summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2009-10-13X Object manager policy revisions to x_contexts.xselinuxEamon Walsh3-297/+30
Many of the specific event, extension, and property types have been removed for the time being. Polyinstantiation allows selections and properties to be separated in a different way, and new X server support for labeling individual extension requests (as opposed to entire extensions) should make the extension querying problem easier to solve in the future. Signed-off-by: Eamon Walsh <ewalsh@tycho.nsa.gov>
2009-10-13X Object Manager policy revisions to xserver.if.Eamon Walsh1-42/+63
This commit consists of two parts: 1. Revisions to xserver_object_types_template and xserver_common_x_domain_template. This reflects the dropping of many of the specific event, extension, and property types. 2. New interfaces: xserver_manage_core_devices: Gives control over core mouse/keyboard. xserver_unprotected: Allows all clients to access a domain's X objects. Modified interfaces: xserver_unconfined: Added x_domain typeattribute statement. Signed-off-by: Eamon Walsh <ewalsh@tycho.nsa.gov>
2009-10-13X Object Manager policy revisions to xserver.te.Eamon Walsh1-126/+157
This commit consists of three main parts: 1. Code movement. There were X object manager-related statements scattered somewhat throughout the file; these have been consolidated, which resulted in some other statements moving (e.g. iceauth_t). 2. Type changes. Many of the specific event, extension, and property types have been dropped for the time being. The rootwindow_t and remote_xclient_t types have been renamed, and a root_xcolormap_t type has been (re-)added. This is for naming consistency. An "xserver_unprotected" alias has been added for use in labeling clients whose resources should be globally accessible (e.g. xdm_t). 3. Policy changes. These are mostly related to devices, which now have separate x_keyboard and x_pointer classes. The "Hacks" section has been cleaned up, and various other classes have had the default permissions tweaked. Signed-off-by: Eamon Walsh <ewalsh@tycho.nsa.gov>
2009-10-13Make consolekit_t and system_dbusd_t unconfined in X.Eamon Walsh2-0/+3
Both of these types have been observed trying to touch the user's X display, one example being through /usr/libexec/ck-get-x11-server-pid and /usr/libexec/ck-get-x11-display-device. Signed-off-by: Eamon Walsh <ewalsh@tycho.nsa.gov>
2009-10-13Add a "prefix" parameter to xserver_role and xserver_restricted_role.Eamon Walsh6-123/+88
This is required to call xserver_object_types_template and xserver_common_x_domain_template from within these interfaces. Additionally, add a call to xserver_unconfined from within xserver_restricted_role. This causes the default user types to be unconfined as far as the X object manager is concerned. Only non-default types such as mozilla_t are now confined. Signed-off-by: Eamon Walsh <ewalsh@tycho.nsa.gov>
2009-10-13Add separate x_pointer and x_keyboard classes inheriting from x_device.Eamon Walsh2-21/+38
This is needed to allow more fine-grained control over X devices without using different types. Using different types is problematic because devices act as subjects in the X Flask implementation, and subjects cannot be labeled through a type transition (since the output role is hardcoded to object_r). Signed-off-by: Eamon Walsh <ewalsh@tycho.nsa.gov>
2009-10-07revise MCS constraints to use only MCS-specific attributes.Chris PeBenito3-12/+57
2009-09-28add seunshare from dan.Chris PeBenito4-0/+109
2009-09-17add dkim from stefan schulze frielinghaus.Chris PeBenito4-0/+43
2009-09-16add gnomeclock from dan.Chris PeBenito4-0/+115
2009-09-15add rtkit from dan.Chris PeBenito4-0/+77
2009-09-15clean up xscreensaver.Chris PeBenito4-25/+15
2009-09-15SELinux xscreensaver policy supportcorentin.labbe3-0/+87
Hello This a patch for adding xscreensaver policy. I think it need a specific policy because of the auth_domtrans_chk_passwd. cordially Signed-off-by: LABBE Corentin <corentin.labbe@geomatys.fr>
2009-09-14add modemmanager from dan.Chris PeBenito4-0/+82
2009-09-14add abrt from dan.Chris PeBenito4-0/+254
2009-09-09rearrange readahead rules.Chris PeBenito1-5/+6
2009-09-09readahead patch from dan.Chris PeBenito1-1/+3
2009-09-09nscd patch from dan.Chris PeBenito2-1/+20
2009-09-09cron patch from dan.Chris PeBenito3-47/+194
2009-09-09prelink patch from dan.Chris PeBenito2-1/+20
2009-09-08nslcd policy from dan.Chris PeBenito4-0/+158
2009-09-08term_write_all_terms() patch from Stefan Schulze FrielinghausChris PeBenito1-0/+23
2009-09-03add gitosis from miroslav grepl.Chris PeBenito4-0/+86
2009-09-03cpufreqselector patch from dan.Chris PeBenito1-2/+11
2009-09-03add an additional vmware host program.Chris PeBenito2-1/+2
2009-09-03screen patch from dan.Chris PeBenito2-12/+3
2009-09-03remove stale screen_dir_t referencesChris PeBenito1-5/+4
The screen_dir_t was made an alias of the screen_var_run_t type. Remove the remaining references to this type.
2009-09-03gpg patch from dan.Chris PeBenito2-4/+10
gpg sends sigstop and signull Reads usb devices Can encrypts users content in /tmp and the homedir, as well as on NFS and cifs
2009-09-02openvpn patch from dan: Openvpn connects to cache ports and stores files in ↵Chris PeBenito1-1/+12
nfs and cifs directories.
2009-09-02Webalizer does not list inotify, this was caused by leaked file descriptors ↵Chris PeBenito1-2/+2
in either dbus or cron. Both of which have been cleaned up.
2009-09-02add shorewall from dan.Chris PeBenito6-3/+230
2009-09-02add kdump from dan.Chris PeBenito4-0/+153
2009-09-01cdrecord patch from dan.Chris PeBenito1-2/+4
2009-09-01awstats patch from dan.Chris PeBenito1-1/+5
2009-09-01certwatch patch from dan.Chris PeBenito1-1/+2
2009-09-01mrtg patch from dan.Chris PeBenito1-1/+7
2009-09-01add hddtemp from dan.Chris PeBenito5-1/+83
2009-08-31add ptchown policy from dan.Chris PeBenito3-0/+52
2009-08-31pulseaudio patch from dan.Chris PeBenito2-3/+15
2009-08-31man page update from dan.Chris PeBenito2-7/+15
2009-08-31module version number bump for nscd patch.Chris PeBenito1-1/+1
2009-08-31nscd cache location changed from /var/db/nscd to /var/cache/nscdManoj Srivastava1-0/+1
The nscd policy module uses the old nscd cache location. The cache location changed with glibc 2.7-1, and the current nscd does place the files in /var/cache/nscd/. Signed-off-by: Manoj Srivastava <srivasta@debian.org>
2009-08-31kismet patch from dan.Chris PeBenito4-2/+38
2009-08-31module version number bump for tun patchesChris PeBenito5-5/+5
2009-08-31rename admin_tun_type to admindomain.Chris PeBenito2-5/+5
2009-08-31reorganize tun patch changes.Chris PeBenito4-50/+47
2009-08-31refpol: Policy for the new TUN driver access controlsPaul Moore8-0/+56
Add policy for the new TUN driver access controls which allow policy to control which domains have the ability to create and attach to TUN/TAP devices. The policy rules for creating and attaching to a device are as shown below: # create a new device allow domain_t self:tun_socket { create }; # attach to a persistent device (created by tunlbl_t) allow domain_t tunlbl_t:tun_socket { relabelfrom }; allow domain_t self:tun_socket { relabelto }; Further discussion can be found on this thread: * http://marc.info/?t=125080850900002&r=1&w=2 Signed-off-by: Paul Moore <paul.moore@hp.com>
2009-08-31refpol: Add the "tun_socket" object class flask definitionsPaul Moore2-0/+4
Add the new "tun_socket" class to the flask definitions. The "tun_socket" object class is used by the new TUN driver hooks which allow policy to control access to TUN/TAP devices. Signed-off-by: Paul Moore <paul.moore@hp.com>
2009-08-28patch from Eamon Walsh to remove useage of deprecated xserver interfaces.Chris PeBenito5-6/+6
2009-08-28deprecate userdom_xwindows_client_templateChris PeBenito5-30/+117
The X policy for users is currently split between userdom_xwindows_client_template() and xserver_role(). Deprecate the former and put the rules into the latter. For preserving restricted X roles (xguest), divide the rules into xserver_restricted_role() and xserver_role().