From owner-p4-projects@FreeBSD.ORG Wed Feb 23 15:48:33 2005 Return-Path: Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id 2741616A4D0; Wed, 23 Feb 2005 15:48:33 +0000 (GMT) Delivered-To: perforce@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id D7C6316A4CE for ; Wed, 23 Feb 2005 15:48:32 +0000 (GMT) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id C122843D3F for ; Wed, 23 Feb 2005 15:48:32 +0000 (GMT) (envelope-from areisse@nailabs.com) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.1/8.13.1) with ESMTP id j1NFmWHh062717 for ; Wed, 23 Feb 2005 15:48:32 GMT (envelope-from areisse@nailabs.com) Received: (from perforce@localhost) by repoman.freebsd.org (8.13.1/8.13.1/Submit) id j1NFmWVK062714 for perforce@freebsd.org; Wed, 23 Feb 2005 15:48:32 GMT (envelope-from areisse@nailabs.com) Date: Wed, 23 Feb 2005 15:48:32 GMT Message-Id: <200502231548.j1NFmWVK062714@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to areisse@nailabs.com using -f From: Andrew Reisse To: Perforce Change Reviews Subject: PERFORCE change 71668 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Feb 2005 15:48:33 -0000 http://perforce.freebsd.org/chv.cgi?CH=71668 Change 71668 by areisse@areisse_tislabs on 2005/02/23 15:47:55 Support reading or writing from terminals, so sshd login can query domains. If ssh_sysadm_login is true, relabel those terminal types. Affected files ... .. //depot/projects/trustedbsd/sebsd/contrib/sebsd/policy/domains/program/ssh.te#12 edit Differences ... ==== //depot/projects/trustedbsd/sebsd/contrib/sebsd/policy/domains/program/ssh.te#12 (text+ko) ==== @@ -293,7 +293,10 @@ # Relabel ptys created by sshd allow sshd_login_t sshd_devpts_t:chr_file { relabelfrom relabelto }; -allow sshd_login_t userpty_type:chr_file { getattr relabelfrom relabelto }; +allow sshd_login_t userpty_type:chr_file { ioctl read write getattr relabelfrom relabelto }; +if (ssh_sysadm_login) { +allow sshd_login_t sysadm_devpts_t:chr_file { ioctl read write getattr relabelfrom relabelto }; +} # open old-style ptys #allow sshd_login_t devpts_t:chr_file { read write relabelfrom relabelto getattr setattr };