From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 3754A1396DA for ; Sun, 29 Oct 2017 20:43:01 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 9D21AE0E68; Sun, 29 Oct 2017 20:43:00 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 7E2D0E0E68 for ; Sun, 29 Oct 2017 20:43:00 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 9491B3416C5 for ; Sun, 29 Oct 2017 20:42:58 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 0271D83D for ; Sun, 29 Oct 2017 20:42:57 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1509281948.0a049992e4cf60f3aa33ec665a5d7df5b0b573e1.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/ipsec.te X-VCS-Directories: policy/modules/system/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 0a049992e4cf60f3aa33ec665a5d7df5b0b573e1 X-VCS-Branch: master Date: Sun, 29 Oct 2017 20:42:57 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 02c8eb21-8f27-4d3a-9a6d-c9b7eb5823c1 X-Archives-Hash: 321145d256f854a38fdf4da442b3ef51 commit: 0a049992e4cf60f3aa33ec665a5d7df5b0b573e1 Author: David Graziano rockwellcollins com> AuthorDate: Mon Oct 9 20:42:59 2017 +0000 Commit: Jason Zaman gentoo org> CommitDate: Sun Oct 29 12:59:08 2017 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=0a049992 system/ipsec: Add signull access for strongSwan Allows ipsec_supervisor_t domain to signull other strongSwan domains. Signed-off-by: David Graziano rockwellcollins.com> policy/modules/system/ipsec.te | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te index b9b723e9..75f69b5b 100644 --- a/policy/modules/system/ipsec.te +++ b/policy/modules/system/ipsec.te @@ -461,7 +461,7 @@ userdom_use_user_terminals(setkey_t) # allow ipsec_supervisor_t self:capability { dac_override dac_read_search kill net_admin }; -allow ipsec_supervisor_t self:process { signal }; +allow ipsec_supervisor_t self:process { signal signull }; allow ipsec_supervisor_t self:fifo_file rw_fifo_file_perms; allow ipsec_supervisor_t self:netlink_route_socket rw_netlink_socket_perms; allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms; @@ -472,7 +472,7 @@ read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t); manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t) allow ipsec_supervisor_t ipsec_t:unix_stream_socket { connectto }; -allow ipsec_supervisor_t ipsec_t:process { signal }; +allow ipsec_supervisor_t ipsec_t:process { signal signull }; allow ipsec_supervisor_t ipsec_var_run_t:sock_file { rw_sock_file_perms unlink }; manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)