From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id DAD21138CD6 for ; Mon, 24 Oct 2016 16:57:25 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id C509CE0AEB; Mon, 24 Oct 2016 16:56:37 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id AE781E0AEB for ; Mon, 24 Oct 2016 16:56:37 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id BEDFE341657 for ; Mon, 24 Oct 2016 16:56:35 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 838CC24A0 for ; Mon, 24 Oct 2016 16:56:34 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1477327666.d58ed8ba1ef188c67ec5ecbfc091abb0014dd6e4.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/chromium.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: d58ed8ba1ef188c67ec5ecbfc091abb0014dd6e4 X-VCS-Branch: master Date: Mon, 24 Oct 2016 16:56:34 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: f24b9913-7192-47a2-91bf-55ac0dbf7b88 X-Archives-Hash: 195c46464e08cc5923774022183a9388 commit: d58ed8ba1ef188c67ec5ecbfc091abb0014dd6e4 Author: Jason Zaman perfinion com> AuthorDate: Sun Oct 9 04:37:10 2016 +0000 Commit: Sven Vermeulen gentoo org> CommitDate: Mon Oct 24 16:47:46 2016 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=d58ed8ba chromium: perms for user_cert_t policy/modules/contrib/chromium.te | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/policy/modules/contrib/chromium.te b/policy/modules/contrib/chromium.te index 3185640..10bcd9f 100644 --- a/policy/modules/contrib/chromium.te +++ b/policy/modules/contrib/chromium.te @@ -88,7 +88,8 @@ xdg_cache_home_content(chromium_xdg_cache_t) # chromium local policy # -allow chromium_t self:process { getsched setcap setrlimit setsched sigkill signal }; +# execmem for load in plugins +allow chromium_t self:process { execmem getsched setcap setrlimit setsched sigkill signal }; allow chromium_t self:fifo_file rw_fifo_file_perms;; allow chromium_t self:sem create_sem_perms; allow chromium_t self:netlink_kobject_uevent_socket client_stream_socket_perms; @@ -108,8 +109,6 @@ allow chromium_t chromium_sandbox_t:unix_stream_socket { read write }; allow chromium_t chromium_naclhelper_t:process { share }; -allow chromium_t self:process execmem; # Load in plugins - # tmp has a wide class access (used for plugins) manage_files_pattern(chromium_t, chromium_tmp_t, chromium_tmp_t) manage_dirs_pattern(chromium_t, chromium_tmp_t, chromium_tmp_t) @@ -164,18 +163,17 @@ fs_dontaudit_getattr_xattr_fs(chromium_t) getty_dontaudit_use_fds(chromium_t) -miscfiles_manage_user_certs(chromium_t) miscfiles_read_all_certs(chromium_t) miscfiles_read_localization(chromium_t) -miscfiles_user_home_dir_filetrans_cert_home(chromium_t, dir, ".nss") -miscfiles_user_home_dir_filetrans_cert_home(chromium_t, dir, ".pki") -sysnet_dns_name_resolve(chromium_t) +sysnet_dns_name_resolve(chromium_t) userdom_user_content_access_template(chromium, chromium_t) userdom_dontaudit_list_user_home_dirs(chromium_t) # Debugging. Also on user_tty_device_t if X is started through "startx" for instance userdom_use_user_terminals(chromium_t) +userdom_manage_user_certs(chromium_t) +userdom_user_home_dir_filetrans_user_cert(chromium_t, dir, ".pki") xdg_create_cache_home_dirs(chromium_t) xdg_create_config_home_dirs(chromium_t) @@ -194,6 +192,7 @@ tunable_policy(`chromium_bind_tcp_unreserved_ports',` tunable_policy(`chromium_rw_usb_dev',` dev_rw_generic_usb_dev(chromium_t) + udev_read_db(chromium_t) ') tunable_policy(`chromium_read_system_info',` From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 5D5C3138CD4 for ; Mon, 24 Oct 2016 16:47:59 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id AE1F6E0A69; Mon, 24 Oct 2016 16:47:57 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 95C89E0A69 for ; Mon, 24 Oct 2016 16:47:57 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id B09F2341063 for ; Mon, 24 Oct 2016 16:47:55 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 7E9FE24A0 for ; Mon, 24 Oct 2016 16:47:54 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1477327666.d58ed8ba1ef188c67ec5ecbfc091abb0014dd6e4.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:swift commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/chromium.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: d58ed8ba1ef188c67ec5ecbfc091abb0014dd6e4 X-VCS-Branch: swift Date: Mon, 24 Oct 2016 16:47:54 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 31eef4c3-95d3-4c05-816e-88fdc70c8d62 X-Archives-Hash: 46d4ea63ebfec0c32d6ac01366f2c4c4 Message-ID: <20161024164754.cr3MQ-9LfS7UbUXn0x2BSDf9SMQtUA3jy7gIjNunOSE@z> commit: d58ed8ba1ef188c67ec5ecbfc091abb0014dd6e4 Author: Jason Zaman perfinion com> AuthorDate: Sun Oct 9 04:37:10 2016 +0000 Commit: Sven Vermeulen gentoo org> CommitDate: Mon Oct 24 16:47:46 2016 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=d58ed8ba chromium: perms for user_cert_t policy/modules/contrib/chromium.te | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/policy/modules/contrib/chromium.te b/policy/modules/contrib/chromium.te index 3185640..10bcd9f 100644 --- a/policy/modules/contrib/chromium.te +++ b/policy/modules/contrib/chromium.te @@ -88,7 +88,8 @@ xdg_cache_home_content(chromium_xdg_cache_t) # chromium local policy # -allow chromium_t self:process { getsched setcap setrlimit setsched sigkill signal }; +# execmem for load in plugins +allow chromium_t self:process { execmem getsched setcap setrlimit setsched sigkill signal }; allow chromium_t self:fifo_file rw_fifo_file_perms;; allow chromium_t self:sem create_sem_perms; allow chromium_t self:netlink_kobject_uevent_socket client_stream_socket_perms; @@ -108,8 +109,6 @@ allow chromium_t chromium_sandbox_t:unix_stream_socket { read write }; allow chromium_t chromium_naclhelper_t:process { share }; -allow chromium_t self:process execmem; # Load in plugins - # tmp has a wide class access (used for plugins) manage_files_pattern(chromium_t, chromium_tmp_t, chromium_tmp_t) manage_dirs_pattern(chromium_t, chromium_tmp_t, chromium_tmp_t) @@ -164,18 +163,17 @@ fs_dontaudit_getattr_xattr_fs(chromium_t) getty_dontaudit_use_fds(chromium_t) -miscfiles_manage_user_certs(chromium_t) miscfiles_read_all_certs(chromium_t) miscfiles_read_localization(chromium_t) -miscfiles_user_home_dir_filetrans_cert_home(chromium_t, dir, ".nss") -miscfiles_user_home_dir_filetrans_cert_home(chromium_t, dir, ".pki") -sysnet_dns_name_resolve(chromium_t) +sysnet_dns_name_resolve(chromium_t) userdom_user_content_access_template(chromium, chromium_t) userdom_dontaudit_list_user_home_dirs(chromium_t) # Debugging. Also on user_tty_device_t if X is started through "startx" for instance userdom_use_user_terminals(chromium_t) +userdom_manage_user_certs(chromium_t) +userdom_user_home_dir_filetrans_user_cert(chromium_t, dir, ".pki") xdg_create_cache_home_dirs(chromium_t) xdg_create_config_home_dirs(chromium_t) @@ -194,6 +192,7 @@ tunable_policy(`chromium_bind_tcp_unreserved_ports',` tunable_policy(`chromium_rw_usb_dev',` dev_rw_generic_usb_dev(chromium_t) + udev_read_db(chromium_t) ') tunable_policy(`chromium_read_system_info',` From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 