- Fix dbus chat to not happen for xguest and guest users
This commit is contained in:
parent
d44a393484
commit
bf33202534
@ -594,7 +594,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/logrota
|
|||||||
|
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/logwatch.te serefpolicy-3.0.5/policy/modules/admin/logwatch.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/logwatch.te serefpolicy-3.0.5/policy/modules/admin/logwatch.te
|
||||||
--- nsaserefpolicy/policy/modules/admin/logwatch.te 2007-07-25 10:37:43.000000000 -0400
|
--- nsaserefpolicy/policy/modules/admin/logwatch.te 2007-07-25 10:37:43.000000000 -0400
|
||||||
+++ serefpolicy-3.0.5/policy/modules/admin/logwatch.te 2007-08-07 10:18:57.000000000 -0400
|
+++ serefpolicy-3.0.5/policy/modules/admin/logwatch.te 2007-08-10 11:56:22.000000000 -0400
|
||||||
@@ -29,7 +29,6 @@
|
@@ -29,7 +29,6 @@
|
||||||
allow logwatch_t self:process signal;
|
allow logwatch_t self:process signal;
|
||||||
allow logwatch_t self:fifo_file rw_file_perms;
|
allow logwatch_t self:fifo_file rw_file_perms;
|
||||||
@ -608,7 +608,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/logwatc
|
|||||||
|
|
||||||
dev_read_urand(logwatch_t)
|
dev_read_urand(logwatch_t)
|
||||||
-dev_search_sysfs(logwatch_t)
|
-dev_search_sysfs(logwatch_t)
|
||||||
+dev_list_sysfs(logwatch_t)
|
+dev_read_sysfs(logwatch_t)
|
||||||
|
|
||||||
# Read /proc/PID directories for all domains.
|
# Read /proc/PID directories for all domains.
|
||||||
domain_read_all_domains_state(logwatch_t)
|
domain_read_all_domains_state(logwatch_t)
|
||||||
@ -4119,17 +4119,6 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/bind
|
|||||||
corenet_sendrecv_rndc_client_packets(ndc_t)
|
corenet_sendrecv_rndc_client_packets(ndc_t)
|
||||||
|
|
||||||
fs_getattr_xattr_fs(ndc_t)
|
fs_getattr_xattr_fs(ndc_t)
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/bluetooth.te serefpolicy-3.0.5/policy/modules/services/bluetooth.te
|
|
||||||
--- nsaserefpolicy/policy/modules/services/bluetooth.te 2007-08-02 08:17:27.000000000 -0400
|
|
||||||
+++ serefpolicy-3.0.5/policy/modules/services/bluetooth.te 2007-08-07 09:39:49.000000000 -0400
|
|
||||||
@@ -128,6 +128,7 @@
|
|
||||||
dbus_system_bus_client_template(bluetooth,bluetooth_t)
|
|
||||||
dbus_connect_system_bus(bluetooth_t)
|
|
||||||
dbus_send_system_bus(bluetooth_t)
|
|
||||||
+ userdom_dbus_chat_all_users(bluetooth_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`
|
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/clamav.fc serefpolicy-3.0.5/policy/modules/services/clamav.fc
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/clamav.fc serefpolicy-3.0.5/policy/modules/services/clamav.fc
|
||||||
--- nsaserefpolicy/policy/modules/services/clamav.fc 2007-05-29 14:10:57.000000000 -0400
