Re: racoon denials

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/18/2009 05:36 AM, Daniel Fazekas wrote:
> On Aug 18, 2009, at 11:17, Dominick Grift wrote:
> 
>> try this rule instead of the domtrans_pattern():
>> can_exec(racoon_t, setkey_exec_t)
> 
> Thanks, that did the trick.
> Everything seems to be fine now with enforcing turned fully back on.
> 
> Here's for reference the myracoon.te we ended up with, in case it helps
> somebody else too:
> 
> policy_module(myracoon, 0.0.4)
> require { type racoon_t, setkey_exec_t; }
> 
> auth_read_shadow(racoon_t)
> 
> can_exec(racoon_t, setkey_exec_t)
> 
> fs_dontaudit_getattr_xattr_fs(racoon_t)
> 
> type racoon_tmp_t;
> files_tmp_file(racoon_tmp_t)
> manage_dirs_pattern(racoon_t, racoon_tmp_t, racoon_tmp_t)
> manage_files_pattern(racoon_t, racoon_tmp_t, racoon_tmp_t)
> files_tmp_filetrans(racoon_t, racoon_tmp_t, { dir file })
> 
> -- 
> fedora-selinux-list mailing list
> fedora-selinux-list@xxxxxxxxxx
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
> 
> 
Ok better then the domtrans, although most of what you showed before were probably leaked file descriptors.

I would really prefer not to use /tmp.

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux