From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <gentoo-commits+bounces-666214-garchives=archives.gentoo.org@lists.gentoo.org> Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 2E5B5138CFB for <garchives@archives.gentoo.org>; Sun, 9 Feb 2014 10:54:38 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id E7801E0A70; Sun, 9 Feb 2014 10:54:36 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 599FDE0A6C for <gentoo-commits@lists.gentoo.org>; Sun, 9 Feb 2014 10:54:36 +0000 (UTC) Received: from spoonbill.gentoo.org (spoonbill.gentoo.org [81.93.255.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 81A2B33F8BC for <gentoo-commits@lists.gentoo.org>; Sun, 9 Feb 2014 10:54:35 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by spoonbill.gentoo.org (Postfix) with ESMTP id 3E1B618879 for <gentoo-commits@lists.gentoo.org>; Sun, 9 Feb 2014 10:54:34 +0000 (UTC) From: "Sven Vermeulen" <swift@gentoo.org> To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" <swift@gentoo.org> Message-ID: <1391943058.3c2ad3e4b5919b0012847ae45f7197cdc0830e94.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/services/ssh.fc policy/modules/services/ssh.if X-VCS-Directories: policy/modules/services/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: 3c2ad3e4b5919b0012847ae45f7197cdc0830e94 X-VCS-Branch: master Date: Sun, 9 Feb 2014 10:54:34 +0000 (UTC) Precedence: bulk List-Post: <mailto:gentoo-commits@lists.gentoo.org> List-Help: <mailto:gentoo-commits+help@lists.gentoo.org> List-Unsubscribe: <mailto:gentoo-commits+unsubscribe@lists.gentoo.org> List-Subscribe: <mailto:gentoo-commits+subscribe@lists.gentoo.org> List-Id: Gentoo Linux mail <gentoo-commits.gentoo.org> X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: f676a328-6188-470e-a9de-10132622dad2 X-Archives-Hash: 0b187b75ce03d5872046ce67a441cbc6 commit: 3c2ad3e4b5919b0012847ae45f7197cdc0830e94 Author: Laurent Bigonville <bigon <AT> bigon <DOT> be> AuthorDate: Wed Feb 5 21:23:31 2014 +0000 Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org> CommitDate: Sun Feb 9 10:50:58 2014 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=3c2ad3e4 Add fcontext for sshd pidfile and directory used for privsep Also allow sshd_t domain to chroot(2) in this directory as explained in the README.privsep file in the openssh tarball. Thanks to Russell Coker for this patch --- policy/modules/services/ssh.fc | 2 ++ policy/modules/services/ssh.if | 1 + 2 files changed, 3 insertions(+) diff --git a/policy/modules/services/ssh.fc b/policy/modules/services/ssh.fc index 76d9f66..8168244 100644 --- a/policy/modules/services/ssh.fc +++ b/policy/modules/services/ssh.fc @@ -13,4 +13,6 @@ HOME_DIR/\.ssh(/.*)? gen_context(system_u:object_r:ssh_home_t,s0) /usr/sbin/sshd -- gen_context(system_u:object_r:sshd_exec_t,s0) +/var/run/sshd(/.*)? gen_context(system_u:object_r:sshd_var_run_t,s0) /var/run/sshd\.init\.pid -- gen_context(system_u:object_r:sshd_var_run_t,s0) +/var/run/sshd\.pid -- gen_context(system_u:object_r:sshd_var_run_t,s0) diff --git a/policy/modules/services/ssh.if b/policy/modules/services/ssh.if index fe0c682..48eb1c8 100644 --- a/policy/modules/services/ssh.if +++ b/policy/modules/services/ssh.if @@ -196,6 +196,7 @@ template(`ssh_server_template', ` manage_files_pattern($1_t, $1_tmpfs_t, $1_tmpfs_t) fs_tmpfs_filetrans($1_t, $1_tmpfs_t, file) + allow $1_t $1_var_run_t:dir search_dir_perms; allow $1_t $1_var_run_t:file manage_file_perms; files_pid_filetrans($1_t, $1_var_run_t, file)