|
--- nsaserefpolicy/policy/modules/services/clamav.fc 2007-05-29 14:10:57.000000000 -0400
|
||||||
+++ serefpolicy-3.0.5/policy/modules/services/clamav.fc 2007-08-07 09:39:49.000000000 -0400
|
+++ serefpolicy-3.0.5/policy/modules/services/clamav.fc 2007-08-07 09:39:49.000000000 -0400
|
||||||
@ -4192,7 +4181,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/clam
|
|||||||
+')
|
+')
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/consolekit.te serefpolicy-3.0.5/policy/modules/services/consolekit.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/consolekit.te serefpolicy-3.0.5/policy/modules/services/consolekit.te
|
||||||
--- nsaserefpolicy/policy/modules/services/consolekit.te 2007-07-25 10:37:42.000000000 -0400
|
--- nsaserefpolicy/policy/modules/services/consolekit.te 2007-07-25 10:37:42.000000000 -0400
|
||||||
+++ serefpolicy-3.0.5/policy/modules/services/consolekit.te 2007-08-07 09:39:49.000000000 -0400
|
+++ serefpolicy-3.0.5/policy/modules/services/consolekit.te 2007-08-10 11:40:51.000000000 -0400
|
||||||
@@ -10,7 +10,6 @@
|
@@ -10,7 +10,6 @@
|
||||||
type consolekit_exec_t;
|
type consolekit_exec_t;
|
||||||
init_daemon_domain(consolekit_t, consolekit_exec_t)
|
init_daemon_domain(consolekit_t, consolekit_exec_t)
|
||||||
@ -4233,12 +4222,11 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cons
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
dbus_system_bus_client_template(consolekit, consolekit_t)
|
dbus_system_bus_client_template(consolekit, consolekit_t)
|
||||||
dbus_send_system_bus(consolekit_t)
|
dbus_send_system_bus(consolekit_t)
|
||||||
@@ -62,9 +68,17 @@
|
@@ -62,9 +68,16 @@
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
unconfined_dbus_chat(consolekit_t)
|
unconfined_dbus_chat(consolekit_t)
|
||||||
')
|
')
|
||||||
+
|
+
|
||||||
+ userdom_dbus_chat_all_users(consolekit_t)
|
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -4671,7 +4659,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
+/usr/local/Brother/inf(/.*)? gen_context(system_u:object_r:cupsd_rw_etc_t,s0)
|
+/usr/local/Brother/inf(/.*)? gen_context(system_u:object_r:cupsd_rw_etc_t,s0)
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups.te serefpolicy-3.0.5/policy/modules/services/cups.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups.te serefpolicy-3.0.5/policy/modules/services/cups.te
|
||||||
--- nsaserefpolicy/policy/modules/services/cups.te 2007-07-25 10:37:42.000000000 -0400
|
--- nsaserefpolicy/policy/modules/services/cups.te 2007-07-25 10:37:42.000000000 -0400
|
||||||
+++ serefpolicy-3.0.5/policy/modules/services/cups.te 2007-08-07 09:39:49.000000000 -0400
|
+++ serefpolicy-3.0.5/policy/modules/services/cups.te 2007-08-10 11:32:15.000000000 -0400
|
||||||
@@ -81,12 +81,11 @@
|
@@ -81,12 +81,11 @@
|
||||||
# /usr/lib/cups/backend/serial needs sys_admin(?!)
|
# /usr/lib/cups/backend/serial needs sys_admin(?!)
|
||||||
allow cupsd_t self:capability { sys_admin dac_override dac_read_search kill setgid setuid fsetid net_bind_service fowner chown dac_override sys_resource sys_tty_config };
|
allow cupsd_t self:capability { sys_admin dac_override dac_read_search kill setgid setuid fsetid net_bind_service fowner chown dac_override sys_resource sys_tty_config };
|
||||||
@ -4784,18 +4772,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
cron_system_entry(cupsd_t, cupsd_exec_t)
|
cron_system_entry(cupsd_t, cupsd_exec_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -250,6 +278,10 @@
|
@@ -265,16 +293,16 @@
|
||||||
optional_policy(`
|
|
||||||
hal_dbus_chat(cupsd_t)
|
|
||||||
')
|
|
||||||
+
|
|
||||||
+ optional_policy(`
|
|
||||||
+ userdom_dbus_chat_all_users(cupsd_t)
|
|
||||||
+ ')
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`
|
|
||||||
@@ -265,16 +297,16 @@
|
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -4816,7 +4793,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
seutil_sigchld_newrole(cupsd_t)
|
seutil_sigchld_newrole(cupsd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -379,6 +411,14 @@
|
@@ -379,6 +407,14 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -4831,7 +4808,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
cron_system_entry(cupsd_config_t, cupsd_config_exec_t)
|
cron_system_entry(cupsd_config_t, cupsd_config_exec_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -562,7 +602,7 @@
|
@@ -562,7 +598,7 @@
|
||||||
dev_read_urand(hplip_t)
|
dev_read_urand(hplip_t)
|
||||||
dev_read_rand(hplip_t)
|
dev_read_rand(hplip_t)
|
||||||
dev_rw_generic_usb_dev(hplip_t)
|
dev_rw_generic_usb_dev(hplip_t)
|
||||||
@ -4840,7 +4817,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
|
|
||||||
fs_getattr_all_fs(hplip_t)
|
fs_getattr_all_fs(hplip_t)
|
||||||
fs_search_auto_mountpoints(hplip_t)
|
fs_search_auto_mountpoints(hplip_t)
|
||||||
@@ -589,8 +629,6 @@
|
@@ -589,8 +625,6 @@
|
||||||
userdom_dontaudit_search_sysadm_home_dirs(hplip_t)
|
userdom_dontaudit_search_sysadm_home_dirs(hplip_t)
|
||||||
userdom_dontaudit_search_all_users_home_content(hplip_t)
|
userdom_dontaudit_search_all_users_home_content(hplip_t)
|
||||||
|
|
||||||
@ -5431,7 +5408,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.
|
|||||||
+
|
+
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.te serefpolicy-3.0.5/policy/modules/services/hal.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.te serefpolicy-3.0.5/policy/modules/services/hal.te
|
||||||
--- nsaserefpolicy/policy/modules/services/hal.te 2007-07-25 10:37:42.000000000 -0400
|
--- nsaserefpolicy/policy/modules/services/hal.te 2007-07-25 10:37:42.000000000 -0400
|
||||||
+++ serefpolicy-3.0.5/policy/modules/services/hal.te 2007-08-09 14:46:39.000000000 -0400
|
+++ serefpolicy-3.0.5/policy/modules/services/hal.te 2007-08-10 11:34:53.000000000 -0400
|
||||||
@@ -22,6 +22,12 @@
|
@@ -22,6 +22,12 @@
|
||||||
type hald_log_t;
|
type hald_log_t;
|
||||||
files_type(hald_log_t)
|
files_type(hald_log_t)
|
||||||
@ -5495,18 +5472,15 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.
|
|||||||
alsa_read_rw_config(hald_t)
|
alsa_read_rw_config(hald_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -228,6 +242,10 @@
|
@@ -228,6 +242,7 @@
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
networkmanager_dbus_chat(hald_t)
|
networkmanager_dbus_chat(hald_t)
|
||||||
')
|
')
|
||||||
+
|
+
|
||||||
+ optional_policy(`
|
|
||||||
+ userdom_dbus_chat_all_users(hald_t)
|
|
||||||
+ ')
|
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -283,6 +301,7 @@
|
@@ -283,6 +298,7 @@
|
||||||
#
|
#
|
||||||
|
|
||||||
allow hald_acl_t self:capability { dac_override fowner };
|
allow hald_acl_t self:capability { dac_override fowner };
|
||||||
@ -5514,7 +5488,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.
|
|||||||
allow hald_acl_t self:fifo_file read_fifo_file_perms;
|
allow hald_acl_t self:fifo_file read_fifo_file_perms;
|
||||||
|
|
||||||
domtrans_pattern(hald_t, hald_acl_exec_t, hald_acl_t)
|
domtrans_pattern(hald_t, hald_acl_exec_t, hald_acl_t)
|
||||||
@@ -296,7 +315,10 @@
|
@@ -296,7 +312,10 @@
|
||||||
corecmd_exec_bin(hald_acl_t)
|
corecmd_exec_bin(hald_acl_t)
|
||||||
|
|
||||||
dev_getattr_all_chr_files(hald_acl_t)
|
dev_getattr_all_chr_files(hald_acl_t)
|
||||||
@ -5525,7 +5499,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.
