Re: avc { module_request, relabelfrom }: openvpn->tun

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>>>>> kernel_request_load_module(openvpn_t)
>>>>>           
>>> create module that allows openvpn_t to request the kernel to load a module:
>>>
>>> mkdir ~/myopenvpn; cd ~/myopenvpn;
>>> echo "policy_module(myopenvpn, 1.0.0)" > myopenvpn.te;
>>> echo "gen_require(\`" >> myopenvpn.te;
>>> echo "type openvpn_t;" >> myopenvpn.te;
>>> echo "')" >> myopenvpn.te;
>>> echo "kernel_request_load_module(openvpn_t)" >> myopenvpn.te;
>>> make -f /usr/share/selinux/devel/Makefile myopenvpn.pp
>>> sudo semodule -i myopenvpn.pp
>>>       

I see that this change has been adopted with the -47 version of the 
policy (FC13) - that was pretty quick!

There was a suggestion for change to tor.te a while ago as well (see 
tor: dac_override, dac_read_search, name_bind and net_bind_service 
thread) - the new version of tor (2.x) provides dns resolution as part 
of the service it runs, so it needs to bind to udp/53 and the statement:

corenet_udp_bind_dns_port(tor_t)

does the trick when it is included in tor.te. Currently I do this with 
patching, but it would be nice to have it as part of the policy in a 
similar way it was done with openvpn.

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux