* Some disable_trans stuff was missed in selinux-policy update
@ 2007-03-26 15:37 Daniel J Walsh
2007-04-02 13:56 ` Christopher J. PeBenito
0 siblings, 1 reply; 2+ messages in thread
From: Daniel J Walsh @ 2007-03-26 15:37 UTC (permalink / raw)
To: Christopher J. PeBenito, SE Linux
[-- Attachment #1: Type: text/plain, Size: 32 bytes --]
Mainly man pages and http, ppp.
[-- Attachment #2: disable_trans.patch --]
[-- Type: text/x-patch, Size: 12793 bytes --]
--- nsaserefpolicy/man/man8/ftpd_selinux.8 2006-11-16 17:15:28.000000000 -0500
+++ serefpolicy-2.5.11/man/man8/ftpd_selinux.8 2007-03-26 11:09:16.000000000 -0400
@@ -39,14 +39,10 @@
ftpd can run either as a standalone daemon or as part of the xinetd domain. If you want to run ftpd as a daemon you must set the ftpd_is_daemon boolean.
.TP
setsebool -P ftpd_is_daemon 1
-.TP
-You can disable SELinux protection for the ftpd daemon by executing:
-.TP
-setsebool -P ftpd_disable_trans 1
.br
service vsftpd restart
.TP
-system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
+system-config-selinux is a GUI tool available to customize SELinux policy settings.
.SH AUTHOR
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
--- nsaserefpolicy/man/man8/httpd_selinux.8 2007-02-19 11:32:55.000000000 -0500
+++ serefpolicy-2.5.11/man/man8/httpd_selinux.8 2007-03-26 11:09:16.000000000 -0400
@@ -110,22 +110,7 @@
.EE
.PP
-You can disable suexec transition, set httpd_suexec_disable_trans deny this
-
-.EX
-setsebool -P httpd_suexec_disable_trans 1
-.EE
-
-.PP
-You can disable SELinux protection for the httpd daemon by executing:
-
-.EX
-setsebool -P httpd_disable_trans 1
-service httpd restart
-.EE
-
-.PP
-system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
+system-config-selinux is a GUI tool available to customize SELinux policy settings.
.SH AUTHOR
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
--- nsaserefpolicy/man/man8/kerberos_selinux.8 2007-02-26 14:42:44.000000000 -0500
+++ serefpolicy-2.5.11/man/man8/kerberos_selinux.8 2007-03-26 11:09:16.000000000 -0400
@@ -18,16 +18,9 @@
You must set the allow_kerberos boolean to allow your system to work properly in a Kerberos environment.
.EX
setsebool -P allow_kerberos 1
-.EE
-If you are running Kerberos daemons kadmind or krb5kdc you can disable the SELinux protection on these daemons by setting the krb5kdc_disable_trans and kadmind_disable_trans booleans.
-.EX
-setsebool -P krb5kdc_disable_trans 1
-service krb5kdc restart
-setsebool -P kadmind_disable_trans 1
-service kadmind restart
.EE
.PP
-system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
+system-config-selinux is a GUI tool available to customize SELinux policy settings.
.SH AUTHOR
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
--- nsaserefpolicy/man/man8/named_selinux.8 2007-02-19 11:32:55.000000000 -0500
+++ serefpolicy-2.5.11/man/man8/named_selinux.8 2007-03-26 11:09:16.000000000 -0400
@@ -20,13 +20,7 @@
setsebool -P named_write_master_zones 1
.EE
.PP
-You can disable SELinux protection for the named daemon by executing:
-.EX
-setsebool -P named_disable_trans 1
-service named restart
-.EE
-.PP
-system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
+system-config-selinux is a GUI tool available to customize SELinux policy settings.
.SH AUTHOR
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
--- nsaserefpolicy/man/man8/nfs_selinux.8 2006-11-16 17:15:28.000000000 -0500
+++ serefpolicy-2.5.11/man/man8/nfs_selinux.8 2007-03-26 11:09:16.000000000 -0400
@@ -22,7 +22,7 @@
.TP
setsebool -P use_nfs_home_dirs 1
.TP
-system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
+system-config-selinux is a GUI tool available to customize SELinux policy settings.
.SH AUTHOR
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
--- nsaserefpolicy/man/man8/rsync_selinux.8 2007-02-19 11:32:55.000000000 -0500
+++ serefpolicy-2.5.11/man/man8/rsync_selinux.8 2007-03-26 11:09:16.000000000 -0400
@@ -36,13 +36,7 @@
.SH BOOLEANS
.TP
-You can disable SELinux protection for the rsync daemon by executing:
-.EX
-setsebool -P rsync_disable_trans 1
-service xinetd restart
-.EE
-.TP
-system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
+system-config-selinux is a GUI tool available to customize SELinux policy settings.
.SH AUTHOR
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
--- nsaserefpolicy/man/man8/samba_selinux.8 2006-11-16 17:15:28.000000000 -0500
+++ serefpolicy-2.5.11/man/man8/samba_selinux.8 2007-03-26 11:09:16.000000000 -0400
@@ -41,17 +41,7 @@
setsebool -P use_samba_home_dirs 1
.TP
-You can disable SELinux protection for the samba daemon by executing:
-.br
-
-setsebool -P smbd_disable_trans 1
-.br
-service smb restart
-.TP
-system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
-
-
-
+system-config-selinux is a GUI tool available to customize SELinux policy settings.
.SH AUTHOR
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
--- nsaserefpolicy/man/man8/ypbind_selinux.8 2006-11-16 17:15:28.000000000 -0500
+++ serefpolicy-2.5.11/man/man8/ypbind_selinux.8 2007-03-26 11:09:16.000000000 -0400
@@ -11,7 +11,7 @@
.TP
setsebool -P allow_ypbind 1
.TP
-system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
+system-config-selinux is a GUI tool available to customize SELinux policy settings.
.SH AUTHOR
This manual page was written by Dan Walsh <dwalsh@redhat.com>.
--- nsaserefpolicy/policy/modules/services/apache.fc 2007-02-23 16:50:01.000000000 -0500
+++ serefpolicy-2.5.11/policy/modules/services/apache.fc 2007-03-26 11:09:17.000000000 -0400
@@ -1,10 +1,5 @@
# temporary hack till genhomedircon is fixed
-ifdef(`targeted_policy',`
-HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
-',`
HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_ROLE_content_t,s0)
-')
-
/etc/apache(2)?(/.*)? gen_context(system_u:object_r:httpd_config_t,s0)
/etc/apache-ssl(2)?(/.*)? gen_context(system_u:object_r:httpd_config_t,s0)
/etc/htdig(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
@@ -21,7 +16,6 @@
/usr/lib/apache-ssl/.+ -- gen_context(system_u:object_r:httpd_exec_t,s0)
/usr/lib/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
-/usr/lib/squid/cachemgr\.cgi -- gen_context(system_u:object_r:httpd_exec_t,s0)
/usr/lib(64)?/apache(/.*)? gen_context(system_u:object_r:httpd_modules_t,s0)
/usr/lib(64)?/apache2/modules(/.*)? gen_context(system_u:object_r:httpd_modules_t,s0)
/usr/lib(64)?/apache(2)?/suexec(2)? -- gen_context(system_u:object_r:httpd_suexec_exec_t,s0)
@@ -78,3 +72,11 @@
/var/www/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
/var/www/icons(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
/var/www/perl(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
+
+#Bugzilla file context
+/usr/share/bugzilla(/.*)? -d gen_context(system_u:object_r:httpd_bugzilla_content_t,s0)
+/usr/share/bugzilla(/.*)? -- gen_context(system_u:object_r:httpd_bugzilla_script_exec_t,s0)
+/var/lib/bugzilla(/.*)? gen_context(system_u:object_r:httpd_bugzilla_script_rw_t,s0)
+#viewvc file context
+/var/spool/viewvc(/.*)? gen_context(system_u:object_r:httpd_sys_script_rw_t, s0)
+
--- nsaserefpolicy/policy/modules/services/apache.if 2007-03-26 10:39:04.000000000 -0400
+++ serefpolicy-2.5.11/policy/modules/services/apache.if 2007-03-26 11:09:17.000000000 -0400
@@ -268,6 +268,9 @@
')
apache_content_template($1)
+ manage_dirs_pattern($1_t,httpd_$1_content_t,httpd_$1_content_t)
+ manage_files_pattern($1_t,httpd_$1_content_t,httpd_$1_content_t)
+ manage_lnk_files_pattern($1_t,httpd_$1_content_t,httpd_$1_content_t)
typeattribute httpd_$1_content_t httpd_script_domains;
userdom_user_home_content($1,httpd_$1_content_t)
@@ -434,6 +437,24 @@
########################################
## <summary>
+## getattr apache.process
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`apache_getattr',`
+ gen_require(`
+ type httpd_t;
+ ')
+
+ allow $1 httpd_t:process getattr;
+')
