1 |
commit: 0a049992e4cf60f3aa33ec665a5d7df5b0b573e1 |
2 |
Author: David Graziano <david.graziano <AT> rockwellcollins <DOT> com> |
3 |
AuthorDate: Mon Oct 9 20:42:59 2017 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Sun Oct 29 12:59:08 2017 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=0a049992 |
7 |
|
8 |
system/ipsec: Add signull access for strongSwan |
9 |
|
10 |
Allows ipsec_supervisor_t domain to signull other |
11 |
strongSwan domains. |
12 |
|
13 |
Signed-off-by: David Graziano <david.graziano <AT> rockwellcollins.com> |
14 |
|
15 |
policy/modules/system/ipsec.te | 4 ++-- |
16 |
1 file changed, 2 insertions(+), 2 deletions(-) |
17 |
|
18 |
diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te |
19 |
index b9b723e9..75f69b5b 100644 |
20 |
--- a/policy/modules/system/ipsec.te |
21 |
+++ b/policy/modules/system/ipsec.te |
22 |
@@ -461,7 +461,7 @@ userdom_use_user_terminals(setkey_t) |
23 |
# |
24 |
|
25 |
allow ipsec_supervisor_t self:capability { dac_override dac_read_search kill net_admin }; |
26 |
-allow ipsec_supervisor_t self:process { signal }; |
27 |
+allow ipsec_supervisor_t self:process { signal signull }; |
28 |
allow ipsec_supervisor_t self:fifo_file rw_fifo_file_perms; |
29 |
allow ipsec_supervisor_t self:netlink_route_socket rw_netlink_socket_perms; |
30 |
allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms; |
31 |
@@ -472,7 +472,7 @@ read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t); |
32 |
manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t) |
33 |
|
34 |
allow ipsec_supervisor_t ipsec_t:unix_stream_socket { connectto }; |
35 |
-allow ipsec_supervisor_t ipsec_t:process { signal }; |
36 |
+allow ipsec_supervisor_t ipsec_t:process { signal signull }; |
37 |
|
38 |
allow ipsec_supervisor_t ipsec_var_run_t:sock_file { rw_sock_file_perms unlink }; |
39 |
manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t) |