Is there any documentation on the SELinux behavior on dbus? From some discussion in the IRC channel, the policy templates (which is still basically the NSA example policy stuff) don't match the code. The templates creates a type: type [connector domain prefix]_dbusd_[bus owner prefix]_t; so if you have staff_r's connection to the system bus, you get staff_dbusd_system_t. Then there is a type_change so dbus knows what label to give the connection: type_change [domain] [bus owner prefix]_dbusd_t:dbus [connector type]; which results in something like this: type user_mozilla_dbusd_system_t; type_change user_mozilla_t system_dbusd_t:dbus user_mozilla_dbusd_system_t; Then based on the template, I believe the premise was that the dbus permissions would be between these derived types. However, in the policy there are no dbus:send_msg rules for these types (except for the ones given in the templates), and instead rules are against the real domains, (e.g. allow NetworkManager_t dhcpd_t:dbus send_msg;). So I looked in the dbus code, and I didn't see any calls to security_compute_relabel(). It looks like this bit of policy is dead, and the templates need to be revised. -- Chris PeBenito Tresys Technology, LLC (410) 290-1411 x150 -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.