+
+########################################
+## <summary>
## Inherit and use file descriptors from Apache.
## </summary>
## <param name="domain">
@@ -752,6 +773,7 @@
')
allow $1 httpd_modules_t:dir list_dir_perms;
+ read_lnk_files_pattern($1,httpd_modules_t,httpd_modules_t)
')
########################################
@@ -1000,3 +1022,140 @@
allow $1 httpd_sys_script_t:dir search_dir_perms;
')
+
+########################################
+## <summary>
+## Allow the specified domain to manage
+## apache modules.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`apache_manage_modules',`
+ gen_require(`
+ type httpd_modules_t;
+ ')
+
+ manage_dirs_pattern($1,httpd_modules_t,httpd_modules_t)
+ manage_files_pattern($1,httpd_modules_t,httpd_modules_t)
+ manage_lnk_files_pattern($1,httpd_modules_t,httpd_modules_t)
+')
+
+########################################
+## <summary>
+## Allow the specified domain to create
+## apache lock file
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`apache_manage_lock',`
+ gen_require(`
+ type httpd_lock_t;
+ ')
+ allow $1 httpd_lock_t:file manage_file_perms;
+ files_lock_filetrans($1, httpd_lock_t, file)
+')
+
+########################################
+## <summary>
+## Allow the specified domain to manage
+## apache pid file
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`apache_manage_pid',`
+ gen_require(`
+ type httpd_var_run_t;
+ ')
+ manage_files_pattern($1,httpd_var_run_t,httpd_var_run_t)
+ files_pid_filetrans($1,httpd_var_run_t, file)
+')
+
+########################################
+## <summary>
+##f Read apache system state
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+#
+interface(`apache_read_state',`
+ gen_require(`
+ type httpd_t;
+ ')
+ kernel_search_proc($1)
+ allow $1 httpd_t:dir list_dir_perms;
+ read_files_pattern($1,httpd_t,httpd_t)
+ read_lnk_files_pattern($1,httpd_t,httpd_t)
+ dontaudit $1 httpd_t:process ptrace;
+')
+
+########################################
+## <summary>
+##f allow domain to signal apache
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+#
+interface(`apache_signal',`
+ gen_require(`
+ type httpd_t;
+ ')
+ allow $1 httpd_t:process signal;
+')
+
+########################################
+## <summary>
+## allow domain to relabel apache content
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+#
+interface(`apache_relabel',`
+ gen_require(`
+ attribute httpdcontent;
+ attribute httpd_script_exec_type;
+ ')
+
+ allow $1 { httpd_script_exec_type httpdcontent}:dir { relabelto relabelfrom };
+ allow $1 { httpd_script_exec_type httpdcontent}:file { relabelto relabelfrom };
+')
+
+########################################
+## <summary>
+## Allow the specified domain to search
+## apache bugzilla directories.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`apache_search_bugzilla_dirs',`
+ gen_require(`
+ type httpd_bugzilla_content_t;
+ ')
+
+ allow $1 httpd_bugzilla_content_t:dir search_dir_perms;
+')
+
--- nsaserefpolicy/policy/modules/services/apache.te 2007-03-26 10:39:04.000000000 -0400
+++ serefpolicy-2.5.11/policy/modules/services/apache.te 2007-03-26 11:09:54.000000000 -0400
@@ -507,13 +520,7 @@
allow httpd_suexec_t self:unix_stream_socket create_stream_socket_perms;
allow httpd_suexec_t self:netlink_route_socket r_netlink_socket_perms;
-ifdef(`targeted_policy',`
- gen_tunable(httpd_suexec_disable_trans,false)
-
- tunable_policy(`httpd_suexec_disable_trans',`',`
- domtrans_pattern(httpd_t, httpd_suexec_exec_t, httpd_suexec_t)
- ')
-')
