Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp10030217ybl; Thu, 26 Dec 2019 09:30:04 -0800 (PST) X-Google-Smtp-Source: APXvYqzCakiK7QrqUayzrhYwTfpOYyevEXIOgSPzX90KWq472QR6f7C+ZhRUiHnxmJQHJAFLdbbg X-Received: by 2002:a9d:6c99:: with SMTP id c25mr32859018otr.178.1577381404213; Thu, 26 Dec 2019 09:30:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577381404; cv=none; d=google.com; s=arc-20160816; b=xBHGDOArPFwdSRxMOp4M22AOajwNufnIFkc+0rj3ROTaR77zIfZoM0DZtJvt8R7Dia oKNuxqOIUmJ1lnShV3/admwnZeujUihNThkdt/4HGIR2Pb1swJyqYNdQ5LKUIaJSmr7X jHC2blmCWm+SHFh26XAzRZRJ536tMT7YupvVvk/BcGtcH1hiqLUnptbj32+5ejW6enkh 9iT/NEfYxmt4Lmjn2uJZtqLYs9Oe62miPyehTNn8vCuv4jon9weuxVMCfC+dp4lQkPuB d9sbdUiDjLJN/ihYX0t1WtjRS7zkN6sNiWn0cH3kXrxI3mwyY26Stny5IDe5wPhMXLSs m1KQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:dkim-signature; bh=1izucbrWz4YeKQT2oYPDmPiwA7lYQGojg0Ztp9zyfsg=; b=XyC30+hJWc0YQTlGmZ07pTg67jXYEM2NjHXf0/h6EC7JUDttddqdfEGeZgLniYOmVL OR0qQCAYZBzpOTbzGfDxYGWME5BLfq3nb1P0EUDjdnYKmcK65/cGIkZGgpzzhpx/SHqk 6H7krw7yJxOImx5y0zjQFyVdPefiYD9Ktjvl3+F1rpFNHiqpgG7DeCxpq61kFB2Ec3Og ZmFYURa2i+YGttxH5M7uenYbRaPkoMO4dlcgrME7F2q5Oq7VN199ElXdDFr05odTCISv ElxqX98vSxB8KsnKeWVCDDtkXvkd+HOo1UabyjQhsuP+oIQVr/HmQmEQUkEdgIpkbbgr kLWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=EoAly50n; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q66si13777690oig.65.2019.12.26.09.30.02; Thu, 26 Dec 2019 09:30:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=EoAly50n; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726706AbfLZRaB (ORCPT + 11 others); Thu, 26 Dec 2019 12:30:01 -0500 Received: from mail-qk1-f193.google.com ([209.85.222.193]:44082 "EHLO mail-qk1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726480AbfLZRaB (ORCPT ); Thu, 26 Dec 2019 12:30:01 -0500 Received: by mail-qk1-f193.google.com with SMTP id w127so19829858qkb.11 for ; Thu, 26 Dec 2019 09:30:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=1izucbrWz4YeKQT2oYPDmPiwA7lYQGojg0Ztp9zyfsg=; b=EoAly50nQgztXMfr4OYaGORP5QRaqVj7SFBvQTst+kc3iQXsip/gE6+65wONFIdEVy BrA3RjS1yxtmkSuqefxvLb4aPNVrUT3+jiRo1ROcqmG3bs9SYBuHNSEXIZw741Sq17dZ tO3goUu64aGW4a87q/aOGuyhbn0K9puFRBtM8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=1izucbrWz4YeKQT2oYPDmPiwA7lYQGojg0Ztp9zyfsg=; b=k0Sco6CrqtakTGJ/8558+ES3+NByffvd4W26B7voL7UUAk4gZvIMX/BYRxl2zDuVru WAd/0n/r9dg0/XSxyq2ahhzm4JPEPtUf8E6ZoW10lVH/+AZ7LGPufVBAPB2B1ZkmD2qU wiwyW4d8kceNrS+yFfVg/Z/a5PMUEWZmtnXPQXS6C4KoMNbBWMc8e41HKJd5L59Y0p2Y Hbay5jrOCsBz7zC86ZRWLYUTxIzjDeUn8w4zF2iK3brt76cNVdedmOjd5Dug/Yy+2NDh S1YciptV1xZ8I1d/0qc7rHsshtFhIx1zlj/5mKb1JDH3o2lG8dRG/sz4FuURGZqgx2hj KcqQ== X-Gm-Message-State: APjAAAWcyjPkd4WVu0XAMD28NIOsoV9RXRZLg3nb7FydYj6sAnoABWeA sfy3s8CKa97gEiwDL+O4XS+RBYucB50= X-Received: by 2002:a37:9a46:: with SMTP id c67mr39421974qke.308.1577381400363; Thu, 26 Dec 2019 09:30:00 -0800 (PST) Received: from fedora.pebenito.net (pool-108-15-23-247.bltmmd.fios.verizon.net. [108.15.23.247]) by smtp.gmail.com with ESMTPSA id 200sm8940068qkh.84.2019.12.26.09.29.59 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 26 Dec 2019 09:30:00 -0800 (PST) Subject: Re: [PATCH 5/9] dirmngr: accept unix stream socket To: Jason Zaman , selinux-refpolicy@vger.kernel.org References: <20191224101043.58122-1-jason@perfinion.com> <20191224101043.58122-5-jason@perfinion.com> From: Chris PeBenito Message-ID: <9e306bc5-0ef5-d8d1-bc0d-c196d309f997@ieee.org> Date: Thu, 26 Dec 2019 12:28:01 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <20191224101043.58122-5-jason@perfinion.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org On 12/24/19 5:10 AM, Jason Zaman wrote: > dirmngr needs to listen and accept on /run/user/1000/gnupg/S.dirmngr > > type=AVC msg=audit(1554175286.968:2720907): avc: denied { accept } for pid=15692 comm="dirmngr" path="/run/user/1000/gnupg/S.dirmngr" scontext=staff_u:staff_r:dirmngr_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:dirmngr_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=0 > > Signed-off-by: Jason Zaman > --- > policy/modules/services/dirmngr.te | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/policy/modules/services/dirmngr.te b/policy/modules/services/dirmngr.te > index 056cd97b..e34295e7 100644 > --- a/policy/modules/services/dirmngr.te > +++ b/policy/modules/services/dirmngr.te > @@ -37,6 +37,7 @@ userdom_user_home_content(dirmngr_home_t) > # > > allow dirmngr_t self:fifo_file rw_file_perms; > +allow dirmngr_t self:unix_stream_socket rw_stream_socket_perms; > > allow dirmngr_t dirmngr_conf_t:dir list_dir_perms; > allow dirmngr_t dirmngr_conf_t:file read_file_perms; Merged. -- Chris PeBenito