From owner-trustedbsd-cvs@FreeBSD.ORG Thu Oct 26 19:34:53 2006 Return-Path: X-Original-To: trustedbsd-cvs@freebsd.org Delivered-To: trustedbsd-cvs@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 8E63716A47E for ; Thu, 26 Oct 2006 19:34:53 +0000 (UTC) (envelope-from owner-perforce@freebsd.org) Received: from cyrus.watson.org (cyrus.watson.org [209.31.154.42]) by mx1.FreeBSD.org (Postfix) with ESMTP id EA53943D49 for ; Thu, 26 Oct 2006 19:34:52 +0000 (GMT) (envelope-from owner-perforce@freebsd.org) Received: from mx2.freebsd.org (mx2.freebsd.org [216.136.204.119]) by cyrus.watson.org (Postfix) with ESMTP id 8C6A846CA1 for ; Thu, 26 Oct 2006 15:34:52 -0400 (EDT) Received: from hub.freebsd.org (hub.freebsd.org [216.136.204.18]) by mx2.freebsd.org (Postfix) with ESMTP id 086655614B; Thu, 26 Oct 2006 19:34:52 +0000 (GMT) (envelope-from owner-perforce@freebsd.org) Received: by hub.freebsd.org (Postfix, from userid 32767) id C58B716A415; Thu, 26 Oct 2006 19:34:51 +0000 (UTC) X-Original-To: perforce@freebsd.org Delivered-To: perforce@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 8CE7C16A494 for ; Thu, 26 Oct 2006 19:34:51 +0000 (UTC) (envelope-from millert@freebsd.org) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id 4512543D46 for ; Thu, 26 Oct 2006 19:34:51 +0000 (GMT) (envelope-from millert@freebsd.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.6/8.13.6) with ESMTP id k9QJYp6Y080667 for ; Thu, 26 Oct 2006 19:34:51 GMT (envelope-from millert@freebsd.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.13.6/8.13.4/Submit) id k9QJYojv080664 for perforce@freebsd.org; Thu, 26 Oct 2006 19:34:50 GMT (envelope-from millert@freebsd.org) Date: Thu, 26 Oct 2006 19:34:50 GMT Message-Id: <200610261934.k9QJYojv080664@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to millert@freebsd.org using -f From: Todd Miller To: Perforce Change Reviews Cc: Subject: PERFORCE change 108520 for review X-BeenThere: trustedbsd-cvs@FreeBSD.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: TrustedBSD CVS and Perforce commit message list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 26 Oct 2006 19:34:53 -0000 http://perforce.freebsd.org/chv.cgi?CH=108520 Change 108520 by millert@millert_macbook on 2006/10/26 19:34:44 Update securityd and notifyd policies Affected files ... .. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/notifyd.te#3 edit .. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/securityd.te#3 edit Differences ... ==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/notifyd.te#3 (text+ko) ==== @@ -25,9 +25,19 @@ allow notifyd_t self:fifo_file { read write }; allow notifyd_t self:unix_stream_socket create_stream_socket_perms; +# Misc allow notifyd_t mnt_t:dir { getattr search }; allow notifyd_t nfs_t:lnk_file { getattr read }; +# Talk to self mach_allow_message(notifyd_t, notifyd_t) + +# Talk to kernel kernel_allow_ipc(notifyd_t) + +# Talk to launchd init_allow_ipc(notifyd_t) + +# Allow signalling of other processes +allow notifyd_t init_t:process signal; +allow notifyd_t lookupd_t:process signal; ==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/securityd.te#3 (text+ko) ==== @@ -25,8 +25,30 @@ allow securityd_t self:fifo_file { read write }; allow securityd_t self:unix_stream_socket create_stream_socket_perms; +# Talk to self +allow securityd_t self:mach_task set_special_port; +allow securityd_t self:process signal; +allow securityd_t self:socket { connect write }; +allow securityd_t self:udp_socket create; +allow securityd_t self:unix_dgram_socket create; + +# Misc +allow securityd_t mnt_t:dir { getattr search }; +allow securityd_t nfs_t:dir { getattr search }; +allow securityd_t nfs_t:filesystem getattr; +allow securityd_t nfs_t:lnk_file read; +allow securityd_t usr_t:file { getattr read }; + + # Talk to launchd init_allow_ipc(securityd_t) +init_allow_shm(securityd_t) # Talk to notifyd notifyd_allow_ipc(securityd_t) +notifyd_allow_shm(securityd_t) + +# Not sure what this is for exactly. You don't generally execute libraries, so +# something is probably mislabeled. +allow securityd_t lib_t:file execute_no_trans; +