|
|||||||
dev_setattr_sound_dev(hald_acl_t)
|
dev_setattr_sound_dev(hald_acl_t)
|
||||||
dev_setattr_generic_usb_dev(hald_acl_t)
|
dev_setattr_generic_usb_dev(hald_acl_t)
|
||||||
dev_setattr_usbfs_files(hald_acl_t)
|
dev_setattr_usbfs_files(hald_acl_t)
|
||||||
@@ -358,3 +380,25 @@
|
@@ -358,3 +377,25 @@
|
||||||
libs_use_shared_libs(hald_sonypic_t)
|
libs_use_shared_libs(hald_sonypic_t)
|
||||||
|
|
||||||
miscfiles_read_localization(hald_sonypic_t)
|
miscfiles_read_localization(hald_sonypic_t)
|
||||||
@ -5987,7 +5961,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/netw
|
|||||||
/var/run/wpa_supplicant(/.*)? gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
|
/var/run/wpa_supplicant(/.*)? gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.te serefpolicy-3.0.5/policy/modules/services/networkmanager.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.te serefpolicy-3.0.5/policy/modules/services/networkmanager.te
|
||||||
--- nsaserefpolicy/policy/modules/services/networkmanager.te 2007-07-25 10:37:42.000000000 -0400
|
--- nsaserefpolicy/policy/modules/services/networkmanager.te 2007-07-25 10:37:42.000000000 -0400
|
||||||
+++ serefpolicy-3.0.5/policy/modules/services/networkmanager.te 2007-08-07 09:39:49.000000000 -0400
|
+++ serefpolicy-3.0.5/policy/modules/services/networkmanager.te 2007-08-10 11:35:13.000000000 -0400
|
||||||
@@ -41,6 +41,8 @@
|
@@ -41,6 +41,8 @@
|
||||||
kernel_read_kernel_sysctls(NetworkManager_t)
|
kernel_read_kernel_sysctls(NetworkManager_t)
|
||||||
kernel_load_module(NetworkManager_t)
|
kernel_load_module(NetworkManager_t)
|
||||||
@ -5997,15 +5971,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/netw
|
|||||||
corenet_all_recvfrom_unlabeled(NetworkManager_t)
|
corenet_all_recvfrom_unlabeled(NetworkManager_t)
|
||||||
corenet_all_recvfrom_netlabel(NetworkManager_t)
|
corenet_all_recvfrom_netlabel(NetworkManager_t)
|
||||||
corenet_tcp_sendrecv_all_if(NetworkManager_t)
|
corenet_tcp_sendrecv_all_if(NetworkManager_t)
|
||||||
@@ -136,6 +138,7 @@
|
@@ -152,6 +154,11 @@
|
||||||
dbus_system_bus_client_template(NetworkManager,NetworkManager_t)
|
|
||||||
dbus_connect_system_bus(NetworkManager_t)
|
|
||||||
dbus_send_system_bus(NetworkManager_t)
|
|
||||||
+ userdom_dbus_chat_all_users(NetworkManager_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`
|
|
||||||
@@ -152,6 +155,11 @@
|
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -6017,7 +5983,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/netw
|
|||||||
ppp_domtrans(NetworkManager_t)
|
ppp_domtrans(NetworkManager_t)
|
||||||
ppp_read_pid_files(NetworkManager_t)
|
ppp_read_pid_files(NetworkManager_t)
|
||||||
ppp_signal(NetworkManager_t)
|
ppp_signal(NetworkManager_t)
|
||||||
@@ -166,6 +174,7 @@
|
@@ -166,6 +173,7 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -11153,7 +11119,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/unconf
|
|||||||
+corecmd_exec_all_executables(unconfined_t)
|
+corecmd_exec_all_executables(unconfined_t)
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdomain.if serefpolicy-3.0.5/policy/modules/system/userdomain.if
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdomain.if serefpolicy-3.0.5/policy/modules/system/userdomain.if
|
||||||
--- nsaserefpolicy/policy/modules/system/userdomain.if 2007-07-03 07:06:32.000000000 -0400
|
--- nsaserefpolicy/policy/modules/system/userdomain.if 2007-07-03 07:06:32.000000000 -0400
|
||||||
+++ serefpolicy-3.0.5/policy/modules/system/userdomain.if 2007-08-07 10:28:24.000000000 -0400
