_deliver_tmp_t)
@@ -17,9 +22,6 @@ files_tmp_file(zarafa_deliver_tmp_t)
type zarafa_etc_t;
files_config_file(zarafa_etc_t)
@ -97546,7 +97598,7 @@ index a4479b1..7a9f1b6 100644
zarafa_domain_template(gateway)
zarafa_domain_template(ical)
zarafa_domain_template(indexer)
@@ -43,61 +38,74 @@ files_tmp_file(zarafa_var_lib_t)
@@ -43,61 +45,74 @@ files_tmp_file(zarafa_var_lib_t)
########################################
#
@ -97641,7 +97693,7 @@ index a4479b1..7a9f1b6 100644
manage_dirs_pattern(zarafa_server_t, zarafa_server_tmp_t, zarafa_server_tmp_t)
manage_files_pattern(zarafa_server_t, zarafa_server_tmp_t, zarafa_server_tmp_t)
files_tmp_filetrans(zarafa_server_t, zarafa_server_tmp_t, { file dir })
@@ -109,70 +117,80 @@ files_var_lib_filetrans(zarafa_server_t, zarafa_var_lib_t, { file dir lnk_file }
@@ -109,70 +124,85 @@ files_var_lib_filetrans(zarafa_server_t, zarafa_var_lib_t, { file dir lnk_file }
stream_connect_pattern(zarafa_server_t, zarafa_indexer_var_run_t, zarafa_indexer_var_run_t, zarafa_indexer_t)
@ -97703,14 +97755,14 @@ index a4479b1..7a9f1b6 100644
#
-# Zarafa domain local policy
+# zarafa_gateway local policy
+#
#
+corenet_tcp_bind_pop_port(zarafa_gateway_t)
+
+#######################################
+#
+# zarafa-ical local policy
#
+#
+
+corenet_tcp_bind_http_cache_port(zarafa_ical_t)
+
+######################################
@ -97727,12 +97779,17 @@ index a4479b1..7a9f1b6 100644
+# bad permission on /etc/zarafa
allow zarafa_domain self:capability { kill dac_override chown setgid setuid };
-allow zarafa_domain self:process { setrlimit signal };
+allow zarafa_domain self:process { signal_perms setrlimit };
+allow zarafa_domain self:process { signal_perms };
allow zarafa_domain self:fifo_file rw_fifo_file_perms;
-allow zarafa_domain self:tcp_socket { accept listen };
-allow zarafa_domain self:unix_stream_socket { accept listen };
+allow zarafa_domain self:tcp_socket create_stream_socket_perms;
+allow zarafa_domain self:unix_stream_socket create_stream_socket_perms;
+
+tunable_policy(`zarafa_setrlimit',`
+ allow zarafa_domain self:capability sys_resource;
+ allow zarafa_domain self:process setrlimit;
+')
stream_connect_pattern(zarafa_domain, zarafa_server_var_run_t, zarafa_server_var_run_t, zarafa_server_t)

View File

@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.12.1
Release: 80%{?dist}
Release: 81%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@ -570,6 +570,23 @@ SELinux Reference policy mls base module.
%endif
%changelog
* Thu Sep 19 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-81
- Dontaudit attempts by sosreport to read shadow_t
- Allow browser sandbox plugins to connect to cups to print
- Add new label mpd_home_t
- Label /srv/www/logs as httpd_log_t
- Add support for /var/lib/php/wsdlcache
- Add zarafa_setrlimit boolean
- Allow fetchmail to send mails
- Add labels for apache logs under miq package
- Allow irc_t to use tcp sockets
- fix labels in puppet.if
- Allow tcsd to read utmp file
- Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t to access host keys
- Define svirt_socket_t as a domain_type
- Take away transition from init_t to initrc_t when executing bin_t, allow init_t to run chk_passwd_t
- Fix label on pam_krb5 helper apps
* Thu Sep 12 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-80
- Allow ldconfig to write to kdumpctl fifo files
- allow neutron to connect to amqp ports