add key support
This commit is contained in:
parent
2dd1d307f6
commit
fe3a1eb846
@ -1,3 +1,4 @@
|
|||||||
|
- Add key support from Michael LeMay.
|
||||||
- Add ftpdctl domain to ftp, from Paul Howarth.
|
- Add ftpdctl domain to ftp, from Paul Howarth.
|
||||||
- Fix build system to not move type declarations out of optionals.
|
- Fix build system to not move type declarations out of optionals.
|
||||||
- Add gcc-config domain to portage.
|
- Add gcc-config domain to portage.
|
||||||
|
@ -252,6 +252,7 @@ class process
|
|||||||
execmem
|
execmem
|
||||||
execstack
|
execstack
|
||||||
execheap
|
execheap
|
||||||
|
setkeycreate
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -617,3 +618,14 @@ class packet
|
|||||||
recv
|
recv
|
||||||
relabelto
|
relabelto
|
||||||
}
|
}
|
||||||
|
|
||||||
|
class key
|
||||||
|
{
|
||||||
|
view
|
||||||
|
read
|
||||||
|
write
|
||||||
|
search
|
||||||
|
link
|
||||||
|
setattr
|
||||||
|
create
|
||||||
|
}
|
||||||
|
@ -90,4 +90,7 @@ class appletalk_socket
|
|||||||
|
|
||||||
class packet
|
class packet
|
||||||
|
|
||||||
|
# Kernel access key retention
|
||||||
|
class key
|
||||||
|
|
||||||
# FLASK
|
# FLASK
|
||||||
|
@ -80,7 +80,7 @@ optional_policy(`
|
|||||||
#
|
#
|
||||||
|
|
||||||
allow xdm_t self:capability { setgid setuid sys_resource kill sys_tty_config mknod chown dac_override dac_read_search fowner fsetid ipc_owner sys_nice sys_rawio net_bind_service };
|
allow xdm_t self:capability { setgid setuid sys_resource kill sys_tty_config mknod chown dac_override dac_read_search fowner fsetid ipc_owner sys_nice sys_rawio net_bind_service };
|
||||||
allow xdm_t self:process { setexec setpgid setsched setrlimit signal_perms };
|
allow xdm_t self:process { setexec setpgid setsched setrlimit signal_perms setkeycreate };
|
||||||
allow xdm_t self:fifo_file rw_file_perms;
|
allow xdm_t self:fifo_file rw_file_perms;
|
||||||
allow xdm_t self:shm create_shm_perms;
|
allow xdm_t self:shm create_shm_perms;
|
||||||
allow xdm_t self:sem create_sem_perms;
|
allow xdm_t self:sem create_sem_perms;
|
||||||
@ -214,6 +214,7 @@ sysnet_read_config(xdm_t)
|
|||||||
|
|
||||||
userdom_dontaudit_use_unpriv_user_fds(xdm_t)
|
userdom_dontaudit_use_unpriv_user_fds(xdm_t)
|
||||||
userdom_dontaudit_search_sysadm_home_dirs(xdm_t)
|
userdom_dontaudit_search_sysadm_home_dirs(xdm_t)
|
||||||
|
userdom_create_all_users_keys(xdm_t)
|
||||||
# for .dmrc
|
# for .dmrc
|
||||||
userdom_read_unpriv_users_home_content_files(xdm_t)
|
userdom_read_unpriv_users_home_content_files(xdm_t)
|
||||||
# Search /proc for any user domain processes.
|
# Search /proc for any user domain processes.
|
||||||
|
@ -169,6 +169,7 @@ userdom_signal_all_users(local_login_t)
|
|||||||
userdom_search_all_users_home_content(local_login_t)
|
userdom_search_all_users_home_content(local_login_t)
|
||||||
userdom_use_unpriv_users_fds(local_login_t)
|
userdom_use_unpriv_users_fds(local_login_t)
|
||||||
userdom_sigchld_all_users(local_login_t)
|
userdom_sigchld_all_users(local_login_t)
|
||||||
|
userdom_create_all_users_keys(local_login_t)
|
||||||
|
|
||||||
# Search for mail spool file.
|
# Search for mail spool file.
|
||||||
mta_getattr_spool(local_login_t)
|
mta_getattr_spool(local_login_t)
|
||||||
|
@ -358,6 +358,24 @@ interface(`unconfined_dontaudit_rw_tcp_sockets',`
|
|||||||
dontaudit $1 unconfined_t:tcp_socket { read write };
|
dontaudit $1 unconfined_t:tcp_socket { read write };
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Create keys for the unconfined domain.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`unconfined_create_keys',`
|
||||||
|
gen_require(`
|
||||||
|
type unconfined_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 unconfined_t:key create;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Send messages to the unconfined domain over dbus.
|
## Send messages to the unconfined domain over dbus.
|
||||||
|
@ -4730,6 +4730,28 @@ interface(`userdom_sigchld_all_users',`
|
|||||||
allow $1 userdomain:process sigchld;
|
allow $1 userdomain:process sigchld;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Create keys for all user domains.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`userdom_create_all_users_keys',`
|
||||||
|
ifdef(`strict_policy',`
|
||||||
|
gen_require(`
|
||||||
|
attribute userdomain;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 userdomain:key create;
|
||||||
|
',`
|
||||||
|
unconfined_create_keys($1)
|
||||||
|
')
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Send a dbus message to all user domains.
|
## Send a dbus message to all user domains.
|
||||||
|
Loading…
Reference in New Issue
Block a user