On Monday 04 February 2008, Erich Schubert wrote:
> That it so far has been rather impractical to develop a SELinux policy
> module outside of the 'upstream policy tree' is a different issue.
> (Given that there were the NSA developed policy, the 'new' reference
> policy with strict and targeted modes and being under heavy development)
> The NSA policy has been discontinued, and the reference policy
> 'targeted' and 'strict' modes have been merged into just one policy
> (with a module to use 'targeted' mode).
>
> How about you just follow the same road that Exim took?
> Develop the module, send it to SELinux policy upstream, who happily
> included it in policy upstream.
> When the refpolicy package is updated again (Manoj seems to be MIA?),
> then we can close this bug.

Here are the messages with `setenforce Enforcing` and `setenforce Permissive`

type=DAEMON_START msg=audit(1202137401.610:4228) auditd start, ver=1.5.3, 
format=raw, auid=4294967295 pid=3630 res=success, auditd pid=3630
type=CONFIG_CHANGE msg=audit(1202137401.614:34): audit_enabled=1 old=1 by 
auid=4294967295 subj=system_u:system_r:auditd_t:s0 res=1
type=CONFIG_CHANGE msg=audit(1202137401.615:35): audit_enabled=1 old=1 by 
auid=4294967295 res=1
type=CONFIG_CHANGE msg=audit(1202137401.644:36): audit_backlog_limit=320 
old=64 by auid=4294967295 subj=system_u:system_r:auditctl_t:s0 res=1
type=CONFIG_CHANGE msg=audit(1202137401.644:37): audit_backlog_limit=320 
old=64 by auid=4294967295 res=1
type=MAC_STATUS msg=audit(1202138501.214:38): enforcing=0 old_enforcing=1 
auid=4294967295
type=AVC msg=audit(1202138504.204:39): avc:  denied  { search } for  pid=9413 
comm="leafnode" name="spool" dev=dm-2 ino=4063245 
scontext=system_u:system_r:tcpd_t:s0 
tcontext=system_u:object_r:var_spool_t:s0 tclass=dir
type=AVC msg=audit(1202138504.204:40): avc:  denied  { setattr } for  pid=9413 
comm="leafnode" name="news" dev=dm-2 ino=4199432 
scontext=system_u:system_r:tcpd_t:s0 
tcontext=system_u:object_r:var_spool_t:s0 tclass=dir
type=AVC msg=audit(1202138504.205:41): avc:  denied  { read } for  pid=9413 
comm="leafnode" name="news" dev=dm-2 ino=4199432 
scontext=system_u:system_r:tcpd_t:s0 
tcontext=system_u:object_r:var_spool_t:s0 tclass=dir
type=AVC msg=audit(1202138504.205:42): avc:  denied  { getattr } for  pid=9413 
comm="leafnode" path="/var/spool/news/message.id" dev=dm-2 ino=4199437 
scontext=system_u:system_r:tcpd_t:s0 
tcontext=system_u:object_r:var_spool_t:s0 tclass=dir
type=AVC msg=audit(1202138504.209:43): avc:  denied  { ioctl } for  pid=9413 
comm="leafnode" path="socket:[38994]" dev=sockfs ino=38994 
scontext=system_u:system_r:tcpd_t:s0 tcontext=system_u:system_r:tcpd_t:s0 
tclass=udp_socket
type=AVC msg=audit(1202138504.210:44): avc:  denied  { getattr } for  pid=9413 
comm="leafnode" path="/var/spool/news/leaf.node/groupinfo" dev=dm-2 
ino=6460883 scontext=system_u:system_r:tcpd_t:s0 
tcontext=system_u:object_r:var_spool_t:s0 tclass=file
type=AVC msg=audit(1202138504.210:45): avc:  denied  { read } for  pid=9413 
comm="leafnode" name="groupinfo" dev=dm-2 ino=6460883 
scontext=system_u:system_r:tcpd_t:s0 
tcontext=system_u:object_r:var_spool_t:s0 tclass=file
type=AVC msg=audit(1202138504.252:46): avc:  denied  { read } for  pid=9413 
comm="leafnode" name="meminfo" dev=proc ino=4026531842 
scontext=system_u:system_r:tcpd_t:s0 tcontext=system_u:object_r:proc_t:s0 
tclass=file
type=AVC msg=audit(1202138504.252:47): avc:  denied  { getattr } for  pid=9413 
comm="leafnode" path="/proc/meminfo" dev=proc ino=4026531842 
scontext=system_u:system_r:tcpd_t:s0 tcontext=system_u:object_r:proc_t:s0 
tclass=file

Ritesh
-- 
Ritesh Raj Sarraf
RESEARCHUT - http://www.researchut.com
"Necessity is the mother of invention."

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to