From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 543B815808B for ; Sun, 27 Feb 2022 02:52:48 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id C486E2BC006; Sun, 27 Feb 2022 02:52:36 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id A94032BC006 for ; Sun, 27 Feb 2022 02:52:36 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 2B2B33431C7 for ; Sun, 27 Feb 2022 02:52:35 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 791FA2FB for ; Sun, 27 Feb 2022 02:52:33 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1645927997.a6f1a4be5244df25381bdc9d270765134f4d802b.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/services/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/services/cron.te policy/modules/services/dbus.te policy/modules/services/policykit.te policy/modules/services/postfix.te X-VCS-Directories: policy/modules/services/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: a6f1a4be5244df25381bdc9d270765134f4d802b X-VCS-Branch: master Date: Sun, 27 Feb 2022 02:52:33 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: 83e05f9c-534f-42a0-a05f-9cc10ab575e1 X-Archives-Hash: 453eb7be4924b51c775621258240564e commit: a6f1a4be5244df25381bdc9d270765134f4d802b Author: Chris PeBenito ieee org> AuthorDate: Wed Feb 16 16:04:33 2022 +0000 Commit: Jason Zaman gentoo org> CommitDate: Sun Feb 27 02:13:17 2022 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=a6f1a4be cron, dbus, policykit, postfix: Minor style fixes. No rule changes. Signed-off-by: Chris PeBenito ieee.org> Signed-off-by: Jason Zaman gentoo.org> policy/modules/services/cron.te | 4 ++-- policy/modules/services/dbus.te | 5 ++--- policy/modules/services/policykit.te | 2 +- policy/modules/services/postfix.te | 5 ++--- 4 files changed, 7 insertions(+), 9 deletions(-) diff --git a/policy/modules/services/cron.te b/policy/modules/services/cron.te index 9ecbe4d6..b36fc709 100644 --- a/policy/modules/services/cron.te +++ b/policy/modules/services/cron.te @@ -209,10 +209,10 @@ tunable_policy(`fcron_crond',` # Daemon local policy # -# for changing buffer sizes dontaudit crond_t self:capability net_admin; allow crond_t self:capability { chown dac_override dac_read_search fowner setgid setuid sys_nice }; -dontaudit crond_t self:capability { sys_resource sys_tty_config }; +# net_admin for changing buffer sizes +dontaudit crond_t self:capability { net_admin sys_resource sys_tty_config }; allow crond_t self:process { transition signal_perms getsched setsched getsession getpgid setpgid getcap setcap share getattr setexec setfscreate noatsecure siginh setrlimit rlimitinh dyntransition setkeycreate setsockcreate getrlimit }; allow crond_t self:fd use; diff --git a/policy/modules/services/dbus.te b/policy/modules/services/dbus.te index 9a1e6b30..31fc905c 100644 --- a/policy/modules/services/dbus.te +++ b/policy/modules/services/dbus.te @@ -67,10 +67,9 @@ ifdef(`enable_mls',` # Local policy # -# for changing buffer sizes -dontaudit system_dbusd_t self:capability net_admin; allow system_dbusd_t self:capability { dac_override setgid setpcap setuid sys_resource }; -dontaudit system_dbusd_t self:capability sys_tty_config; +# net_admin for changing buffer sizes +dontaudit system_dbusd_t self:capability { net_admin sys_tty_config }; allow system_dbusd_t self:process { getattr getsched signal_perms setpgid getcap setcap setrlimit }; allow system_dbusd_t self:fifo_file rw_fifo_file_perms; allow system_dbusd_t self:dbus { send_msg acquire_svc }; diff --git a/policy/modules/services/policykit.te b/policy/modules/services/policykit.te index 46f5568f..197dc13c 100644 --- a/policy/modules/services/policykit.te +++ b/policy/modules/services/policykit.te @@ -68,9 +68,9 @@ miscfiles_read_localization(policykit_domain) # Local policy # +allow policykit_t self:capability { dac_override dac_read_search setgid setuid sys_nice sys_ptrace }; # for changing buffer sizes dontaudit policykit_t self:capability net_admin; -allow policykit_t self:capability { dac_override dac_read_search setgid setuid sys_nice sys_ptrace }; allow policykit_t self:process { getsched setsched signal }; allow policykit_t self:unix_stream_socket { accept connectto listen }; diff --git a/policy/modules/services/postfix.te b/policy/modules/services/postfix.te index 6fe06887..5c324bc7 100644 --- a/policy/modules/services/postfix.te +++ b/policy/modules/services/postfix.te @@ -107,10 +107,9 @@ mta_mailserver_delivery(postfix_virtual_t) # Common postfix domain local policy # -# for changing buffer sizes -dontaudit postfix_domain self:capability net_admin; allow postfix_domain self:capability { sys_chroot sys_nice }; -dontaudit postfix_domain self:capability sys_tty_config; +# net_admin for changing buffer sizes +dontaudit postfix_domain self:capability { net_admin sys_tty_config }; allow postfix_domain self:process { signal_perms setpgid setsched }; allow postfix_domain self:fifo_file rw_fifo_file_perms; allow postfix_domain self:unix_stream_socket { accept connectto listen };