From 9820351703ea1c8540b819895398eec29434e507 Mon Sep 17 00:00:00 2001 From: Chris PeBenito Date: Nov 14 2007 15:53:18 +0000 Subject: trunk: add in polmatch for default spd. --- diff --git a/policy/modules/system/ipsec.if b/policy/modules/system/ipsec.if index 433abf4..73ddc51 100644 --- a/policy/modules/system/ipsec.if +++ b/policy/modules/system/ipsec.if @@ -95,31 +95,31 @@ interface(`ipsec_read_config',` ######################################## ## -## Create, read, write, and delete the IPSEC pid files. +## Match the default SPD entry. ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # -interface(`ipsec_manage_pid',` +interface(`ipsec_match_default_spd',` gen_require(` - type ipsec_var_run_t; + type ipsec_spd_t; ') - files_search_pids($1) - manage_files_pattern($1,ipsec_var_run_t,ipsec_var_run_t) + allow $1 ipsec_spd_t:association polmatch; ') ######################################## ## -## Allow to set an default security context of IPsec Policy. +## Set the context of a SPD entry to +## the default context. ## ## -## -## Domain allowed access. -## +## +## Domain allowed access. +## ## # interface(`ipsec_setcontext_default_spd',` @@ -132,6 +132,25 @@ interface(`ipsec_setcontext_default_spd',` ######################################## ## +## Create, read, write, and delete the IPSEC pid files. +## +## +## +## The type of the process performing this action. +## +## +# +interface(`ipsec_manage_pid',` + gen_require(` + type ipsec_var_run_t; + ') + + files_search_pids($1) + manage_files_pattern($1,ipsec_var_run_t,ipsec_var_run_t) +') + +######################################## +## ## Execute racoon in the racoon domain. ## ## diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te index 80f58e6..5743eb5 100644 --- a/policy/modules/system/ipsec.te +++ b/policy/modules/system/ipsec.te @@ -1,5 +1,5 @@ -policy_module(ipsec,1.4.3) +policy_module(ipsec,1.4.4) ######################################## # diff --git a/policy/modules/system/unconfined.if b/policy/modules/system/unconfined.if index 695ea51..1bb9f59 100644 --- a/policy/modules/system/unconfined.if +++ b/policy/modules/system/unconfined.if @@ -74,6 +74,7 @@ interface(`unconfined_domain_noaudit',` optional_policy(` ipsec_setcontext_default_spd($1) + ipsec_match_default_spd($1) ') optional_policy(` diff --git a/policy/modules/system/unconfined.te b/policy/modules/system/unconfined.te index 95a9fc8..23fdddf 100644 --- a/policy/modules/system/unconfined.te +++ b/policy/modules/system/unconfined.te @@ -1,5 +1,5 @@ -policy_module(unconfined,2.0.1) +policy_module(unconfined,2.0.2) ######################################## #