7EFFE138D1A for ; Mon, 24 Oct 2016 17:14:10 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 9E599E0944; Mon, 24 Oct 2016 17:14:03 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 886DEE0944 for ; Mon, 24 Oct 2016 17:14:03 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 930B9341440 for ; Mon, 24 Oct 2016 17:14:02 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id C83E524A2 for ; Mon, 24 Oct 2016 17:13:59 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1477327666.d58ed8ba1ef188c67ec5ecbfc091abb0014dd6e4.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:next commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/chromium.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: d58ed8ba1ef188c67ec5ecbfc091abb0014dd6e4 X-VCS-Branch: next Date: Mon, 24 Oct 2016 17:13:59 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 1169eb29-26ca-4e47-92da-054d23ec326e X-Archives-Hash: f7a143aa37e42560e77a8f4c6b40b0da Message-ID: <20161024171359.gMGszgUVqRBKORKL3Z86L-M2r7B0KNszZgIZzFB4o00@z> commit: d58ed8ba1ef188c67ec5ecbfc091abb0014dd6e4 Author: Jason Zaman perfinion com> AuthorDate: Sun Oct 9 04:37:10 2016 +0000 Commit: Sven Vermeulen gentoo org> CommitDate: Mon Oct 24 16:47:46 2016 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=d58ed8ba chromium: perms for user_cert_t policy/modules/contrib/chromium.te | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/policy/modules/contrib/chromium.te b/policy/modules/contrib/chromium.te index 3185640..10bcd9f 100644 --- a/policy/modules/contrib/chromium.te +++ b/policy/modules/contrib/chromium.te @@ -88,7 +88,8 @@ xdg_cache_home_content(chromium_xdg_cache_t) # chromium local policy # -allow chromium_t self:process { getsched setcap setrlimit setsched sigkill signal }; +# execmem for load in plugins +allow chromium_t self:process { execmem getsched setcap setrlimit setsched sigkill signal }; allow chromium_t self:fifo_file rw_fifo_file_perms;; allow chromium_t self:sem create_sem_perms; allow chromium_t self:netlink_kobject_uevent_socket client_stream_socket_perms; @@ -108,8 +109,6 @@ allow chromium_t chromium_sandbox_t:unix_stream_socket { read write }; allow chromium_t chromium_naclhelper_t:process { share }; -allow chromium_t self:process execmem; # Load in plugins - # tmp has a wide class access (used for plugins) manage_files_pattern(chromium_t, chromium_tmp_t, chromium_tmp_t) manage_dirs_pattern(chromium_t, chromium_tmp_t, chromium_tmp_t) @@ -164,18 +163,17 @@ fs_dontaudit_getattr_xattr_fs(chromium_t) getty_dontaudit_use_fds(chromium_t) -miscfiles_manage_user_certs(chromium_t) miscfiles_read_all_certs(chromium_t) miscfiles_read_localization(chromium_t) -miscfiles_user_home_dir_filetrans_cert_home(chromium_t, dir, ".nss") -miscfiles_user_home_dir_filetrans_cert_home(chromium_t, dir, ".pki") -sysnet_dns_name_resolve(chromium_t) +sysnet_dns_name_resolve(chromium_t) userdom_user_content_access_template(chromium, chromium_t) userdom_dontaudit_list_user_home_dirs(chromium_t) # Debugging. Also on user_tty_device_t if X is started through "startx" for instance userdom_use_user_terminals(chromium_t) +userdom_manage_user_certs(chromium_t) +userdom_user_home_dir_filetrans_user_cert(chromium_t, dir, ".pki") xdg_create_cache_home_dirs(chromium_t) xdg_create_config_home_dirs(chromium_t) @@ -194,6 +192,7 @@ tunable_policy(`chromium_bind_tcp_unreserved_ports',` tunable_policy(`chromium_rw_usb_dev',` dev_rw_generic_usb_dev(chromium_t) + udev_read_db(chromium_t) ') tunable_policy(`chromium_read_system_info',`