+domtrans_pattern(httpd_t, httpd_suexec_exec_t, httpd_suexec_t)
create_files_pattern(httpd_suexec_t,httpd_log_t,httpd_log_t)
append_files_pattern(httpd_suexec_t,httpd_log_t,httpd_log_t)
--- nsaserefpolicy/policy/modules/services/ppp.te 2007-03-26 10:39:04.000000000 -0400
+++ serefpolicy-2.5.11/policy/modules/services/ppp.te 2007-03-26 11:09:55.000000000 -0400
@@ -173,19 +173,10 @@
term_dontaudit_use_generic_ptys(pppd_t)
files_dontaudit_read_root_files(pppd_t)
- optional_policy(`
- gen_require(`
- bool postfix_disable_trans;
- ')
-
- if(!postfix_disable_trans) {
- postfix_domtrans_master(pppd_t)
- }
- ')
-',`
- optional_policy(`
- postfix_domtrans_master(pppd_t)
- ')
+')
+
+optional_policy(`
+ postfix_domtrans_master(pppd_t)
')
optional_policy(`
^ permalink raw reply [flat|nested] 2+ messages in thread* Re: Some disable_trans stuff was missed in selinux-policy update
2007-03-26 15:37 Some disable_trans stuff was missed in selinux-policy update Daniel J Walsh
@ 2007-04-02 13:56 ` Christopher J. PeBenito
0 siblings, 0 replies; 2+ messages in thread
From: Christopher J. PeBenito @ 2007-04-02 13:56 UTC (permalink / raw)
To: Daniel J Walsh; +Cc: SE Linux
On Mon, 2007-03-26 at 11:37 -0400, Daniel J Walsh wrote:
> Mainly man pages and http, ppp.
Applied man page fixes. The stray disable_trans pieces were fixed by
the time you posted the patch.
>
>
>
>
>
>
> differences
> between files
> attachment
> (disable_trans.patch), "disable_trans.patch"
>
> --- nsaserefpolicy/man/man8/ftpd_selinux.8 2006-11-16 17:15:28.000000000 -0500
> +++ serefpolicy-2.5.11/man/man8/ftpd_selinux.8 2007-03-26 11:09:16.000000000 -0400
> @@ -39,14 +39,10 @@
> ftpd can run either as a standalone daemon or as part of the xinetd domain. If you want to run ftpd as a daemon you must set the ftpd_is_daemon boolean.
> .TP
> setsebool -P ftpd_is_daemon 1
> -.TP
> -You can disable SELinux protection for the ftpd daemon by executing:
> -.TP
> -setsebool -P ftpd_disable_trans 1
> .br
> service vsftpd restart
> .TP
> -system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
> +system-config-selinux is a GUI tool available to customize SELinux policy settings.
> .SH AUTHOR
> This manual page was written by Dan Walsh <dwalsh@redhat.com>.
>
> --- nsaserefpolicy/man/man8/httpd_selinux.8 2007-02-19 11:32:55.000000000 -0500
> +++ serefpolicy-2.5.11/man/man8/httpd_selinux.8 2007-03-26 11:09:16.000000000 -0400
> @@ -110,22 +110,7 @@
> .EE
>
> .PP
> -You can disable suexec transition, set httpd_suexec_disable_trans deny this
> -
> -.EX
> -setsebool -P httpd_suexec_disable_trans 1
> -.EE
> -
> -.PP
> -You can disable SELinux protection for the httpd daemon by executing:
> -
> -.EX
> -setsebool -P httpd_disable_trans 1
> -service httpd restart
> -.EE
> -
> -.PP
> -system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
> +system-config-selinux is a GUI tool available to customize SELinux policy settings.
> .SH AUTHOR
> This manual page was written by Dan Walsh <dwalsh@redhat.com>.
>
> --- nsaserefpolicy/man/man8/kerberos_selinux.8 2007-02-26 14:42:44.000000000 -0500
> +++ serefpolicy-2.5.11/man/man8/kerberos_selinux.8 2007-03-26 11:09:16.000000000 -0400
> @@ -18,16 +18,9 @@
> You must set the allow_kerberos boolean to allow your system to work properly in a Kerberos environment.
> .EX
> setsebool -P allow_kerberos 1
> -.EE
> -If you are running Kerberos daemons kadmind or krb5kdc you can disable the SELinux protection on these daemons by setting the krb5kdc_disable_trans and kadmind_disable_trans booleans.