|
+++ serefpolicy-3.0.5/policy/modules/system/userdomain.if 2007-08-10 11:57:57.000000000 -0400
|
||||||
@@ -62,6 +62,10 @@
|
@@ -62,6 +62,10 @@
|
||||||
|
|
||||||
allow $1_t $1_tty_device_t:chr_file { setattr rw_chr_file_perms };
|
allow $1_t $1_tty_device_t:chr_file { setattr rw_chr_file_perms };
|
||||||
@ -11451,7 +11417,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
alsa_read_rw_config($1_t)
|
alsa_read_rw_config($1_t)
|
||||||
')
|
')
|
||||||
@@ -829,34 +777,14 @@
|
@@ -829,11 +777,6 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -11463,56 +11429,59 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
allow $1_t self:dbus send_msg;
|
allow $1_t self:dbus send_msg;
|
||||||
dbus_system_bus_client_template($1,$1_t)
|
dbus_system_bus_client_template($1,$1_t)
|
||||||
|
|
||||||
optional_policy(`
|
@@ -842,21 +785,18 @@
|
||||||
- bluetooth_dbus_chat($1_t)
|
|
||||||
- ')
|
|
||||||
-
|
|
||||||
- optional_policy(`
|
|
||||||
evolution_dbus_chat($1,$1_t)
|
|
||||||
evolution_alarm_dbus_chat($1,$1_t)
|
|
||||||
')
|
')
|
||||||
|
|
||||||
- optional_policy(`
|
optional_policy(`
|
||||||
|
- evolution_dbus_chat($1,$1_t)
|
||||||
|
- evolution_alarm_dbus_chat($1,$1_t)
|
||||||
|
+ consolekit_dbus_chat($1_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
- cups_dbus_chat_config($1_t)
|
- cups_dbus_chat_config($1_t)
|
||||||
- ')
|
+ networkmanager_dbus_chat($1_t)
|
||||||
-
|
')
|
||||||
- optional_policy(`
|
|
||||||
|
optional_policy(`
|
||||||
- hal_dbus_chat($1_t)
|
- hal_dbus_chat($1_t)
|
||||||
- ')
|
+ evolution_dbus_chat($1,$1_t)
|
||||||
-
|
+ evolution_alarm_dbus_chat($1,$1_t)
|
||||||
|
')
|
||||||
|
|
||||||
- optional_policy(`
|
- optional_policy(`
|
||||||
- networkmanager_dbus_chat($1_t)
|
- networkmanager_dbus_chat($1_t)
|
||||||
- ')
|
- ')
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -884,17 +812,19 @@
|
@@ -884,17 +824,17 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
- nis_use_ypbind($1_t)
|
- nis_use_ypbind($1_t)
|
||||||
- ')
|
+ alsa_read_rw_config($1_t)
|
||||||
-
|
|
||||||
- optional_policy(`
|
|
||||||
tunable_policy(`allow_user_mysql_connect',`
|
|
||||||
mysql_stream_connect($1_t)
|
|
||||||
')
|
|
||||||
')
|
')
|
||||||
|
|
||||||
- optional_policy(`
|
- optional_policy(`
|
||||||
- nscd_socket_use($1_t)
|
- tunable_policy(`allow_user_mysql_connect',`
|
||||||
|
- mysql_stream_connect($1_t)
|
||||||
|
- ')
|
||||||
|
- ')
|
||||||
+ optional_policy(`
|
+ optional_policy(`
|
||||||
+ tunable_policy(`allow_user_postgresql_connect',`
|
+ tunable_policy(`allow_user_postgresql_connect',`
|
||||||
+ postgresql_stream_connect($1_t)
|
+ postgresql_stream_connect($1_t)
|
||||||
+ ')
|
+ ')
|
||||||
+ ')
|
+ ')
|
||||||
+
|
|
||||||
|
- optional_policy(`
|
||||||
|
- nscd_socket_use($1_t)
|
||||||
+ tunable_policy(`user_ttyfile_stat',`
|
+ tunable_policy(`user_ttyfile_stat',`
|
||||||
+ term_getattr_all_user_ttys($1_t)
|
+ term_getattr_all_user_ttys($1_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -908,16 +838,6 @@
|
@@ -908,16 +848,6 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -11529,7 +11498,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
resmgr_stream_connect($1_t)
|
resmgr_stream_connect($1_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -927,11 +847,6 @@
|
@@ -927,11 +857,6 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -11541,7 +11510,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
