On Sunday 13 March 2005 10:50, David Hampton <hampton-rh@xxxxxxxxxxxxxxxxxxx> wrote: > This is written on an FC3 base system using the selinux-policy-strict- > sources-1.22.1-2 policy from March 11th. These are the first policies > I've submitted so I'd appreciate any comments on how to write better > policies. Executable types in .fc files should be marked with --. It makes setfiles run faster and also avoids bad policy being written when the executable gets replaced with a symlink or something else strange happens. Labelling a binary in /usr/sbin as bin_t makes no sense. I don't think that there's any need for so many domains. Also tripwire domains probably don't make any sense. If you are serious about tripwire then you should boot from removable media to run it. Anyone who can crack a SE Linux system can surely sort out the tripwire database. -- http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/ Postal SMTP/POP benchmark http://www.coker.com.au/~russell/ My home page
--- tripwire.fc.old 2005-04-22 01:10:16.000000000 +1000 +++ tripwire.fc 2005-04-22 01:10:52.000000000 +1000 @@ -1,9 +1,8 @@ # tripwire /etc/tripwire(/.*)? system_u:object_r:tripwire_etc_t -/usr/sbin/siggen system_u:object_r:siggen_exec_t -/usr/sbin/tripwire system_u:object_r:tripwire_exec_t -/usr/sbin/tripwire-setup-keyfiles system_u:object_r:bin_t -/usr/sbin/twadmin system_u:object_r:twadmin_exec_t -/usr/sbin/twprint system_u:object_r:twprint_exec_t +/usr/sbin/siggen -- system_u:object_r:siggen_exec_t +/usr/sbin/tripwire -- system_u:object_r:tripwire_exec_t +/usr/sbin/twadmin -- system_u:object_r:twadmin_exec_t +/usr/sbin/twprint -- system_u:object_r:twprint_exec_t /var/lib/tripwire(/.*)? system_u:object_r:tripwire_var_lib_t /var/lib/tripwire/report(/.*)? system_u:object_r:tripwire_report_t
-- fedora-selinux-list mailing list fedora-selinux-list@xxxxxxxxxx http://www.redhat.com/mailman/listinfo/fedora-selinux-list