> -.EX
> -setsebool -P krb5kdc_disable_trans 1
> -service krb5kdc restart
> -setsebool -P kadmind_disable_trans 1
> -service kadmind restart
> .EE
> .PP
> -system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
> +system-config-selinux is a GUI tool available to customize SELinux policy settings.
> .SH AUTHOR
> This manual page was written by Dan Walsh <dwalsh@redhat.com>.
>
> --- nsaserefpolicy/man/man8/named_selinux.8 2007-02-19 11:32:55.000000000 -0500
> +++ serefpolicy-2.5.11/man/man8/named_selinux.8 2007-03-26 11:09:16.000000000 -0400
> @@ -20,13 +20,7 @@
> setsebool -P named_write_master_zones 1
> .EE
> .PP
> -You can disable SELinux protection for the named daemon by executing:
> -.EX
> -setsebool -P named_disable_trans 1
> -service named restart
> -.EE
> -.PP
> -system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
> +system-config-selinux is a GUI tool available to customize SELinux policy settings.
> .SH AUTHOR
> This manual page was written by Dan Walsh <dwalsh@redhat.com>.
>
> --- nsaserefpolicy/man/man8/nfs_selinux.8 2006-11-16 17:15:28.000000000 -0500
> +++ serefpolicy-2.5.11/man/man8/nfs_selinux.8 2007-03-26 11:09:16.000000000 -0400
> @@ -22,7 +22,7 @@
> .TP
> setsebool -P use_nfs_home_dirs 1
> .TP
> -system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
> +system-config-selinux is a GUI tool available to customize SELinux policy settings.
> .SH AUTHOR
> This manual page was written by Dan Walsh <dwalsh@redhat.com>.
>
> --- nsaserefpolicy/man/man8/rsync_selinux.8 2007-02-19 11:32:55.000000000 -0500
> +++ serefpolicy-2.5.11/man/man8/rsync_selinux.8 2007-03-26 11:09:16.000000000 -0400
> @@ -36,13 +36,7 @@
>
> .SH BOOLEANS
> .TP
> -You can disable SELinux protection for the rsync daemon by executing:
> -.EX
> -setsebool -P rsync_disable_trans 1
> -service xinetd restart
> -.EE
> -.TP
> -system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
> +system-config-selinux is a GUI tool available to customize SELinux policy settings.
> .SH AUTHOR
> This manual page was written by Dan Walsh <dwalsh@redhat.com>.
>
> --- nsaserefpolicy/man/man8/samba_selinux.8 2006-11-16 17:15:28.000000000 -0500
> +++ serefpolicy-2.5.11/man/man8/samba_selinux.8 2007-03-26 11:09:16.000000000 -0400
> @@ -41,17 +41,7 @@
>
> setsebool -P use_samba_home_dirs 1
> .TP
> -You can disable SELinux protection for the samba daemon by executing:
> -.br
> -
> -setsebool -P smbd_disable_trans 1
> -.br
> -service smb restart
> -.TP
> -system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
> -
> -
> -
> +system-config-selinux is a GUI tool available to customize SELinux policy settings.
>
> .SH AUTHOR
> This manual page was written by Dan Walsh <dwalsh@redhat.com>.
> --- nsaserefpolicy/man/man8/ypbind_selinux.8 2006-11-16 17:15:28.000000000 -0500
> +++ serefpolicy-2.5.11/man/man8/ypbind_selinux.8 2007-03-26 11:09:16.000000000 -0400
> @@ -11,7 +11,7 @@
> .TP
> setsebool -P allow_ypbind 1
> .TP
> -system-config-securitylevel is a GUI tool available to customize SELinux policy settings.
> +system-config-selinux is a GUI tool available to customize SELinux policy settings.
> .SH AUTHOR
> This manual page was written by Dan Walsh <dwalsh@redhat.com>.
