Dear P,the Nazi involvement in question is only coming to attention.Keep you ears open.Kent Mc.
fedora-selinux-list-request@xxxxxxxxxx wrote:
fedora-selinux-list-request@xxxxxxxxxx wrote:
Send fedora-selinux-list mailing list submissions to
fedora-selinux-list@xxxxxxxxxx
To subscribe or unsubscribe via the World Wide Web, visit
http://www.redhat.com/mailman/listinfo/fedora-selinux-list
or, via email, send a message with subject or body 'help' to
fedora-selinux-list-request@xxxxxxxxxx
You can reach the person managing the list at
fedora-selinux-list-owner@xxxxxxxxxx
When replying, please edit your Subject line so it is more specific
than "Re: Contents of fedora-selinux-list digest..."
Today's Topics:
1. NAZI DATA (kent mcclanahan)
2. Re: NAZI DATA (Richard Irving)
3. Re: Today's targeted policy... (Stephen Smalley)
----------------------------------------------------------------------
Message: 1
Date: Thu, 10 Feb 2005 07:48:37 -0800 (PST)
From: kent mcclanahan
Subject: NAZI DATA
To: fedora-selinux-list@xxxxxxxxxx
Message-ID: <20050210154837.76812.qmail@xxxxxxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain; charset="us-ascii"
Gentlemen,could you please inform me how to obtain data on Nazi involvement with the National Security Agency and The Central Intelligence Agency including names of the projects?Most Sincerely,Kent McClanahan csm
---------------------------------
Do you Yahoo!?
Meet the all-new My Yahoo! ? Try it today!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://www.redhat.com/archives/fedora-selinux-list/attachments/20050210/8809cfc2/attachment.htm
------------------------------
Message: 2
Date: Thu, 10 Feb 2005 11:54:24 -0500
From: Richard Irving
Subject: Re: NAZI DATA
To: "Fedora SELinux support list for users & developers."
Message-ID: <420B91C0.3070502@xxxxxxxxxxx>
Content-Type: text/plain; charset=windows-1252; format=flowed
kent mcclanahan wrote:
> Gentlemen,could you please inform me how to obtain data on Nazi
> involvement with the National Security Agency and The Central
> Intelligence Agency including names of the projects?Most Sincerely,Kent
> McClanahan csm
The answer to those questions, and more, have been encoded
into the wrinkles in the aluminum foil beanie, you are now wearing.
Your challenge is to decode the message, without removing the
aluminum foil hat, and exposing yourself to the dreaded "mind rays".
Good Luck.
This message will self destruct, shortly after you hit delete.
:P
(ROTFLMAO!)
> ------------------------------------------------------------------------
> Do you Yahoo!?
> Meet the all-new My Yahoo!? Try it today!
>
>
> ------------------------------------------------------------------------
>
> --
> fedora-selinux-list mailing list
> fedora-selinux-list@xxxxxxxxxx
> http://www.redhat.com/mailman/listinfo/fedora-selinux-list
------------------------------
Message: 3
Date: Thu, 10 Feb 2005 11:48:55 -0500
From: Stephen Smalley
Subject: Re: Today's targeted policy...
To: Tom London, "Fedora SELinux support list for
users & developers."
Message-ID: <1108054135.22172.90.camel@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain
On Thu, 2005-02-10 at 10:23, Tom London wrote:
> Running targeted/enforcing, latest rawhide.
>
> After installing today's policy files and rebooting, had X/execmem
> problems. Solved by 'setsebool -P allow_execmem 1'.
> > Rebooting produces scads of use and sigchild denials. Attached is
> /var/log/messages.
>
> In the past, use/fd denials were usually due to leaky file descriptors
> across execs. That likely the case here? Not sure about sigchild....
No, I removed rules from the general unconfined_domain() macro that
shouldn't be applied to _all_ unconfined domains, and no one has yet
added them back to the specific unconfined.te file in the targeted
policy (which is the only place they were needed). In the targeted
policy, all other domains are launched from the unconfined_t domain, and
these rules used to be covered by the domain_auto_trans rules, but the
re-introduction of initrc_t into the targeted policy means that they
have to be separately allowed. So the allow domain unconfined_t:fd use;
allow domain unconfined_t:process sigchld; rules need to go into the
targeted unconfined.te file.
--
Stephen Smalley
National Security Agency
------------------------------
--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
http://www.redhat.com/mailman/listinfo/fedora-selinux-list
End of fedora-selinux-list Digest, Vol 12, Issue 10
***************************************************
Do you Yahoo!?
Yahoo! Search presents - Jib Jab's 'Second Term'