Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp835034ybl; Fri, 13 Dec 2019 05:25:55 -0800 (PST) X-Google-Smtp-Source: APXvYqzW1yAnxQIVqG7lQ8+UMewAU0YMyLe6LLzILActs4LI6y4+TkFi0VhzyjU5bppIEKCjC7pG X-Received: by 2002:a05:6830:2361:: with SMTP id r1mr13804409oth.88.1576243554951; Fri, 13 Dec 2019 05:25:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576243554; cv=none; d=google.com; s=arc-20160816; b=C6BIk46ncWXHt65oIipA5oFVF1NwOfpGw5tQua+Rv3LTucqiqHBP0kxEITqql/NeC4 HyJrEIQWK79RFN7QwUJrUpv5/5FN2w2BruA7RIqcuk0BaPj3mNMXHUkinzDBJRpMKKQ3 Elp+rxXAgs9CA42IC5J09f0bw72sC4G9rF+o5XLBCjxVOm0pve0qYqNAbQvhMSnvZkC0 65QgVl9SnzJVFFR3wvGjJRo8zYt2ASlmFSn4O3ZnxQ3Bxkl2DD+nHevUhUlV+YqkNRtJ tiP8uLptfz6c8EiPTqqE8kfJZoit0OD5rNhPgY/UH1bCAnzirJzRWTGJyuIQIZmYezvD 05TQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=vHb8+qJ58lJXH9JguLOz3spI4Pe/B0ZNY38qjTUl0oE=; b=Kigug3mfcvu52pp6RzPCljNegSM0malmc4iJUYgvv0p7tM4dpNMRw7D5JaO66NizPj GHUZeeSZ0+vyZAo3nbhvOg2FTrV84ZQl0ZG3TMA0PvOHfVxKAsIqNSUIn+a2R66Y4WSV lSZFBTsUu0ihpIxz0At828YVPblWmztbePrxga9w0xB8u6yqihS5QVp2NsZ86nzYmRrx NUDorXeLIlq72Ia7/uYuA+QA/vDik5D9+Lai7Ynqqc9Z0cQCurbzhVbkx+qJt66rdMB8 d4I8D6F3G6Y9ldV5hyjj7u4LhqMG2IlnSwRPRP4vL5LYcZjqDGBYLOARZhsoHRtvyL2C ssQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bigon.be header.s=key1 header.b=qkOMuBmx; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i203si5364357oia.74.2019.12.13.05.25.51; Fri, 13 Dec 2019 05:25:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@bigon.be header.s=key1 header.b=qkOMuBmx; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727370AbfLMNZt (ORCPT + 12 others); Fri, 13 Dec 2019 08:25:49 -0500 Received: from ithil.bigon.be ([163.172.57.153]:33700 "EHLO ithil.bigon.be" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727359AbfLMNZt (ORCPT ); Fri, 13 Dec 2019 08:25:49 -0500 Received: from localhost (localhost [IPv6:::1]) by ithil.bigon.be (Postfix) with ESMTP id 81E411FF82 for ; Fri, 13 Dec 2019 14:20:24 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=bigon.be; h= content-transfer-encoding:mime-version:references:in-reply-to :x-mailer:message-id:date:date:subject:subject:from:from :received:received:received; s=key1; t=1576243224; x=1578057625; bh=lZelOE3Mu9PcDKwE/C3VyNIw+JH020w0TjUHOefEwD4=; b=qkOMuBmxnB3g H2zZZY72t2kvnxBiuTJUmn269f/nnvKjsjTYQbTYujVvSkjkfx45EVH67QGWU/Nd WRJgFfFHny3+iTiaK5EfGCEAHYcf2Xbw+lJnZtVWIE/FS3/XUxzPpUSjMyxSSXyF CRwS2qjWyItO19zhfNFRxvmf5S8Q7TU= Received: from ithil.bigon.be ([IPv6:::1]) by localhost (ithil.bigon.be [IPv6:::1]) (amavisd-new, port 10026) with ESMTP id zwcbi5tT3FDU for ; Fri, 13 Dec 2019 14:20:24 +0100 (CET) Received: from edoras.bigon.be (unknown [193.53.238.198]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: bigon@bigon.be) by ithil.bigon.be (Postfix) with ESMTPSA for ; Fri, 13 Dec 2019 14:20:24 +0100 (CET) Received: from bigon (uid 1000) (envelope-from bigon@bigon.be) id 214a8 by edoras.bigon.be (DragonFly Mail Agent v0.12); Fri, 13 Dec 2019 14:20:23 +0100 From: Laurent Bigonville To: selinux-refpolicy@vger.kernel.org Subject: [RFC 1/3] Add an interface to allow the specified domain to mmap the general network configuration files Date: Fri, 13 Dec 2019 14:20:14 +0100 Message-Id: <20191213132016.308556-2-bigon@debian.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191213132016.308556-1-bigon@debian.org> References: <20191213132016.308556-1-bigon@debian.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org From: Laurent Bigonville Signed-off-by: Laurent Bigonville --- policy/modules/system/sysnetwork.if | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if index 77eab21e..1f785c7c 100644 --- a/policy/modules/system/sysnetwork.if +++ b/policy/modules/system/sysnetwork.if @@ -364,6 +364,31 @@ interface(`sysnet_read_config',` ') ') +####################################### +## +## Map network config files. +## +## +##

+## Allow the specified domain to mmap the +## general network configuration files. +##

+##
+## +## +## Domain allowed access. +## +## +# +interface(`sysnet_map_config',` + gen_require(` + type net_conf_t; + ') + + files_search_etc($1) + allow $1 net_conf_t:file map; +') + ####################################### ## ## Do not audit attempts to read network config files. -- 2.24.0