Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/
Date: Sun, 29 Oct 2017 20:43:01
Message-Id: 1509281948.0a049992e4cf60f3aa33ec665a5d7df5b0b573e1.perfinion@gentoo
1 commit: 0a049992e4cf60f3aa33ec665a5d7df5b0b573e1
2 Author: David Graziano <david.graziano <AT> rockwellcollins <DOT> com>
3 AuthorDate: Mon Oct 9 20:42:59 2017 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Sun Oct 29 12:59:08 2017 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=0a049992
7
8 system/ipsec: Add signull access for strongSwan
9
10 Allows ipsec_supervisor_t domain to signull other
11 strongSwan domains.
12
13 Signed-off-by: David Graziano <david.graziano <AT> rockwellcollins.com>
14
15 policy/modules/system/ipsec.te | 4 ++--
16 1 file changed, 2 insertions(+), 2 deletions(-)
17
18 diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te
19 index b9b723e9..75f69b5b 100644
20 --- a/policy/modules/system/ipsec.te
21 +++ b/policy/modules/system/ipsec.te
22 @@ -461,7 +461,7 @@ userdom_use_user_terminals(setkey_t)
23 #
24
25 allow ipsec_supervisor_t self:capability { dac_override dac_read_search kill net_admin };
26 -allow ipsec_supervisor_t self:process { signal };
27 +allow ipsec_supervisor_t self:process { signal signull };
28 allow ipsec_supervisor_t self:fifo_file rw_fifo_file_perms;
29 allow ipsec_supervisor_t self:netlink_route_socket rw_netlink_socket_perms;
30 allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms;
31 @@ -472,7 +472,7 @@ read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t);
32 manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t)
33
34 allow ipsec_supervisor_t ipsec_t:unix_stream_socket { connectto };
35 -allow ipsec_supervisor_t ipsec_t:process { signal };
36 +allow ipsec_supervisor_t ipsec_t:process { signal signull };
37
38 allow ipsec_supervisor_t ipsec_var_run_t:sock_file { rw_sock_file_perms unlink };
39 manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)