samba_stream_connect_winbind($1_t)
|
samba_stream_connect_winbind($1_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -962,21 +877,162 @@
|
@@ -962,21 +887,162 @@
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -11710,7 +11679,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
domain_interactive_fd($1_t)
|
domain_interactive_fd($1_t)
|
||||||
|
|
||||||
typeattribute $1_devpts_t user_ptynode;
|
typeattribute $1_devpts_t user_ptynode;
|
||||||
@@ -985,15 +1041,53 @@
|
@@ -985,15 +1051,53 @@
|
||||||
typeattribute $1_tmp_t user_tmpfile;
|
typeattribute $1_tmp_t user_tmpfile;
|
||||||
typeattribute $1_tty_device_t user_ttynode;
|
typeattribute $1_tty_device_t user_ttynode;
|
||||||
|
|
||||||
@ -11768,10 +11737,15 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
|
|
||||||
# port access is audited even if dac would not have allowed it, so dontaudit it here
|
# port access is audited even if dac would not have allowed it, so dontaudit it here
|
||||||
corenet_dontaudit_tcp_bind_all_reserved_ports($1_t)
|
corenet_dontaudit_tcp_bind_all_reserved_ports($1_t)
|
||||||
@@ -1029,15 +1123,7 @@
|
@@ -1024,20 +1128,12 @@
|
||||||
# and may change other protocols
|
kernel_dontaudit_read_ring_buffer($1_t)
|
||||||
tunable_policy(`user_tcp_server',`
|
')
|
||||||
corenet_tcp_bind_all_nodes($1_t)
|
|
||||||
|
- # Allow users to run TCP servers (bind to ports and accept connection from
|
||||||
|
- # the same domain and outside users) disabling this forces FTP passive mode
|
||||||
|
- # and may change other protocols
|
||||||
|
- tunable_policy(`user_tcp_server',`
|
||||||
|
- corenet_tcp_bind_all_nodes($1_t)
|
||||||
- corenet_tcp_bind_generic_port($1_t)
|
- corenet_tcp_bind_generic_port($1_t)
|
||||||
- ')
|
- ')
|
||||||
-
|
-
|
||||||
@ -11781,11 +11755,16 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
-
|
-
|
||||||
- optional_policy(`
|
- optional_policy(`
|
||||||
- loadkeys_run($1_t,$1_r,$1_tty_device_t)
|
- loadkeys_run($1_t,$1_r,$1_tty_device_t)
|
||||||
|
+ # Allow users to run TCP servers (bind to ports and accept connection from
|
||||||
|
+ # the same domain and outside users) disabling this forces FTP passive mode
|
||||||
|
+ # and may change other protocols
|
||||||
|
+ tunable_policy(`user_tcp_server',`
|
||||||
|
+ corenet_tcp_bind_all_nodes($1_t)
|
||||||
+ corenet_tcp_bind_all_unreserved_ports($1_t)
|
+ corenet_tcp_bind_all_unreserved_ports($1_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -1054,17 +1140,6 @@
|
@@ -1054,17 +1150,6 @@
|
||||||
setroubleshoot_stream_connect($1_t)
|
setroubleshoot_stream_connect($1_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -11803,7 +11782,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
')
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
@@ -1102,6 +1177,8 @@
|
@@ -1102,6 +1187,8 @@
|
||||||
class passwd { passwd chfn chsh rootok crontab };
|
class passwd { passwd chfn chsh rootok crontab };
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -11812,7 +11791,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
##############################
|
##############################
|
||||||
#
|
#
|
||||||
# Declarations
|
# Declarations
|
||||||
@@ -1127,7 +1204,7 @@
|
@@ -1127,7 +1214,7 @@
|
||||||
# $1_t local policy
|
# $1_t local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
@ -11821,7 +11800,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
allow $1_t self:process { setexec setfscreate };
|
allow $1_t self:process { setexec setfscreate };
|
||||||
|
|
||||||
# Set password information for other users.
|
# Set password information for other users.
|
||||||
@@ -1139,7 +1216,11 @@
|
@@ -1139,7 +1226,11 @@
|
||||||
# Manipulate other users crontab.
|
# Manipulate other users crontab.
|
||||||
allow $1_t self:passwd crontab;
|
allow $1_t self:passwd crontab;
|
||||||
|
|
||||||
@ -11834,7 +11813,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
|
|
||||||
kernel_read_software_raid_state($1_t)
|
kernel_read_software_raid_state($1_t)
|
||||||
kernel_getattr_core_if($1_t)
|
kernel_getattr_core_if($1_t)
|
||||||
@@ -1902,6 +1983,41 @@
|
@@ -1902,6 +1993,41 @@
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -11876,7 +11855,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
## Do not audit attempts to set the
|
## Do not audit attempts to set the
|
||||||
## attributes of user home files.
|
## attributes of user home files.
|
||||||
## </summary>
|
## </summary>
|
||||||
@@ -3078,7 +3194,7 @@
|
@@ -3078,7 +3204,7 @@
|
||||||
#
|
#
|
||||||
template(`userdom_tmp_filetrans_user_tmp',`
|
template(`userdom_tmp_filetrans_user_tmp',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
@ -11885,7 +11864,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
')
|
')
|
||||||
|
|
||||||
files_tmp_filetrans($2,$1_tmp_t,$3)
|
files_tmp_filetrans($2,$1_tmp_t,$3)
|
||||||
@@ -5323,7 +5439,7 @@
|
@@ -5323,7 +5449,7 @@
|
||||||
attribute user_tmpfile;
|
attribute user_tmpfile;
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -11894,34 +11873,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -5548,6 +5664,26 @@
|
@@ -5559,3 +5685,280 @@
|
||||||
|
|
||||||
########################################
|
|
||||||
## <summary>
|
|
||||||
+## Send a dbus message to all user domains.
|
|
||||||
+## </summary>
|
|
||||||
+## <param name="domain">
|
|
||||||
+## <summary>
|
|
||||||
+## Domain allowed access.
|
|
||||||
+## </summary>
|
|
||||||
+## </param>
|
|
||||||
+#
|
|
||||||
+interface(`userdom_dbus_chat_all_users',`
|
|
||||||
+ gen_require(`
|
|
||||||
+ attribute userdomain;
|
|
||||||
+ class dbus send_msg;
|
|
||||||
+ ')
|
|
||||||
+
|
|
||||||
+ allow $1 userdomain:dbus send_msg;
|
|
||||||
+ allow userdomain $1:dbus send_msg;
|
|
||||||
+')
|
|
||||||
+
|
|
||||||
+########################################
|
|
||||||
+## <summary>
|
|
||||||
## Unconfined access to user domains. (Deprecated)
|
|
||||||
## </summary>
|
|
||||||
## <param name="domain">
|
|
||||||
@@ -5559,3 +5695,275 @@
|
|
||||||
interface(`userdom_unconfined',`
|
interface(`userdom_unconfined',`
|
||||||
refpolicywarn(`$0($*) has been deprecated.')
|
refpolicywarn(`$0($*) has been deprecated.')
