Re: Debian testing +selinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On 7/23/07, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
On Mon, 2007-07-23 at 09:23 -0500, Justin Conover wrote:
>
>
> On 7/23/07, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
>         On Mon, 2007-07-23 at 09:09 -0500, Justin Conover wrote:
>         > I'm not sure if there is a regular selinux mailing list or
>         not, I
>         > mainly use Fedora but thought someone here might be able to
>         help.
>
>         http://www.nsa.gov/selinux/info/list.cfm
>
>
> Thank you, I saw that list but it said "SELinux Developers mailing
> list" and I'm not a developer so I thought that excluded me :)

Nope.

> So if I remove the rule entirely, does that mean take it out of
> local.te?  The parts talking about hald.

Only one that is relevant to this assertion is the one between hald_t
and memory_device_t.

--
Stephen Smalley
National Security Agency

Ok, I have removed the hald_t memory_device part:

comatose:~# grep hald local.te
        type hald_t;
#============= hald_t ==============
#allow hald_t memory_device_t:chr_file read;
allow hald_t var_t:file { read getattr };


comatose:~# checkmodule -M -m -o local.mod local.te
checkmodule:  loading policy configuration from local.te
checkmodule:  policy configuration loaded
checkmodule:  writing binary representation (version 6) to local.mod
comatose:~# semodule_package -o local.pp -m local.mod
comatose:~# semodule -i local.pp
comatose:~#



Another question, does doing this audit2allow method sort of mean "I have no idea what I'm doing, so allow it all", or is that why  it caught the hald_t memory portion and said NO, don't do this!
--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux