From: domg472@gmail.com (Dominick Grift) Date: Tue, 3 Aug 2010 20:40:05 +0200 Subject: [refpolicy] [ services layer patch 1/1] Services: domain { allowed to transition, allowed access, to not audit }. Message-ID: <20100803184000.GA4102@localhost.localdomain> To: refpolicy@oss.tresys.com List-Id: refpolicy.oss.tresys.com Signed-off-by: Dominick Grift --- :100644 100644 1adfe2f... 0b827c5... M policy/modules/services/abrt.if :100644 100644 ada201c... 8559cdc... M policy/modules/services/afs.if :100644 100644 23d7889... 838d25b... M policy/modules/services/aide.if :100644 100644 4827f39... 0370dba... M policy/modules/services/aisexec.if :100644 100644 15c6df1... adb3d5f... M policy/modules/services/amavis.if :100644 100644 57feb5a... a534ee7... M policy/modules/services/apache.if :100644 100644 acd4956... e342775... M policy/modules/services/apcupsd.if :100644 100644 77d31b9... 1ea99b2... M policy/modules/services/apm.if :100644 100644 d41aee1... c804110... M policy/modules/services/arpwatch.if :100644 100644 57d74bd... 8b8143e... M policy/modules/services/asterisk.if :100644 100644 904f700... d80a16b... M policy/modules/services/automount.if :100644 100644 a5e598e... 210ca0b... M policy/modules/services/avahi.if :100644 100644 ec677f6... b52e3a1... M policy/modules/services/bind.if :100644 100644 fa38f57... 9ec737f... M policy/modules/services/bluetooth.if :100644 100644 95a9290... a3728d4... M policy/modules/services/certmonger.if :100644 100644 16e4342... 9a0da94... M policy/modules/services/chronyd.if :100644 100644 ecb594c... 1f11572... M policy/modules/services/clamav.if :100644 100644 7762be6... 0ca7701... M policy/modules/services/clockspeed.if :100644 100644 9f7dd57... 293e08d... M policy/modules/services/cobbler.if :100644 100644 5318dce... 5220c9d... M policy/modules/services/corosync.if :100644 100644 6192cc3... 37b03f6... M policy/modules/services/courier.if :100644 100644 06ff274... 35241ed... M policy/modules/services/cron.if :100644 100644 9a751a1... 305ddf4... M policy/modules/services/cups.if :100644 100644 d76131b... 39e901a... M policy/modules/services/dbus.if :100644 100644 7073379... 1a35213... M policy/modules/services/dcc.if :100644 100644 ead762a... 0a1a61b... M policy/modules/services/ddclient.if :100644 100644 de7e074... 567865f... M policy/modules/services/denyhosts.if :100644 100644 0d9f10c... 5e2cea8... M policy/modules/services/dhcp.if :100644 100644 a4840a7... 9bd812b... M policy/modules/services/dnsmasq.if :100644 100644 eed4e6c... e1d7dc5... M policy/modules/services/dovecot.if :100644 100644 88c5ede... 6bef7f8... M policy/modules/services/exim.if :100644 100644 43dd962... f590a1f... M policy/modules/services/fail2ban.if :100644 100644 cda687c... b5dd671... M policy/modules/services/finger.if :100644 100644 dfa52fd... bc27421... M policy/modules/services/ftp.if :100644 100644 716006b... b1e5d0c... M policy/modules/services/gnomeclock.if :100644 100644 1fecb11... 7d97298... M policy/modules/services/gpm.if :100644 100644 39fc12f... c2134ca... M policy/modules/services/gpsd.if :100644 100644 2aa3808... 7cf6763... M policy/modules/services/hal.if :100644 100644 96ab892... ecab47a... M policy/modules/services/icecast.if :100644 100644 59d9778... df48e5e... M policy/modules/services/inetd.if :100644 100644 1240337... ebc9e0d... M policy/modules/services/inn.if :100644 100644 29f8c16... 835b16b... M policy/modules/services/kerneloops.if :100644 100644 67e9269... 6fd0b4c... M policy/modules/services/ksmtuned.if :100644 100644 c358cd7... 647ed3a... M policy/modules/services/lpd.if :100644 100644 9ad4c4e... 67c7fdd... M policy/modules/services/mailman.if :100644 100644 c57356a... 343cee3... M policy/modules/services/mta.if :100644 100644 cb4832e... c358d8f... M policy/modules/services/munin.if :100644 100644 1e4b4d5... e9c0982... M policy/modules/services/mysql.if :100644 100644 b487ec9... 8581040... M policy/modules/services/nagios.if :100644 100644 18f657e... 2324d9e... M policy/modules/services/networkmanager.if :100644 100644 b9e7d40... 788a6e7... M policy/modules/services/nis.if :100644 100644 429bd9f... 24aa55c... M policy/modules/services/nscd.if :100644 100644 01d6be9... 23c769c... M policy/modules/services/nslcd.if :100644 100644 c42c7ab... e80f8c0... M policy/modules/services/ntp.if :100644 100644 ccc68c7... 79a225c... M policy/modules/services/nx.if :100644 100644 2102b0b... d781cce... M policy/modules/services/oav.if :100644 100644 6433998... bd76ec2... M policy/modules/services/oddjob.if :100644 100644 43bb38b... a8c1eef... M policy/modules/services/openca.if :100644 100644 aab6297... c440593... M policy/modules/services/openvpn.if :100644 100644 4dbbc70... b90700c... M policy/modules/services/policykit.if :100644 100644 9901e89... 72acea1... M policy/modules/services/portmap.if :100644 100644 ec895ee... f520c19... M policy/modules/services/postfix.if :100644 100644 394031b... 539a7c9... M policy/modules/services/postgresql.if :100644 100644 3927880... ad15fde... M policy/modules/services/postgrey.if :100644 100644 4789268... b524673... M policy/modules/services/ppp.if :100644 100644 737be4f... 2316653... M policy/modules/services/prelude.if :100644 100644 f68e025... b64b02f... M policy/modules/services/procmail.if :100644 100644 34946a2... 2855a44... M policy/modules/services/puppet.if :100644 100644 3745b62... 494f7e2... M policy/modules/services/pyzor.if :100644 100644 27fd19e... a55bf44... M policy/modules/services/qmail.if :100644 100644 f4a355f... f04a595... M policy/modules/services/razor.if :100644 100644 114f2c2... 31be971... M policy/modules/services/remotelogin.if :100644 100644 4504355... 7dc38d1... M policy/modules/services/rgmanager.if :100644 100644 6b7eb35... de37806... M policy/modules/services/rhcs.if :100644 100644 46681c8... 96efae7... M policy/modules/services/rhgb.if :100644 100644 700467c... f7826f9... M policy/modules/services/ricci.if :100644 100644 ba3364d... 63e78c6... M policy/modules/services/rlogin.if :100644 100644 005f516... cda37bb... M policy/modules/services/rpc.if :100644 100644 92bcded... 2e87d76... M policy/modules/services/rshd.if :100644 100644 6a2d345... 3386f29... M policy/modules/services/rsync.if :100644 100644 086c9b5... 87d871f... M policy/modules/services/samba.if :100644 100644 e4f4051... 7e94c7c... M policy/modules/services/sendmail.if :100644 100644 c09053b... 22dfeb4... M policy/modules/services/setroubleshoot.if :100644 100644 66a80b3... d7e8289... M policy/modules/services/slrnpull.if :100644 100644 f3d8459... adea9f9... M policy/modules/services/smartmon.if :100644 100644 6be6642... 824d206... M policy/modules/services/smokeping.if :100644 100644 d159ef3... c954f31... M policy/modules/services/spamassassin.if :100644 100644 2fe24de... d2496bd... M policy/modules/services/squid.if :100644 100644 567592d... 5437ffb... M policy/modules/services/ssh.if :100644 100644 5eff513... 941380a... M policy/modules/services/sssd.if :100644 100644 9de6298... 2075ebb... M policy/modules/services/tcpd.if :100644 100644 d04b833... b078bf7... M policy/modules/services/ulogd.if :100644 100644 36b936a... a4fbe31... M policy/modules/services/uucp.if :100644 100644 4334b28... 8337684... M policy/modules/services/uwimap.if :100644 100644 597679d... b4d90ac... M policy/modules/services/varnishd.if :100644 100644 a10dc80... 1f872b5... M policy/modules/services/vhostmd.if :100644 100644 7bb17f6... 7c5d8d8... M policy/modules/services/virt.if :100644 100644 8633a6a... 0a0cf76... M policy/modules/services/xserver.if :100644 100644 f2f2389... 53338c4... M policy/modules/services/zosremote.if policy/modules/services/abrt.if | 8 +++--- policy/modules/services/afs.if | 4 +- policy/modules/services/aide.if | 4 +- policy/modules/services/aisexec.if | 2 +- policy/modules/services/amavis.if | 2 +- policy/modules/services/apache.if | 26 +++++++++++----------- policy/modules/services/apcupsd.if | 4 +- policy/modules/services/apm.if | 2 +- policy/modules/services/arpwatch.if | 2 +- policy/modules/services/asterisk.if | 2 +- policy/modules/services/automount.if | 4 +- policy/modules/services/avahi.if | 4 +- policy/modules/services/bind.if | 8 +++--- policy/modules/services/bluetooth.if | 8 +++--- policy/modules/services/certmonger.if | 2 +- policy/modules/services/chronyd.if | 2 +- policy/modules/services/clamav.if | 4 +- policy/modules/services/clockspeed.if | 4 +- policy/modules/services/cobbler.if | 4 +- policy/modules/services/corosync.if | 2 +- policy/modules/services/courier.if | 6 ++-- policy/modules/services/cron.if | 12 +++++----- policy/modules/services/cups.if | 4 +- policy/modules/services/dbus.if | 6 ++-- policy/modules/services/dcc.if | 12 +++++----- policy/modules/services/ddclient.if | 4 +- policy/modules/services/denyhosts.if | 2 +- policy/modules/services/dhcp.if | 4 +- policy/modules/services/dnsmasq.if | 8 +++--- policy/modules/services/dovecot.if | 2 +- policy/modules/services/exim.if | 4 +- policy/modules/services/fail2ban.if | 2 +- policy/modules/services/finger.if | 2 +- policy/modules/services/ftp.if | 8 +++--- policy/modules/services/gnomeclock.if | 2 +- policy/modules/services/gpm.if | 2 +- policy/modules/services/gpsd.if | 2 +- policy/modules/services/hal.if | 16 +++++++------- policy/modules/services/icecast.if | 2 +- policy/modules/services/inetd.if | 2 +- policy/modules/services/inn.if | 2 +- policy/modules/services/kerneloops.if | 4 +- policy/modules/services/ksmtuned.if | 2 +- policy/modules/services/lpd.if | 6 ++-- policy/modules/services/mailman.if | 6 ++-- policy/modules/services/mta.if | 10 ++++---- policy/modules/services/munin.if | 2 +- policy/modules/services/mysql.if | 4 +- policy/modules/services/nagios.if | 2 +- policy/modules/services/networkmanager.if | 4 +- policy/modules/services/nis.if | 10 ++++---- policy/modules/services/nscd.if | 8 +++--- policy/modules/services/nslcd.if | 4 +- policy/modules/services/ntp.if | 8 +++--- policy/modules/services/nx.if | 2 +- policy/modules/services/oav.if | 4 +- policy/modules/services/oddjob.if | 2 +- policy/modules/services/openca.if | 2 +- policy/modules/services/openvpn.if | 4 +- policy/modules/services/policykit.if | 4 +- policy/modules/services/portmap.if | 4 +- policy/modules/services/postfix.if | 16 +++++++------- policy/modules/services/postgresql.if | 4 +- policy/modules/services/postgrey.if | 4 +- policy/modules/services/ppp.if | 8 +++--- policy/modules/services/prelude.if | 2 +- policy/modules/services/procmail.if | 2 +- policy/modules/services/puppet.if | 2 +- policy/modules/services/pyzor.if | 2 +- policy/modules/services/qmail.if | 4 +- policy/modules/services/razor.if | 2 +- policy/modules/services/remotelogin.if | 2 +- policy/modules/services/rgmanager.if | 2 +- policy/modules/services/rhcs.if | 8 +++--- policy/modules/services/rhgb.if | 4 +- policy/modules/services/ricci.if | 4 +- policy/modules/services/rlogin.if | 2 +- policy/modules/services/rpc.if | 10 ++++---- policy/modules/services/rshd.if | 2 +- policy/modules/services/rsync.if | 8 +++--- policy/modules/services/samba.if | 22 ++++++++++---------- policy/modules/services/sendmail.if | 12 +++++----- policy/modules/services/setroubleshoot.if | 2 +- policy/modules/services/slrnpull.if | 4 +- policy/modules/services/smartmon.if | 2 +- policy/modules/services/smokeping.if | 2 +- policy/modules/services/spamassassin.if | 4 +- policy/modules/services/squid.if | 2 +- policy/modules/services/ssh.if | 6 ++-- policy/modules/services/sssd.if | 2 +- policy/modules/services/tcpd.if | 2 +- policy/modules/services/ulogd.if | 2 +- policy/modules/services/uucp.if | 2 +- policy/modules/services/uwimap.if | 2 +- policy/modules/services/varnishd.if | 2 +- policy/modules/services/vhostmd.if | 10 ++++---- policy/modules/services/virt.if | 10 ++++---- policy/modules/services/xserver.if | 32 ++++++++++++++-------------- policy/modules/services/zosremote.if | 2 +- 99 files changed, 252 insertions(+), 252 deletions(-) diff --git a/policy/modules/services/abrt.if b/policy/modules/services/abrt.if index 1adfe2f..0b827c5 100644 --- a/policy/modules/services/abrt.if +++ b/policy/modules/services/abrt.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -62,7 +62,7 @@ interface(`abrt_signull',` ## ## ## -## Domain to allow access. +## Domain allowed access. ## ## # @@ -120,7 +120,7 @@ interface(`abrt_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -139,7 +139,7 @@ interface(`abrt_domtrans_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/afs.if b/policy/modules/services/afs.if index ada201c..8559cdc 100644 --- a/policy/modules/services/afs.if +++ b/policy/modules/services/afs.if @@ -44,7 +44,7 @@ interface(`afs_rw_udp_sockets',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # @@ -63,7 +63,7 @@ interface(`afs_rw_cache',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/aide.if b/policy/modules/services/aide.if index 23d7889..838d25b 100644 --- a/policy/modules/services/aide.if +++ b/policy/modules/services/aide.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`aide_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/aisexec.if b/policy/modules/services/aisexec.if index 4827f39..0370dba 100644 --- a/policy/modules/services/aisexec.if +++ b/policy/modules/services/aisexec.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/amavis.if b/policy/modules/services/amavis.if index 15c6df1..adb3d5f 100644 --- a/policy/modules/services/amavis.if +++ b/policy/modules/services/amavis.if @@ -28,7 +28,7 @@ interface(`amavis_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if index 57feb5a..a534ee7 100644 --- a/policy/modules/services/apache.if +++ b/policy/modules/services/apache.if @@ -299,7 +299,7 @@ interface(`apache_read_user_content',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -391,7 +391,7 @@ interface(`apache_use_fds',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -410,7 +410,7 @@ interface(`apache_dontaudit_rw_fifo_file',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -429,7 +429,7 @@ interface(`apache_dontaudit_rw_stream_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -615,7 +615,7 @@ interface(`apache_domtrans_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -785,7 +785,7 @@ interface(`apache_exec_modules',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -848,7 +848,7 @@ interface(`apache_manage_sys_content',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -872,7 +872,7 @@ interface(`apache_domtrans_sys_script',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -891,7 +891,7 @@ interface(`apache_dontaudit_rw_sys_script_stream_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -911,7 +911,7 @@ interface(`apache_domtrans_all_scripts',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -991,7 +991,7 @@ interface(`apache_search_sys_content',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -1054,7 +1054,7 @@ interface(`apache_manage_all_user_content',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -1093,7 +1093,7 @@ interface(`apache_read_tmp_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/apcupsd.if b/policy/modules/services/apcupsd.if index acd4956..e342775 100644 --- a/policy/modules/services/apcupsd.if +++ b/policy/modules/services/apcupsd.if @@ -25,7 +25,7 @@ interface(`apcupsd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -84,7 +84,7 @@ interface(`apcupsd_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/apm.if b/policy/modules/services/apm.if index 77d31b9..1ea99b2 100644 --- a/policy/modules/services/apm.if +++ b/policy/modules/services/apm.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/arpwatch.if b/policy/modules/services/arpwatch.if index d41aee1..c804110 100644 --- a/policy/modules/services/arpwatch.if +++ b/policy/modules/services/arpwatch.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/asterisk.if b/policy/modules/services/asterisk.if index 57d74bd..8b8143e 100644 --- a/policy/modules/services/asterisk.if +++ b/policy/modules/services/asterisk.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if index 904f700..d80a16b 100644 --- a/policy/modules/services/automount.if +++ b/policy/modules/services/automount.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -95,7 +95,7 @@ interface(`automount_dontaudit_use_fds',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/avahi.if b/policy/modules/services/avahi.if index a5e598e..210ca0b 100644 --- a/policy/modules/services/avahi.if +++ b/policy/modules/services/avahi.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -119,7 +119,7 @@ interface(`avahi_stream_connect',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/bind.if b/policy/modules/services/bind.if index ec677f6..b52e3a1 100644 --- a/policy/modules/services/bind.if +++ b/policy/modules/services/bind.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -24,7 +24,7 @@ interface(`bind_initrc_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -97,7 +97,7 @@ interface(`bind_kill',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -122,7 +122,7 @@ interface(`bind_run_ndc',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if index fa38f57..9ec737f 100644 --- a/policy/modules/services/bluetooth.if +++ b/policy/modules/services/bluetooth.if @@ -64,7 +64,7 @@ interface(`bluetooth_stream_connect',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -121,7 +121,7 @@ interface(`bluetooth_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -136,7 +136,7 @@ interface(`bluetooth_domtrans_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -161,7 +161,7 @@ interface(`bluetooth_run_helper',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/certmonger.if b/policy/modules/services/certmonger.if index 95a9290..a3728d4 100644 --- a/policy/modules/services/certmonger.if +++ b/policy/modules/services/certmonger.if @@ -45,7 +45,7 @@ interface(`certmonger_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if index 16e4342..9a0da94 100644 --- a/policy/modules/services/chronyd.if +++ b/policy/modules/services/chronyd.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/clamav.if b/policy/modules/services/clamav.if index ecb594c..1f11572 100644 --- a/policy/modules/services/clamav.if +++ b/policy/modules/services/clamav.if @@ -24,7 +24,7 @@ interface(`clamav_domtrans',` ## ## ## -## Domain allowed to connect. +## Domain allowed access. ## ## # @@ -101,7 +101,7 @@ interface(`clamav_search_lib',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/clockspeed.if b/policy/modules/services/clockspeed.if index 7762be6..0ca7701 100644 --- a/policy/modules/services/clockspeed.if +++ b/policy/modules/services/clockspeed.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -24,7 +24,7 @@ interface(`clockspeed_domtrans_cli',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if index 9f7dd57..293e08d 100644 --- a/policy/modules/services/cobbler.if +++ b/policy/modules/services/cobbler.if @@ -34,7 +34,7 @@ interface(`cobblerd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -72,7 +72,7 @@ interface(`cobbler_read_config',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if index 5318dce..5220c9d 100644 --- a/policy/modules/services/corosync.if +++ b/policy/modules/services/corosync.