>
> --- nsaserefpolicy/policy/modules/services/apache.fc 2007-02-23 16:50:01.000000000 -0500
> +++ serefpolicy-2.5.11/policy/modules/services/apache.fc 2007-03-26 11:09:17.000000000 -0400
> @@ -1,10 +1,5 @@
> # temporary hack till genhomedircon is fixed
> -ifdef(`targeted_policy',`
> -HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
> -',`
> HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_ROLE_content_t,s0)
> -')
> -
> /etc/apache(2)?(/.*)? gen_context(system_u:object_r:httpd_config_t,s0)
> /etc/apache-ssl(2)?(/.*)? gen_context(system_u:object_r:httpd_config_t,s0)
> /etc/htdig(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
> @@ -21,7 +16,6 @@
>
> /usr/lib/apache-ssl/.+ -- gen_context(system_u:object_r:httpd_exec_t,s0)
> /usr/lib/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
> -/usr/lib/squid/cachemgr\.cgi -- gen_context(system_u:object_r:httpd_exec_t,s0)
> /usr/lib(64)?/apache(/.*)? gen_context(system_u:object_r:httpd_modules_t,s0)
> /usr/lib(64)?/apache2/modules(/.*)? gen_context(system_u:object_r:httpd_modules_t,s0)
> /usr/lib(64)?/apache(2)?/suexec(2)? -- gen_context(system_u:object_r:httpd_suexec_exec_t,s0)
> @@ -78,3 +72,11 @@
> /var/www/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
> /var/www/icons(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
> /var/www/perl(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
> +
> +#Bugzilla file context
> +/usr/share/bugzilla(/.*)? -d gen_context(system_u:object_r:httpd_bugzilla_content_t,s0)
> +/usr/share/bugzilla(/.*)? -- gen_context(system_u:object_r:httpd_bugzilla_script_exec_t,s0)
> +/var/lib/bugzilla(/.*)? gen_context(system_u:object_r:httpd_bugzilla_script_rw_t,s0)
> +#viewvc file context
> +/var/spool/viewvc(/.*)? gen_context(system_u:object_r:httpd_sys_script_rw_t, s0)
> +
> --- nsaserefpolicy/policy/modules/services/apache.if 2007-03-26 10:39:04.000000000 -0400
> +++ serefpolicy-2.5.11/policy/modules/services/apache.if 2007-03-26 11:09:17.000000000 -0400
> @@ -268,6 +268,9 @@
> ')
>
> apache_content_template($1)
> + manage_dirs_pattern($1_t,httpd_$1_content_t,httpd_$1_content_t)
> + manage_files_pattern($1_t,httpd_$1_content_t,httpd_$1_content_t)
> + manage_lnk_files_pattern($1_t,httpd_$1_content_t,httpd_$1_content_t)
>
> typeattribute httpd_$1_content_t httpd_script_domains;
> userdom_user_home_content($1,httpd_$1_content_t)
> @@ -434,6 +437,24 @@
>
> ########################################
> ## <summary>
> +## getattr apache.process
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +#
> +interface(`apache_getattr',`
> + gen_require(`
> + type httpd_t;
> + ')
> +
> + allow $1 httpd_t:process getattr;
> +')
> +
> +########################################
> +## <summary>
> ## Inherit and use file descriptors from Apache.
> ## </summary>
> ## <param name="domain">
> @@ -752,6 +773,7 @@
> ')
>
> allow $1 httpd_modules_t:dir list_dir_perms;
> + read_lnk_files_pattern($1,httpd_modules_t,httpd_modules_t)
> ')
>
> ########################################
> @@ -1000,3 +1022,140 @@
>
> allow $1 httpd_sys_script_t:dir search_dir_perms;
> ')
> +
> +########################################
> +## <summary>
> +## Allow the specified domain to manage
> +## apache modules.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +#
> +interface(`apache_manage_modules',`
> + gen_require(`
> + type httpd_modules_t;
> + ')
> +
> + manage_dirs_pattern($1,httpd_modules_t,httpd_modules_t)
> + manage_files_pattern($1,httpd_modules_t,httpd_modules_t)
> + manage_lnk_files_pattern($1,httpd_modules_t,httpd_modules_t)
> +')
> +
> +########################################
> +## <summary>
> +## Allow the specified domain to create
> +## apache lock file
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +#
> +interface(`apache_manage_lock',`
> + gen_require(`
> + type httpd_lock_t;
> + ')
> + allow $1 httpd_lock_t:file manage_file_perms;
> + files_lock_filetrans($1, httpd_lock_t, file)
> +')
> +
> +########################################
> +## <summary>
> +## Allow the specified domain to manage
> +## apache pid file
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +#
> +interface(`apache_manage_pid',`
> + gen_require(`
> + type httpd_var_run_t;
> + ')
> + manage_files_pattern($1,httpd_var_run_t,httpd_var_run_t)
> + files_pid_filetrans($1,httpd_var_run_t, file)
> +')
> +
> +########################################
> +## <summary>
> +##f Read apache system state
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain to not audit.
