Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp3096293pxb; Tue, 12 Jan 2021 06:20:19 -0800 (PST) X-Google-Smtp-Source: ABdhPJxh83l2+bvLQ7uVOb/xLQk5s4sIAVGnb0qM0/stDtRYXAvwqrvI5MAUpBz8iDrHEcAgZpp+ X-Received: by 2002:a05:6402:4242:: with SMTP id g2mr554243edb.103.1610461219456; Tue, 12 Jan 2021 06:20:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610461219; cv=none; d=google.com; s=arc-20160816; b=AmKixfmTiVle1+qr4Nx5hKGZzzKAO/ZXkmT8u4YeRkw4PeVfcLk/h9ZjoqM+Tkpzuc shvCKlSFfs+137/2TLuCJl2SrtT8ufHv6rQWtSXsVHpTFjPfzLYIwd7gacue7I8A7UJZ ZogAIswcje8xtR2WzL8jfls9i9BKRY4r2QLD31YJ1ArZPVoX3C5rQfsCs4EZiMOa9KSX cL9tiKMFU/w99s7Y4LVTOoJjmTcXCYYW62FB+pFY0Ppb6rp2H7Quk1ldQsgNC0akGMlN T0KGOSXBBYnLn3VgHsZHPfQis8npCAqvx9y4gymAZ/bp8i1ee6G6EQHo4nWK2O6usO6e BsXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject:dkim-signature:dkim-filter; bh=aRdtCVZue2aLkvvTtI+bTuH5w8Z2Ex100M8kDU9CLgk=; b=VgZi7uOcOyOXh9tYs25N60LG7U/1z2Fvyp9M3VXuawUxW+A9QzJ38DDa81H6iU9/ZE 28ShkzldjIm8qKrbUY73H2Qwa/s/SDpZWHEF953BLbRSfpnJr2XtzWVJTEQNywEsViUA hLsjGrtRViMylZz/mpX9lOfmyXFXiCMNou1o7D6NdYmcjQqwBqjHkpTytQ/zZw31USqe 45Kc29jIfGM9XQOfJeuICNwfL3KMKQiqWsMCsSs7SqRGaK7+nRMdzR1UymYGB9KhbIMP FiTCsXEmKnyAN4HxCIG5+pYlP/IHHYhr+JNtHLDua1F/1LE3b/yTSwuNqGOBLYOcLCcF HC/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=FRcapsgP; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a14si1379864eds.103.2021.01.12.06.20.12; Tue, 12 Jan 2021 06:20:19 -0800 (PST) Received-SPF: pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=FRcapsgP; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726777AbhALOQi (ORCPT + 18 others); Tue, 12 Jan 2021 09:16:38 -0500 Received: from linux.microsoft.com ([13.77.154.182]:60630 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726220AbhALOQi (ORCPT ); Tue, 12 Jan 2021 09:16:38 -0500 Received: from localhost.localdomain (c-73-172-233-15.hsd1.md.comcast.net [73.172.233.15]) by linux.microsoft.com (Postfix) with ESMTPSA id 8D63020B6C40; Tue, 12 Jan 2021 06:15:57 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 8D63020B6C40 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1610460957; bh=aRdtCVZue2aLkvvTtI+bTuH5w8Z2Ex100M8kDU9CLgk=; h=Subject:To:References:From:Date:In-Reply-To:From; b=FRcapsgPcrlhYfPWav5w84he1Urx2t7ZNSAXC1X1CgNeE2vqVefivr5pBw0Bu7eJN 7DNUyM7TAPbaw7hpU94iDzYDJHUXnVGELyZOCebpBaKfrytbh7WhCOLRASXzkM0EPk 7q3XHPoh2l2eVyxFbhHkYaZ1H9YYIKuF0DWWRx/4= Subject: Re: [PATCH] strict patches To: Russell Coker , selinux-refpolicy@vger.kernel.org References: From: Daniel Burgener Message-ID: <40e12eb0-782d-2a73-3cd9-a2e2cca2d916@linux.microsoft.com> Date: Tue, 12 Jan 2021 09:15:56 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org On 1/12/21 5:31 AM, Russell Coker wrote: > Also remove the systemd_analyze_t domain which > does no good. I proposed this same change on github: https://github.com/SELinuxProject/refpolicy/pull/321 The consensus there was that having a separate domain for this access would add value and the better direction would be to flesh out the permissions it needs.? We have a bit of a starting point locally on that.? I'm not sure what shape it's in with regard to upstreaming, but I'll talk to the developer who worked on it. -Daniel