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/courier.if b/policy/modules/services/courier.if index 6192cc3..37b03f6 100644 --- a/policy/modules/services/courier.if +++ b/policy/modules/services/courier.if @@ -90,7 +90,7 @@ template(`courier_domain_template',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -109,7 +109,7 @@ interface(`courier_domtrans_authdaemon',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -201,7 +201,7 @@ interface(`courier_read_spool',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if index 06ff274..35241ed 100644 --- a/policy/modules/services/cron.if +++ b/policy/modules/services/cron.if @@ -272,7 +272,7 @@ interface(`cron_system_entry',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -308,7 +308,7 @@ interface(`cron_exec',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -381,7 +381,7 @@ interface(`cron_read_pipes',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -435,7 +435,7 @@ interface(`cron_rw_tcp_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -453,7 +453,7 @@ interface(`cron_dontaudit_rw_tcp_sockets',` ## ## ## -## The type of the process to performing this action. +## Domain allowed access. ## ## # @@ -490,7 +490,7 @@ interface(`cron_manage_pid_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/cups.if b/policy/modules/services/cups.if index 9a751a1..305ddf4 100644 --- a/policy/modules/services/cups.if +++ b/policy/modules/services/cups.if @@ -33,7 +33,7 @@ interface(`cups_backend',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -124,7 +124,7 @@ interface(`cups_read_pid_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/dbus.if b/policy/modules/services/dbus.if index d76131b..39e901a 100644 --- a/policy/modules/services/dbus.if +++ b/policy/modules/services/dbus.if @@ -172,7 +172,7 @@ template(`dbus_role_template',` ## ## ## -## The type of the domain. +## Domain allowed access. ## ## # @@ -202,7 +202,7 @@ interface(`dbus_system_bus_client',` ## ## ## -## The type of the domain. +## Domain allowed access. ## ## # @@ -449,7 +449,7 @@ interface(`dbus_system_domain',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/dcc.if b/policy/modules/services/dcc.if index 7073379..1a35213 100644 --- a/policy/modules/services/dcc.if +++ b/policy/modules/services/dcc.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`dcc_domtrans_cdcc',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -51,7 +51,7 @@ interface(`dcc_run_cdcc',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -89,7 +89,7 @@ interface(`dcc_signal_client',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -114,7 +114,7 @@ interface(`dcc_run_client',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -134,7 +134,7 @@ interface(`dcc_domtrans_dbclean',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/ddclient.if b/policy/modules/services/ddclient.if index ead762a..0a1a61b 100644 --- a/policy/modules/services/ddclient.if +++ b/policy/modules/services/ddclient.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`ddclient_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/denyhosts.if b/policy/modules/services/denyhosts.if index de7e074..567865f 100644 --- a/policy/modules/services/denyhosts.if +++ b/policy/modules/services/denyhosts.if @@ -32,7 +32,7 @@ interface(`denyhosts_domtrans', ` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/dhcp.if b/policy/modules/services/dhcp.if index 0d9f10c..5e2cea8 100644 --- a/policy/modules/services/dhcp.if +++ b/policy/modules/services/dhcp.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -45,7 +45,7 @@ interface(`dhcpd_setattr_state_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if index a4840a7..9bd812b 100644 --- a/policy/modules/services/dnsmasq.if +++ b/policy/modules/services/dnsmasq.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`dnsmasq_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -102,7 +102,7 @@ interface(`dnsmasq_kill',` ## ## ## -## Domain allowed. +## Domain allowed access. ## ## # @@ -121,7 +121,7 @@ interface(`dnsmasq_read_config',` ## ## ## -## Domain allowed. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/dovecot.if b/policy/modules/services/dovecot.if index eed4e6c..e1d7dc5 100644 --- a/policy/modules/services/dovecot.if +++ b/policy/modules/services/dovecot.if @@ -25,7 +25,7 @@ interface(`dovecot_stream_connect_auth',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/exim.if b/policy/modules/services/exim.if index 88c5ede..6bef7f8 100644 --- a/policy/modules/services/exim.if +++ b/policy/modules/services/exim.if @@ -43,7 +43,7 @@ interface(`exim_dontaudit_read_tmp_files',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -102,7 +102,7 @@ interface(`exim_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/fail2ban.if b/policy/modules/services/fail2ban.if index 43dd962..f590a1f 100644 --- a/policy/modules/services/fail2ban.if +++ b/policy/modules/services/fail2ban.if @@ -103,7 +103,7 @@ interface(`fail2ban_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/finger.if b/policy/modules/services/finger.if index cda687c..b5dd671 100644 --- a/policy/modules/services/finger.if +++ b/policy/modules/services/finger.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/ftp.if b/policy/modules/services/ftp.if index dfa52fd..bc27421 100644 --- a/policy/modules/services/ftp.if +++ b/policy/modules/services/ftp.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -95,7 +95,7 @@ interface(`ftp_read_log',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -114,7 +114,7 @@ interface(`ftp_domtrans_ftpdctl',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -139,7 +139,7 @@ interface(`ftp_run_ftpdctl',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/gnomeclock.if b/policy/modules/services/gnomeclock.if index 716006b..b1e5d0c 100644 --- a/policy/modules/services/gnomeclock.if +++ b/policy/modules/services/gnomeclock.if @@ -25,7 +25,7 @@ interface(`gnomeclock_domtrans',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/gpm.if b/policy/modules/services/gpm.if index 1fecb11..7d97298 100644 --- a/policy/modules/services/gpm.if +++ b/policy/modules/services/gpm.if @@ -48,7 +48,7 @@ interface(`gpm_getattr_gpmctl',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/gpsd.if b/policy/modules/services/gpsd.if index 39fc12f..c2134ca 100644 --- a/policy/modules/services/gpsd.if +++ b/policy/modules/services/gpsd.if @@ -25,7 +25,7 @@ interface(`gpsd_domtrans',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/hal.if b/policy/modules/services/hal.if index 2aa3808..7cf6763 100644 --- a/policy/modules/services/hal.if +++ b/policy/modules/services/hal.