1 |
blueness 11/02/05 20:41:05 |
2 |
|
3 |
Added: add-apps-mutt.patch add-apps-mutt-r1.patch |
4 |
Log: |
5 |
Bulk addition of new selinux policies. |
6 |
|
7 |
(Portage version: 2.1.9.25/cvs/Linux x86_64) |
8 |
|
9 |
Revision Changes Path |
10 |
1.1 sec-policy/selinux-mutt/files/add-apps-mutt.patch |
11 |
|
12 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sec-policy/selinux-mutt/files/add-apps-mutt.patch?rev=1.1&view=markup |
13 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sec-policy/selinux-mutt/files/add-apps-mutt.patch?rev=1.1&content-type=text/plain |
14 |
|
15 |
Index: add-apps-mutt.patch |
16 |
=================================================================== |
17 |
--- apps/mutt.te 1970-01-01 01:00:00.000000000 +0100 |
18 |
+++ apps/mutt.te 2011-01-22 15:22:46.330000061 +0100 |
19 |
@@ -0,0 +1,76 @@ |
20 |
+policy_module(mutt, 1.0.0) |
21 |
+ |
22 |
+############################ |
23 |
+# |
24 |
+# Declarations |
25 |
+# |
26 |
+ |
27 |
+type mutt_t; |
28 |
+type mutt_exec_t; |
29 |
+application_domain(mutt_t, mutt_exec_t) |
30 |
+ubac_constrained(mutt_t) |
31 |
+ |
32 |
+type mutt_home_t; |
33 |
+typealias mutt_home_t alias { user_mutt_home_t staff_mutt_home_t sysadm_mutt_home_t }; |
34 |
+userdom_user_home_content(mutt_home_t) |
35 |
+ |
36 |
+type mutt_conf_t; |
37 |
+typealias mutt_conf_t alias { user_mutt_conf_t staff_mutt_conf_t sysadm_mutt_conf_t }; |
38 |
+userdom_user_home_content(mutt_conf_t) |
39 |
+ |
40 |
+type mutt_sys_conf_t; |
41 |
+files_type(mutt_sys_conf_t) |
42 |
+ |
43 |
+type mutt_tmp_t; |
44 |
+typealias mutt_tmp_t alias { user_mutt_tmp_t staff_mutt_tmp_t sysadm_mutt_tmp_t }; |
45 |
+files_tmp_file(mutt_tmp_t) |
46 |
+ubac_constrained(mutt_tmp_t) |
47 |
+ |
48 |
+############################ |
49 |
+# |
50 |
+# Policy |
51 |
+# |
52 |
+ |
53 |
+allow mutt_t self:process signal_perms; |
54 |
+#allow mutt_t self:unix_stream_socket create_stream_socket_perms; |
55 |
+ |
56 |
+manage_dirs_pattern(mutt_t, mutt_home_t, mutt_home_t) |
57 |
+manage_files_pattern(mutt_t, mutt_home_t, mutt_home_t) |
58 |
+#manage_lnk_files_pattern(mutt_t, mutt_home_t, mutt_home_t) |
59 |
+#manage_sock_files_pattern(mutt_t, mutt_home_t, mutt_home_t) |
60 |
+#manage_fifo_files_pattern(mutt_t, mutt_home_t, mutt_home_t) |
61 |
+userdom_user_home_dir_filetrans(mutt_t, mutt_home_t, dir) |
62 |
+#manage_fifo_files_pattern(mutt_t, mutt_t, mutt_t) |
63 |
+ |
64 |
+manage_dirs_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t) |
65 |
+manage_files_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t) |
66 |
+manage_fifo_files_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t) |
67 |
+files_tmp_filetrans(mutt_t, mutt_tmp_t, { file dir }) |
68 |
+files_search_tmp(mutt_t) |
69 |
+ |
70 |
+read_files_pattern(mutt_t, mutt_sys_conf_t, mutt_sys_conf_t) |
71 |
+read_files_pattern(mutt_t, mutt_conf_t, mutt_conf_t) |
72 |
+search_dirs_pattern(mutt_t, mutt_sys_conf_t, mutt_sys_conf_t) |
73 |
+ |
74 |
+userdom_search_user_home_content(mutt_t) |
75 |
+userdom_manage_user_home_content_files(mutt_t) |
76 |
+userdom_manage_user_home_content_dirs(mutt_t) |
77 |
+ |
78 |
+corecmd_exec_bin(mutt_t) |
79 |
+corecmd_exec_shell(mutt_t) |
80 |
+files_read_usr_files(mutt_t) |
81 |
+ |
82 |
+domain_use_interactive_fds(mutt_t) |
83 |
+ |
84 |
+auth_use_nsswitch(mutt_t) |
85 |
+ |
86 |
+userdom_use_user_terminals(mutt_t) |
87 |
+ |
88 |
+corenet_tcp_connect_pop_port(mutt_t) |
89 |
+corenet_tcp_connect_smtp_port(mutt_t) |
90 |
+ |
91 |
+miscfiles_read_localization(mutt_t) |
92 |
+ |
93 |
+dev_read_rand(mutt_t) |
94 |
+dev_read_urand(mutt_t) |
95 |
+ |
96 |
--- apps/mutt.fc 1970-01-01 01:00:00.000000000 +0100 |
97 |
+++ apps/mutt.fc 2011-01-16 13:56:03.314000081 +0100 |
98 |
@@ -0,0 +1,4 @@ |
99 |
+/usr/bin/mutt -- gen_context(system_u:object_r:mutt_exec_t,s0) |
100 |
+HOME_DIR/\.mutt(/.*)? gen_context(system_u:object_r:mutt_home_t,s0) |