|
||||||
')
|
')
|
||||||
@ -12113,6 +12065,11 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
|||||||
+ dbus_per_role_template($1, $1_t, $1_r)
|
+ dbus_per_role_template($1, $1_t, $1_r)
|
||||||
+ dbus_system_bus_client_template($1, $1_t)
|
+ dbus_system_bus_client_template($1, $1_t)
|
||||||
+ allow $1_t self:dbus send_msg;
|
+ allow $1_t self:dbus send_msg;
|
||||||
|
+
|
||||||
|
+ optional_policy(`
|
||||||
|
+ cups_dbus_chat($1_t)
|
||||||
|
+ ')
|
||||||
|
+
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
@ -12396,13 +12353,17 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/users/guest.i
|
|||||||
+## <summary>Policy for guest user</summary>
|
+## <summary>Policy for guest user</summary>
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/users/guest.te serefpolicy-3.0.5/policy/modules/users/guest.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/users/guest.te serefpolicy-3.0.5/policy/modules/users/guest.te
|
||||||
--- nsaserefpolicy/policy/modules/users/guest.te 1969-12-31 19:00:00.000000000 -0500
|
--- nsaserefpolicy/policy/modules/users/guest.te 1969-12-31 19:00:00.000000000 -0500
|
||||||
+++ serefpolicy-3.0.5/policy/modules/users/guest.te 2007-08-07 09:39:49.000000000 -0400
|
+++ serefpolicy-3.0.5/policy/modules/users/guest.te 2007-08-10 11:34:33.000000000 -0400
|
||||||
@@ -0,0 +1,5 @@
|
@@ -0,0 +1,9 @@
|
||||||
+policy_module(guest,1.0.0)
|
+policy_module(guest,1.0.0)
|
||||||
+userdom_unpriv_login_user(guest)
|
+userdom_unpriv_login_user(guest)
|
||||||
+userdom_unpriv_login_user(gadmin)
|
+userdom_unpriv_login_user(gadmin)
|
||||||
+userdom_unpriv_xwindows_login_user(xguest)
|
+userdom_unpriv_xwindows_login_user(xguest)
|
||||||
+mozilla_per_role_template(xguest, xguest_t, xguest_r)
|
+mozilla_per_role_template(xguest, xguest_t, xguest_r)
|
||||||
|
+# Allow mounting of file systems
|
||||||
|
+optional_policy(`
|
||||||
|
+ hal_dbus_chat(xguest_t)
|
||||||
|
+')
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/users/logadm.fc serefpolicy-3.0.5/policy/modules/users/logadm.fc
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/users/logadm.fc serefpolicy-3.0.5/policy/modules/users/logadm.fc
|
||||||
--- nsaserefpolicy/policy/modules/users/logadm.fc 1969-12-31 19:00:00.000000000 -0500
|
--- nsaserefpolicy/policy/modules/users/logadm.fc 1969-12-31 19:00:00.000000000 -0500
|
||||||
+++ serefpolicy-3.0.5/policy/modules/users/logadm.fc 2007-08-07 09:39:49.000000000 -0400
|
+++ serefpolicy-3.0.5/policy/modules/users/logadm.fc 2007-08-07 09:39:49.000000000 -0400
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.0.5
|
Version: 3.0.5
|
||||||
Release: 3%{?dist}
|
Release: 4%{?dist}
|
||||||
License: GPL
|
License: GPL
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -360,6 +360,9 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Aug 10 2007 Dan Walsh <dwalsh@redhat.com> 3.0.5-4
|
||||||
|
- Fix dbus chat to not happen for xguest and guest users
|
||||||
|
|
||||||
* Mon Aug 6 2007 Dan Walsh <dwalsh@redhat.com> 3.0.5-3
|
* Mon Aug 6 2007 Dan Walsh <dwalsh@redhat.com> 3.0.5-3
|
||||||
- Fix nagios cgi
|
- Fix nagios cgi
|
||||||
- allow squid to communicate with winbind
|
- allow squid to communicate with winbind
|
||||||
|
Loading…
Reference in New Issue
Block a user