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -42,7 +42,7 @@ interface(`hal_getattr',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -78,7 +78,7 @@ interface(`hal_ptrace',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -115,7 +115,7 @@ interface(`hal_dontaudit_use_fds',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -190,7 +190,7 @@ interface(`hal_stream_connect',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -248,7 +248,7 @@ interface(`hal_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -287,7 +287,7 @@ interface(`hal_write_log',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -344,7 +344,7 @@ interface(`hal_read_tmp_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/icecast.if b/policy/modules/services/icecast.if index 96ab892..ecab47a 100644 --- a/policy/modules/services/icecast.if +++ b/policy/modules/services/icecast.if @@ -42,7 +42,7 @@ interface(`icecast_signal',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/inetd.if b/policy/modules/services/inetd.if index 59d9778..df48e5e 100644 --- a/policy/modules/services/inetd.if +++ b/policy/modules/services/inetd.if @@ -159,7 +159,7 @@ interface(`inetd_tcp_connect',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/inn.if b/policy/modules/services/inn.if index 1240337..ebc9e0d 100644 --- a/policy/modules/services/inn.if +++ b/policy/modules/services/inn.if @@ -162,7 +162,7 @@ interface(`inn_dgram_send',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/kerneloops.if b/policy/modules/services/kerneloops.if index 29f8c16..835b16b 100644 --- a/policy/modules/services/kerneloops.if +++ b/policy/modules/services/kerneloops.if @@ -47,7 +47,7 @@ interface(`kerneloops_dbus_chat',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -67,7 +67,7 @@ interface(`kerneloops_dontaudit_dbus_chat',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/ksmtuned.if b/policy/modules/services/ksmtuned.if index 67e9269..6fd0b4c 100644 --- a/policy/modules/services/ksmtuned.if +++ b/policy/modules/services/ksmtuned.if @@ -24,7 +24,7 @@ interface(`ksmtuned_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/lpd.if b/policy/modules/services/lpd.if index c358cd7..647ed3a 100644 --- a/policy/modules/services/lpd.if +++ b/policy/modules/services/lpd.if @@ -40,7 +40,7 @@ interface(`lpd_role',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -59,7 +59,7 @@ interface(`lpd_domtrans_checkpc',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -182,7 +182,7 @@ interface(`lpd_read_config',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/mailman.if b/policy/modules/services/mailman.if index 9ad4c4e..67c7fdd 100644 --- a/policy/modules/services/mailman.if +++ b/policy/modules/services/mailman.if @@ -96,7 +96,7 @@ template(`mailman_domain_template', ` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -115,7 +115,7 @@ interface(`mailman_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -339,7 +339,7 @@ interface(`mailman_read_archive',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/mta.if b/policy/modules/services/mta.if index c57356a..343cee3 100644 --- a/policy/modules/services/mta.if +++ b/policy/modules/services/mta.if @@ -344,7 +344,7 @@ interface(`mta_mailserver_user_agent',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -380,7 +380,7 @@ interface(`mta_send_mail',` ## ## ## -## Domain to transition from. +## Domain allowed to transition. ## ## ## @@ -562,7 +562,7 @@ interface(`mta_rw_aliases',` ## ## ## -## Mail server domain. +## Domain to not audit. ## ## # @@ -580,7 +580,7 @@ interface(`mta_dontaudit_rw_delivery_tcp_sockets',` ## ## ## -## Mail server domain. +## Domain allowed access. ## ## # @@ -595,7 +595,7 @@ interface(`mta_tcp_connect_all_mailservers',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/munin.if b/policy/modules/services/munin.if index cb4832e..c358d8f 100644 --- a/policy/modules/services/munin.if +++ b/policy/modules/services/munin.if @@ -139,7 +139,7 @@ interface(`munin_search_lib',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/mysql.if b/policy/modules/services/mysql.if index 1e4b4d5..e9c0982 100644 --- a/policy/modules/services/mysql.if +++ b/policy/modules/services/mysql.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -261,7 +261,7 @@ interface(`mysql_write_log',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nagios.if b/policy/modules/services/nagios.if index b487ec9..8581040 100644 --- a/policy/modules/services/nagios.if +++ b/policy/modules/services/nagios.if @@ -164,7 +164,7 @@ interface(`nagios_read_tmp_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/networkmanager.if b/policy/modules/services/networkmanager.if index 18f657e..2324d9e 100644 --- a/policy/modules/services/networkmanager.if +++ b/policy/modules/services/networkmanager.if @@ -83,7 +83,7 @@ interface(`networkmanager_rw_routing_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -102,7 +102,7 @@ interface(`networkmanager_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nis.if b/policy/modules/services/nis.if index b9e7d40..788a6e7 100644 --- a/policy/modules/services/nis.if +++ b/policy/modules/services/nis.if @@ -118,7 +118,7 @@ interface(`nis_authenticate',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -138,7 +138,7 @@ interface(`nis_domtrans_ypbind',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -285,7 +285,7 @@ interface(`nis_read_ypserv_config',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -304,7 +304,7 @@ interface(`nis_domtrans_ypxfr',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -323,7 +323,7 @@ interface(`nis_initrc_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nscd.if b/policy/modules/services/nscd.if index 429bd9f..24aa55c 100644 --- a/policy/modules/services/nscd.if +++ b/policy/modules/services/nscd.if @@ -60,7 +60,7 @@ interface(`nscd_signull',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -159,7 +159,7 @@ interface(`nscd_shm_use',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -216,7 +216,7 @@ interface(`nscd_unconfined',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ## @@ -240,7 +240,7 @@ interface(`nscd_run',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nslcd.if b/policy/modules/services/nslcd.if index 01d6be9..23c769c 100644 --- a/policy/modules/services/nslcd.if +++ b/policy/modules/services/nslcd.if @@ -24,7 +24,7 @@ interface(`nslcd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -61,7 +61,7 @@ interface(`nslcd_read_pid_files',` ## ## ## -## Domain allowed to connect. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/ntp.if b/policy/modules/services/ntp.if index c42c7ab..e80f8c0 100644 --- a/policy/modules/services/ntp.if +++ b/policy/modules/services/ntp.if @@ -22,7 +22,7 @@ interface(`ntp_stub',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -42,7 +42,7 @@ interface(`ntp_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -67,7 +67,7 @@ interface(`ntp_run',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -86,7 +86,7 @@ interface(`ntp_domtrans_ntpdate',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/nx.if b/policy/modules/services/nx.if index ccc68c7..79a225c 100644 --- a/policy/modules/services/nx.if +++ b/policy/modules/services/nx.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/oav.if b/policy/modules/services/oav.if index 2102b0b..d781cce 100644 --- a/policy/modules/services/oav.if +++ b/policy/modules/services/oav.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`oav_domtrans_update',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/oddjob.if b/policy/modules/services/oddjob.if index 6433998..bd76ec2 100644 --- a/policy/modules/services/oddjob.if +++ b/policy/modules/services/oddjob.if @@ -91,7 +91,7 @@ interface(`oddjob_domtrans_mkhomedir',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/openca.if b/policy/modules/services/openca.if index 43bb38b..a8c1eef 100644 --- a/policy/modules/services/openca.if +++ b/policy/modules/services/openca.if @@ -7,7 +7,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/openvpn.if b/policy/modules/services/openvpn.if index aab6297..c440593 100644 --- a/policy/modules/services/openvpn.if +++ b/policy/modules/services/openvpn.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`openvpn_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/policykit.if b/policy/modules/services/policykit.if index 4dbbc70..b90700c 100644 --- a/policy/modules/services/policykit.if +++ b/policy/modules/services/policykit.if @@ -46,7 +46,7 @@ interface(`policykit_domtrans_auth',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -89,7 +89,7 @@ interface(`policykit_domtrans_grant',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/portmap.if b/policy/modules/services/portmap.if index 9901e89..72acea1 100644 --- a/policy/modules/services/portmap.if +++ b/policy/modules/services/portmap.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -27,7 +27,7 @@ interface(`portmap_domtrans_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/postfix.if b/policy/modules/services/postfix.if index ec895ee..f520c19 100644 --- a/policy/modules/services/postfix.if +++ b/policy/modules/services/postfix.if @@ -263,7 +263,7 @@ interface(`postfix_rw_local_pipes',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -281,7 +281,7 @@ interface(`postfix_read_local_state',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -319,7 +319,7 @@ interface(`postfix_dontaudit_use_fds',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -338,7 +338,7 @@ interface(`postfix_domtrans_map',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -364,7 +364,7 @@ interface(`postfix_run_map',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -421,7 +421,7 @@ interface(`postfix_stream_connect_master',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -440,7 +440,7 @@ interface(`postfix_domtrans_postdrop',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -515,7 +515,7 @@ interface(`postfix_manage_private_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/postgresql.if b/policy/modules/services/postgresql.if index 394031b..539a7c9 100644 --- a/policy/modules/services/postgresql.if +++ b/policy/modules/services/postgresql.if @@ -223,7 +223,7 @@ interface(`postgresql_manage_db',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -241,7 +241,7 @@ interface(`postgresql_domtrans',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/postgrey.if b/policy/modules/services/postgrey.if index 3927880..ad15fde 100644 --- a/policy/modules/services/postgrey.if +++ b/policy/modules/services/postgrey.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed to talk to postgrey +## Domain allowed access. ## ## # @@ -26,7 +26,7 @@ interface(`postgrey_stream_connect',` ## ## ## -## Domain allowed access +## Domain allowed access. ## ## # diff --git a/policy/modules/services/ppp.if b/policy/modules/services/ppp.if index 4789268..b524673 100644 --- a/policy/modules/services/ppp.if +++ b/policy/modules/services/ppp.if @@ -117,7 +117,7 @@ interface(`ppp_signull',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -136,7 +136,7 @@ interface(`ppp_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -164,7 +164,7 @@ interface(`ppp_run_cond',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -326,7 +326,7 @@ interface(`ppp_pid_filetrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/prelude.if b/policy/modules/services/prelude.if index 737be4f..2316653 100644 --- a/policy/modules/services/prelude.if +++ b/policy/modules/services/prelude.if @@ -79,7 +79,7 @@ interface(`prelude_read_spool',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/procmail.if b/policy/modules/services/procmail.if index f68e025..b64b02f 100644 --- a/policy/modules/services/procmail.if +++ b/policy/modules/services/procmail.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/puppet.if b/policy/modules/services/puppet.if index 34946a2..2855a44 100644 --- a/policy/modules/services/puppet.if +++ b/policy/modules/services/puppet.if @@ -17,7 +17,7 @@ ## ## ## -## Domain allowed access +## Domain allowed access. ## ## # diff --git a/policy/modules/services/pyzor.if b/policy/modules/services/pyzor.if index 3745b62..494f7e2 100644 --- a/policy/modules/services/pyzor.if +++ b/policy/modules/services/pyzor.if @@ -55,7 +55,7 @@ interface(`pyzor_signal',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/qmail.if b/policy/modules/services/qmail.if index 27fd19e..a55bf44 100644 --- a/policy/modules/services/qmail.if +++ b/policy/modules/services/qmail.if @@ -53,7 +53,7 @@ template(`qmail_child_domain_template',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## # @@ -79,7 +79,7 @@ interface(`qmail_domtrans_inject',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/razor.if b/policy/modules/services/razor.if index f4a355f..f04a595 100644 --- a/policy/modules/services/razor.if +++ b/policy/modules/services/razor.if @@ -146,7 +146,7 @@ interface(`razor_role',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/remotelogin.if b/policy/modules/services/remotelogin.if index 114f2c2..31be971 100644 --- a/policy/modules/services/remotelogin.if +++ b/policy/modules/services/remotelogin.