additions to strict policy

Richard Hally rhallyx at mindspring.com
Tue Jun 29 06:14:17 UTC 2004


Below (and as an attached file) are some policy allow rules to be added 
to the strict policy.
These allow rules were developed by running the latest /devel tree using 
selinux-policy-strict-sources-1.13.10-3 and putting the resulting avc 
denied messages through audit2allow.
Most are necessary to perform normal operations while in  enforcing mode.
Some of the rules marked "#from booting" may be candidates for dontaudit 
rules.

Thanks for the help,
Richard Hally

#from " logrotate -f /etc/logrotate.conf" while root(sysadm_r)
allow logrotate_t devpts_t:dir { search };
allow logrotate_t initrc_t:process { transition };
allow logrotate_t mysqld_log_t:file { execute };
allow logrotate_t mysqld_log_t:file { execute_no_trans };
allow logrotate_t privoxy_log_t:file { execute };
allow logrotate_t privoxy_log_t:file { execute_no_trans };
allow logrotate_t selinux_config_t:dir { search };
allow logrotate_t selinux_config_t:file { getattr read };
allow logrotate_t staff_home_dir_t:dir { read search };
allow logrotate_t var_t:file { getattr };
allow logrotate_t var_t:file { read };
 
# from booting
allow lvm_t file_t:dir { getattr read };
allow mount_t ptmx_t:chr_file { read write };
allow mount_t rhgb_gph_t:fd { use };
allow mount_t rhgb_t:unix_stream_socket { read write };
allow rhgb_t staff_home_dir_t:dir { search };
# from booting
allow udev_t dbusd_t:unix_stream_socket { connectto };
allow udev_t dbusd_var_run_t:dir { search };
allow udev_t dbusd_var_run_t:sock_file { write };
allow udev_t file_t:dir { search };
                                                                                

# from exe=/usr/bin/mDNSResponder during boot
allow user_t dns_port_t:udp_socket { name_bind };
 
# from starting mozilla as staff_r
allow staff_mozilla_t file_t:dir { getattr };
allow staff_mozilla_t staff_home_t:file { unlink };
allow staff_mozilla_t xdm_tmp_t:dir { search };
 
# from normal gnome session as staff_r
allow staff_screensaver_t xdm_tmp_t:dir { search };
allow staff_screensaver_t xdm_tmp_t:sock_file { write };
allow staff_t file_t:dir { getattr };
allow staff_t staff_t:netlink_route_socket { create };
 
#from starting postgresql server during boot and using postgresql as user.
allow initrc_su_t postgresql_db_t:dir { search };
allow user_t postgresql_db_t:dir { add_name getattr read remove_name 
search write };
allow user_t postgresql_db_t:file { create getattr read rename unlink 
write };
allow staff_t user_tmp_t:sock_file { write };
allow staff_t user_t:unix_stream_socket { connectto };

-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: addthese.te
URL: <http://listman.redhat.com/archives/fedora-selinux-list/attachments/20040629/db5fe719/attachment.ksh>


More information about the fedora-selinux-list mailing list