> +## </summary>
> +## </param>
> +#
> +interface(`apache_read_state',`
> + gen_require(`
> + type httpd_t;
> + ')
> + kernel_search_proc($1)
> + allow $1 httpd_t:dir list_dir_perms;
> + read_files_pattern($1,httpd_t,httpd_t)
> + read_lnk_files_pattern($1,httpd_t,httpd_t)
> + dontaudit $1 httpd_t:process ptrace;
> +')
> +
> +########################################
> +## <summary>
> +##f allow domain to signal apache
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain to not audit.
> +## </summary>
> +## </param>
> +#
> +interface(`apache_signal',`
> + gen_require(`
> + type httpd_t;
> + ')
> + allow $1 httpd_t:process signal;
> +')
> +
> +########################################
> +## <summary>
> +## allow domain to relabel apache content
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain to not audit.
> +## </summary>
> +## </param>
> +#
> +interface(`apache_relabel',`
> + gen_require(`
> + attribute httpdcontent;
> + attribute httpd_script_exec_type;
> + ')
> +
> + allow $1 { httpd_script_exec_type httpdcontent}:dir { relabelto relabelfrom };
> + allow $1 { httpd_script_exec_type httpdcontent}:file { relabelto relabelfrom };
> +')
> +
> +########################################
> +## <summary>
> +## Allow the specified domain to search
> +## apache bugzilla directories.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +#
> +interface(`apache_search_bugzilla_dirs',`
> + gen_require(`
> + type httpd_bugzilla_content_t;
> + ')
> +
> + allow $1 httpd_bugzilla_content_t:dir search_dir_perms;
> +')
> +
> --- nsaserefpolicy/policy/modules/services/apache.te 2007-03-26 10:39:04.000000000 -0400
> +++ serefpolicy-2.5.11/policy/modules/services/apache.te 2007-03-26 11:09:54.000000000 -0400
> @@ -507,13 +520,7 @@
> allow httpd_suexec_t self:unix_stream_socket create_stream_socket_perms;
> allow httpd_suexec_t self:netlink_route_socket r_netlink_socket_perms;
>
> -ifdef(`targeted_policy',`
> - gen_tunable(httpd_suexec_disable_trans,false)
> -
> - tunable_policy(`httpd_suexec_disable_trans',`',`
> - domtrans_pattern(httpd_t, httpd_suexec_exec_t, httpd_suexec_t)
> - ')
> -')
> +domtrans_pattern(httpd_t, httpd_suexec_exec_t, httpd_suexec_t)
>
> create_files_pattern(httpd_suexec_t,httpd_log_t,httpd_log_t)
> append_files_pattern(httpd_suexec_t,httpd_log_t,httpd_log_t)
> --- nsaserefpolicy/policy/modules/services/ppp.te 2007-03-26 10:39:04.000000000 -0400
> +++ serefpolicy-2.5.11/policy/modules/services/ppp.te 2007-03-26 11:09:55.000000000 -0400
> @@ -173,19 +173,10 @@
> term_dontaudit_use_generic_ptys(pppd_t)
> files_dontaudit_read_root_files(pppd_t)
>
> - optional_policy(`
> - gen_require(`
> - bool postfix_disable_trans;
> - ')
> -
> - if(!postfix_disable_trans) {
> - postfix_domtrans_master(pppd_t)
> - }
> - ')
> -',`
> - optional_policy(`
> - postfix_domtrans_master(pppd_t)
> - ')
> +')
> +
> +optional_policy(`
> + postfix_domtrans_master(pppd_t)
> ')
>
> optional_policy(`
>
--
Chris PeBenito
Tresys Technology, LLC
(410) 290-1411 x150
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2007-04-02 13:55 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-03-26 15:37 Some disable_trans stuff was missed in selinux-policy update Daniel J Walsh
2007-04-02 13:56 ` Christopher J. PeBenito
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.