Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp200443pxk; Wed, 9 Sep 2020 03:08:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyFpEQHhuOvqynXWzC6Egbl6t1gjaSsg6Avac+YhvVOQUfYH07ZgmvRgH7QUZ8PAu8BCitA X-Received: by 2002:a50:fc83:: with SMTP id f3mr3192841edq.256.1599646122484; Wed, 09 Sep 2020 03:08:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599646122; cv=none; d=google.com; s=arc-20160816; b=MhoaMS626LBVxHn7d5w7rX8MnJk3xmscmNPgc0j+gUxCoM0mTGwes79ADaJGPfyfSf Wr+4grQRITFV1CkY2MskO4tAshUV0uqqRCEIstbRn44MHuoGOxzAzHUGaEAVuhF8ih0J xTj2JnSiqZLd3CR0fiOAUE0GikvHzM7r27WGuDIWO8j7ECpeVU/fvc/it4jo2S2dRAES Yc1n2Y3gaABEwCxrCQZKMST/AgI/kIWXxEUf59BTvz7AdZnH0KqppaLsq5dYIU3meSyo r3w8Tfn1izEQrLI1U/+DUkatYqibXF/2tNHt+t1j8tsNtXB/dfUIgWknCSM+dtbA99dn Wi5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature:dkim-filter; bh=MBIXJMDEAtEAhhJbDMNLmo7UOZ114X7s0WT0tVL1OW8=; b=pbasG9W1B8/v3IY9Or/02TCzV3z+tgKp2obrvVi2ttdHPy9qE80fPrOyCC7CTphdlG rzZMGkIhvhaPQO6DfbsmP3oiusnyEokDYSXaFC7LsftLmblqZUAR9457Hcuzqfv5+Rsl ShInf6RBQlAh4xQjigRlGf5ZzEIBuCIqIplCq/BTPGIhYOLgFtV7EbiwT1rU3i5MLeDf cogo2EaYeVHp084tArn9VeCYUHuJpIvtrgdAmfvDe/Y0fAeN1uyyXLvhjzaVf4HUQafo KCl6p9RXLB1Bh9h4lMcqjF0bPCQM4o+Cj3UtoyrcO646PRGVsqFvFO7WfPID2Qo10poM XfQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@defensec.nl header.s=default header.b=D2RwvW4Y; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m21si1205428ejq.199.2020.09.09.03.08.36; Wed, 09 Sep 2020 03:08:42 -0700 (PDT) Received-SPF: pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@defensec.nl header.s=default header.b=D2RwvW4Y; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725948AbgIIKII (ORCPT + 15 others); Wed, 9 Sep 2020 06:08:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53954 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725877AbgIIKIH (ORCPT ); Wed, 9 Sep 2020 06:08:07 -0400 X-Greylist: delayed 448 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Wed, 09 Sep 2020 03:08:06 PDT Received: from agnus.defensec.nl (agnus.defensec.nl [IPv6:2001:985:d55d::711]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 001FEC061573 for ; Wed, 9 Sep 2020 03:08:06 -0700 (PDT) Received: from localhost.localdomain (brutus.lan [IPv6:2001:985:d55d::438]) by agnus.defensec.nl (Postfix) with ESMTPSA id 0BF422A1003; Wed, 9 Sep 2020 12:00:36 +0200 (CEST) DKIM-Filter: OpenDKIM Filter v2.11.0 agnus.defensec.nl 0BF422A1003 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=defensec.nl; s=default; t=1599645637; bh=MBIXJMDEAtEAhhJbDMNLmo7UOZ114X7s0WT0tVL1OW8=; h=From:To:Cc:Subject:Date:From; b=D2RwvW4Y9EVaiCoOjDL3LPFrF+tITTbR85VEK2hu0RlFtfWTqtPiou2KPWMPDR4gZ iXKLVnmXj4k1AfX4OvsPxeGHVcXmuJ1vSJm4M11vO5iosbRfLzKfD7/qP1s28DTYI+ i9Vwx431r+yc1u95x5LKsfo4rmXuP5nnu4RuwRlU= From: Dominick Grift To: selinux-refpolicy@vger.kernel.org Cc: Dominick Grift Subject: [PATCH] bind: add a few fc specs for unbound Date: Wed, 9 Sep 2020 12:00:26 +0200 Message-Id: <20200909100026.611987-1-dominick.grift@defensec.nl> X-Mailer: git-send-email 2.28.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org unbound-checkconf is the unbound bind-checkconf equivalent unbound-control is the unbound bind ndc equivalent Signed-off-by: Dominick Grift --- These surfaced when I was helping someone on IRC to solve some issues. I figure I spent enough time on it for it to warrant a fix upstream. policy/modules/services/bind.fc | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/policy/modules/services/bind.fc b/policy/modules/services/bind.fc index 7c1df489..ce68a0af 100644 --- a/policy/modules/services/bind.fc +++ b/policy/modules/services/bind.fc @@ -19,6 +19,8 @@ /usr/bin/named-checkconf -- gen_context(system_u:object_r:named_checkconf_exec_t,s0) /usr/bin/r?ndc -- gen_context(system_u:object_r:ndc_exec_t,s0) /usr/bin/unbound -- gen_context(system_u:object_r:named_exec_t,s0) +/usr/bin/unbound-checkconf -- gen_context(system_u:object_r:named_checkconf_exec_t,s0) +/usr/bin/unbound-control -- gen_context(system_u:object_r:ndc_exec_t,s0) /usr/lib/systemd/system/named.*\.service -- gen_context(system_u:object_r:named_unit_t,s0) /usr/lib/systemd/system/unbound.*\.service -- gen_context(system_u:object_r:named_unit_t,s0) @@ -28,6 +30,8 @@ /usr/sbin/named-checkconf -- gen_context(system_u:object_r:named_checkconf_exec_t,s0) /usr/sbin/r?ndc -- gen_context(system_u:object_r:ndc_exec_t,s0) /usr/sbin/unbound -- gen_context(system_u:object_r:named_exec_t,s0) +/usr/sbin/unbound-checkconf -- gen_context(system_u:object_r:named_checkconf_exec_t,s0) +/usr/sbin/unbound-control -- gen_context(system_u:object_r:ndc_exec_t,s0) /var/bind(/.*)? gen_context(system_u:object_r:named_cache_t,s0) /var/bind/pri(/.*)? gen_context(system_u:object_r:named_zone_t,s0) -- 2.28.0