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rgmanager.if b/policy/modules/services/rgmanager.if index 4504355..7dc38d1 100644 --- a/policy/modules/services/rgmanager.if +++ b/policy/modules/services/rgmanager.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rhcs.if b/policy/modules/services/rhcs.if index 6b7eb35..de37806 100644 --- a/policy/modules/services/rhcs.if +++ b/policy/modules/services/rhcs.if @@ -120,7 +120,7 @@ interface(`rhcs_rw_dlm_controld_semaphores',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -180,7 +180,7 @@ interface(`rhcs_stream_connect_fenced',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -260,7 +260,7 @@ interface(`rhcs_stream_connect_gfs_controld',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -341,7 +341,7 @@ interface(`rhcs_rw_groupd_shm',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rhgb.if b/policy/modules/services/rhgb.if index 46681c8..96efae7 100644 --- a/policy/modules/services/rhgb.if +++ b/policy/modules/services/rhgb.if @@ -95,7 +95,7 @@ interface(`rhgb_rw_stream_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -167,7 +167,7 @@ interface(`rhgb_use_ptys',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/ricci.if b/policy/modules/services/ricci.if index 700467c..f7826f9 100644 --- a/policy/modules/services/ricci.if +++ b/policy/modules/services/ricci.if @@ -43,7 +43,7 @@ interface(`ricci_domtrans_modcluster',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -62,7 +62,7 @@ interface(`ricci_dontaudit_use_modcluster_fds',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # diff --git a/policy/modules/services/rlogin.if b/policy/modules/services/rlogin.if index ba3364d..63e78c6 100644 --- a/policy/modules/services/rlogin.if +++ b/policy/modules/services/rlogin.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rpc.if b/policy/modules/services/rpc.if index 005f516..cda37bb 100644 --- a/policy/modules/services/rpc.if +++ b/policy/modules/services/rpc.if @@ -143,7 +143,7 @@ interface(`rpc_udp_send',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -197,7 +197,7 @@ interface(`rpc_write_exports',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -215,7 +215,7 @@ interface(`rpc_domtrans_nfsd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -233,7 +233,7 @@ interface(`rpc_initrc_domtrans_nfsd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -252,7 +252,7 @@ interface(`rpc_domtrans_rpcd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rshd.if b/policy/modules/services/rshd.if index 92bcded..2e87d76 100644 --- a/policy/modules/services/rshd.if +++ b/policy/modules/services/rshd.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/rsync.if b/policy/modules/services/rsync.if index 6a2d345..3386f29 100644 --- a/policy/modules/services/rsync.if +++ b/policy/modules/services/rsync.if @@ -35,7 +35,7 @@ interface(`rsync_entry_type',` ## ## ## -## Domain to transition from. +## Domain allowed to transition. ## ## ## @@ -68,7 +68,7 @@ interface(`rsync_entry_spec_domtrans',` ## ## ## -## Domain to transition from. +## Domain allowed to transition. ## ## ## @@ -110,7 +110,7 @@ interface(`rsync_exec',` ## ## ## -## Domain allowed. +## Domain allowed access. ## ## # @@ -129,7 +129,7 @@ interface(`rsync_read_config',` ## ## ## -## Domain allowed. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/samba.if b/policy/modules/services/samba.if index 086c9b5..87d871f 100644 --- a/policy/modules/services/samba.if +++ b/policy/modules/services/samba.if @@ -10,7 +10,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -46,7 +46,7 @@ interface(`samba_signal_nmbd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -64,7 +64,7 @@ interface(`samba_initrc_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -84,7 +84,7 @@ interface(`samba_domtrans_net',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -109,7 +109,7 @@ interface(`samba_run_net',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -129,7 +129,7 @@ interface(`samba_domtrans_smbmount',` ## ## ## -## Domain allowed acces. +## Domain allowed to transition. ## ## ## @@ -360,7 +360,7 @@ interface(`samba_read_var_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -440,7 +440,7 @@ interface(`samba_domtrans_smbcontrol',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ## @@ -464,7 +464,7 @@ interface(`samba_run_smbcontrol',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -554,7 +554,7 @@ interface(`samba_rw_smbmount_tcp_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -573,7 +573,7 @@ interface(`samba_domtrans_winbind_helper',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/sendmail.if b/policy/modules/services/sendmail.if index e4f4051..7e94c7c 100644 --- a/policy/modules/services/sendmail.if +++ b/policy/modules/services/sendmail.if @@ -23,7 +23,7 @@ interface(`sendmail_stub',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -41,7 +41,7 @@ interface(`sendmail_rw_pipes',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -63,7 +63,7 @@ interface(`sendmail_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -162,7 +162,7 @@ interface(`sendmail_rw_unix_stream_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -257,7 +257,7 @@ interface(`sendmail_manage_tmp_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -277,7 +277,7 @@ interface(`sendmail_domtrans_unconfined',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/services/setroubleshoot.if b/policy/modules/services/setroubleshoot.if index c09053b..22dfeb4 100644 --- a/policy/modules/services/setroubleshoot.if +++ b/policy/modules/services/setroubleshoot.if @@ -27,7 +27,7 @@ interface(`setroubleshoot_stream_connect',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/slrnpull.if b/policy/modules/services/slrnpull.if index 66a80b3..d7e8289 100644 --- a/policy/modules/services/slrnpull.if +++ b/policy/modules/services/slrnpull.if @@ -6,7 +6,7 @@ ## ## ## -## domain allowed access +## Domain allowed access. ## ## # @@ -26,7 +26,7 @@ interface(`slrnpull_search_spool',` ## ## ## -## domain allowed access +## Domain allowed access. ## ## # diff --git a/policy/modules/services/smartmon.if b/policy/modules/services/smartmon.if index f3d8459..adea9f9 100644 --- a/policy/modules/services/smartmon.if +++ b/policy/modules/services/smartmon.if @@ -6,7 +6,7 @@ ## ## ## -## The process type reading the temporary files. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/smokeping.if b/policy/modules/services/smokeping.if index 6be6642..824d206 100644 --- a/policy/modules/services/smokeping.if +++ b/policy/modules/services/smokeping.if @@ -24,7 +24,7 @@ interface(`smokeping_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/spamassassin.if b/policy/modules/services/spamassassin.if index d159ef3..c954f31 100644 --- a/policy/modules/services/spamassassin.if +++ b/policy/modules/services/spamassassin.if @@ -101,7 +101,7 @@ interface(`spamassassin_exec_spamd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -138,7 +138,7 @@ interface(`spamassassin_exec_client',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/squid.if b/policy/modules/services/squid.if index 2fe24de..d2496bd 100644 --- a/policy/modules/services/squid.if +++ b/policy/modules/services/squid.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/ssh.if b/policy/modules/services/ssh.if index 567592d..5437ffb 100644 --- a/policy/modules/services/ssh.if +++ b/policy/modules/services/ssh.if @@ -572,7 +572,7 @@ interface(`ssh_tcp_connect',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -668,7 +668,7 @@ interface(`ssh_read_user_home_files',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -686,7 +686,7 @@ interface(`ssh_domtrans_keygen',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/sssd.if b/policy/modules/services/sssd.if index 5eff513..941380a 100644 --- a/policy/modules/services/sssd.if +++ b/policy/modules/services/sssd.if @@ -24,7 +24,7 @@ interface(`sssd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/tcpd.if b/policy/modules/services/tcpd.if index 9de6298..2075ebb 100644 --- a/policy/modules/services/tcpd.if +++ b/policy/modules/services/tcpd.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/ulogd.if b/policy/modules/services/ulogd.if index d04b833..b078bf7 100644 --- a/policy/modules/services/ulogd.if +++ b/policy/modules/services/ulogd.if @@ -66,7 +66,7 @@ interface(`ulogd_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/uucp.if b/policy/modules/services/uucp.if index 36b936a..a4fbe31 100644 --- a/policy/modules/services/uucp.if +++ b/policy/modules/services/uucp.if @@ -49,7 +49,7 @@ interface(`uucp_manage_spool',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/uwimap.if b/policy/modules/services/uwimap.if index 4334b28..8337684 100644 --- a/policy/modules/services/uwimap.if +++ b/policy/modules/services/uwimap.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/varnishd.if b/policy/modules/services/varnishd.if index 597679d..b4d90ac 100644 --- a/policy/modules/services/varnishd.if +++ b/policy/modules/services/varnishd.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/vhostmd.if b/policy/modules/services/vhostmd.if index a10dc80..1f872b5 100644 --- a/policy/modules/services/vhostmd.if +++ b/policy/modules/services/vhostmd.if @@ -24,7 +24,7 @@ interface(`vhostmd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -42,7 +42,7 @@ interface(`vhostmd_initrc_domtrans',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -80,7 +80,7 @@ interface(`vhostmd_dontaudit_read_tmpfs_files',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -99,7 +99,7 @@ interface(`vhostmd_rw_tmpfs_files',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -175,7 +175,7 @@ interface(`vhostmd_stream_connect',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if index 7bb17f6..7c5d8d8 100644 --- a/policy/modules/services/virt.if +++ b/policy/modules/services/virt.if @@ -200,7 +200,7 @@ interface(`virt_manage_config',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -353,7 +353,7 @@ interface(`virt_read_log',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # @@ -372,7 +372,7 @@ interface(`virt_append_log',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -392,7 +392,7 @@ interface(`virt_manage_log',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -450,7 +450,7 @@ interface(`virt_manage_svirt_cache',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if index 8633a6a..0a0cf76 100644 --- a/policy/modules/services/xserver.if +++ b/policy/modules/services/xserver.if @@ -535,7 +535,7 @@ interface(`xserver_use_user_fonts',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -864,7 +864,7 @@ interface(`xserver_xsession_entry_type',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -907,7 +907,7 @@ interface(`xserver_getattr_log',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -926,7 +926,7 @@ interface(`xserver_dontaudit_write_log',` ## ## ## -## Domain to not audit +## Domain to allowed access. ## ## # @@ -947,7 +947,7 @@ interface(`xserver_delete_log',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -968,7 +968,7 @@ interface(`xserver_read_xkb_libs',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -987,7 +987,7 @@ interface(`xserver_read_xdm_tmp_files',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1006,7 +1006,7 @@ interface(`xserver_dontaudit_read_xdm_tmp_files',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -1025,7 +1025,7 @@ interface(`xserver_rw_xdm_tmp_files',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -1043,7 +1043,7 @@ interface(`xserver_manage_xdm_tmp_files',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1061,7 +1061,7 @@ interface(`xserver_dontaudit_getattr_xdm_tmp_sockets',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -1080,7 +1080,7 @@ interface(`xserver_domtrans',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -1098,7 +1098,7 @@ interface(`xserver_signal',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -1136,7 +1136,7 @@ interface(`xserver_rw_shm',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1155,7 +1155,7 @@ interface(`xserver_dontaudit_rw_tcp_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1193,7 +1193,7 @@ interface(`xserver_stream_connect',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # diff --git a/policy/modules/services/zosremote.if b/policy/modules/services/zosremote.if index f2f2389..53338c4 100644 --- a/policy/modules/services/zosremote.if +++ b/policy/modules/services/zosremote.if @@ -26,7 +26,7 @@ interface(`zosremote_domtrans',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## ## -- 1.7.2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 198 bytes Desc: not available Url : http://oss.tresys.com/pipermail/refpolicy/attachments/20100803/99cf1d56/attachment-0001.bin