101 |
+HOME_DIR/\.muttrc -- gen_context(system_u:object_r:mutt_conf_t,s0) |
102 |
+/etc/mutt(/.*)? gen_context(system_u:object_r:mutt_sys_conf_t,s0) |
103 |
|
104 |
|
105 |
|
106 |
1.1 sec-policy/selinux-mutt/files/add-apps-mutt-r1.patch |
107 |
|
108 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sec-policy/selinux-mutt/files/add-apps-mutt-r1.patch?rev=1.1&view=markup |
109 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sec-policy/selinux-mutt/files/add-apps-mutt-r1.patch?rev=1.1&content-type=text/plain |
110 |
|
111 |
Index: add-apps-mutt-r1.patch |
112 |
=================================================================== |
113 |
--- apps/mutt.te 1970-01-01 01:00:00.000000000 +0100 |
114 |
+++ apps/mutt.te 2011-01-30 15:24:18.890000182 +0100 |
115 |
@@ -0,0 +1,74 @@ |
116 |
+policy_module(mutt, 1.0.0) |
117 |
+ |
118 |
+############################ |
119 |
+# |
120 |
+# Declarations |
121 |
+# |
122 |
+ |
123 |
+type mutt_t; |
124 |
+type mutt_exec_t; |
125 |
+application_domain(mutt_t, mutt_exec_t) |
126 |
+ubac_constrained(mutt_t) |
127 |
+ |
128 |
+type mutt_home_t; |
129 |
+typealias mutt_home_t alias { user_mutt_home_t staff_mutt_home_t sysadm_mutt_home_t }; |
130 |
+userdom_user_home_content(mutt_home_t) |
131 |
+ |
132 |
+type mutt_conf_t; |
133 |
+typealias mutt_conf_t alias { user_mutt_conf_t staff_mutt_conf_t sysadm_mutt_conf_t }; |
134 |
+userdom_user_home_content(mutt_conf_t) |
135 |
+ |
136 |
+type mutt_sys_conf_t; |
137 |
+files_type(mutt_sys_conf_t) |
138 |
+ |
139 |
+type mutt_tmp_t; |
140 |
+typealias mutt_tmp_t alias { user_mutt_tmp_t staff_mutt_tmp_t sysadm_mutt_tmp_t }; |
141 |
+files_tmp_file(mutt_tmp_t) |
142 |
+ubac_constrained(mutt_tmp_t) |
143 |
+ |
144 |
+############################ |
145 |
+# |
146 |
+# Local Policy Rules |
147 |
+# |
148 |
+ |
149 |
+allow mutt_t self:process signal_perms; |
150 |
+ |
151 |
+ |
152 |
+manage_dirs_pattern(mutt_t, mutt_home_t, mutt_home_t) |
153 |
+manage_files_pattern(mutt_t, mutt_home_t, mutt_home_t) |
154 |
+userdom_user_home_dir_filetrans(mutt_t, mutt_home_t, dir) |
155 |
+ |
156 |
+manage_dirs_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t) |
157 |
+manage_files_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t) |
158 |
+manage_fifo_files_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t) |
159 |
+files_tmp_filetrans(mutt_t, mutt_tmp_t, { file dir }) |
160 |
+files_search_tmp(mutt_t) |
161 |
+ |
162 |
+read_files_pattern(mutt_t, mutt_sys_conf_t, mutt_sys_conf_t) |
163 |
+read_files_pattern(mutt_t, mutt_conf_t, mutt_conf_t) |
164 |
+search_dirs_pattern(mutt_t, mutt_sys_conf_t, mutt_sys_conf_t) |
165 |
+ |
166 |
+ |
167 |
+corecmd_exec_bin(mutt_t) |
168 |
+corecmd_exec_shell(mutt_t) |
169 |
+corenet_tcp_connect_pop_port(mutt_t) |
170 |
+corenet_tcp_connect_smtp_port(mutt_t) |
171 |
+dev_read_rand(mutt_t) |
172 |
+dev_read_urand(mutt_t) |
173 |
+domain_use_interactive_fds(mutt_t) |
174 |
+files_read_usr_files(mutt_t) |
175 |
+ |
176 |
+ |
177 |
+auth_use_nsswitch(mutt_t) |
178 |
+miscfiles_read_localization(mutt_t) |
179 |
+userdom_manage_user_home_content_files(mutt_t) |
180 |
+userdom_manage_user_home_content_dirs(mutt_t) |
181 |
+userdom_search_user_home_content(mutt_t) |
182 |
+userdom_use_user_terminals(mutt_t) |
183 |
+ |
184 |
+ |
185 |
+ |
186 |
+ |
187 |
+tunable_policy(`gentoo_try_dontaudit',` |
188 |
+ kernel_dontaudit_search_sysctl(mutt_t) |
189 |
+') |
190 |
--- apps/mutt.fc 1970-01-01 01:00:00.000000000 +0100 |
191 |
+++ apps/mutt.fc 2011-01-16 13:56:03.314000081 +0100 |
192 |
@@ -0,0 +1,4 @@ |
193 |
+/usr/bin/mutt -- gen_context(system_u:object_r:mutt_exec_t,s0) |
194 |
+HOME_DIR/\.mutt(/.*)? gen_context(system_u:object_r:mutt_home_t,s0) |
195 |
+HOME_DIR/\.muttrc -- gen_context(system_u:object_r:mutt_conf_t,s0) |
196 |
+/etc/mutt(/.*)? gen_context(system_u:object_r:mutt_sys_conf_t,s0) |