From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 8CFF41396D0 for ; Fri, 15 Sep 2017 03:42:48 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id E04BAE0CA7; Fri, 15 Sep 2017 03:42:46 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id B16D2E0C7C for ; Fri, 15 Sep 2017 03:42:46 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id D1E1733BEA7 for ; Fri, 15 Sep 2017 03:42:45 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id DD5499085 for ; Fri, 15 Sep 2017 03:42:42 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1505417684.db15b995c6a8f565f1c6c6ea3334d2d1b4dead2f.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/mta.if policy/modules/contrib/postfix.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: db15b995c6a8f565f1c6c6ea3334d2d1b4dead2f X-VCS-Branch: master Date: Fri, 15 Sep 2017 03:42:42 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 3e26ab82-fcd0-4081-bebb-38e4192b5d9b X-Archives-Hash: 5816a7341bf31742b85842f71d695456 commit: db15b995c6a8f565f1c6c6ea3334d2d1b4dead2f Author: Luis Ressel aixah de> AuthorDate: Tue Sep 12 02:41:57 2017 +0000 Commit: Jason Zaman gentoo org> CommitDate: Thu Sep 14 19:34:44 2017 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=db15b995 postfix: Some table drivers (notably cdb) need to mmap() their databases policy/modules/contrib/mta.if | 18 ++++++++++++++++++ policy/modules/contrib/postfix.te | 8 ++++++-- 2 files changed, 24 insertions(+), 2 deletions(-) diff --git a/policy/modules/contrib/mta.if b/policy/modules/contrib/mta.if index 0602746b..4384caae 100644 --- a/policy/modules/contrib/mta.if +++ b/policy/modules/contrib/mta.if @@ -608,6 +608,24 @@ interface(`mta_read_aliases',` ######################################## ## +## Read mail address alias files. +## +## +## +## Domain allowed access. +## +## +# +interface(`mta_map_aliases',` + gen_require(` + type etc_aliases_t; + ') + + allow $1 etc_aliases_t:file map; +') + +######################################## +## ## Create, read, write, and delete ## mail address alias content. ## diff --git a/policy/modules/contrib/postfix.te b/policy/modules/contrib/postfix.te index 62eaeba3..620e81b1 100644 --- a/policy/modules/contrib/postfix.te +++ b/policy/modules/contrib/postfix.te @@ -115,7 +115,7 @@ allow postfix_domain self:fifo_file rw_fifo_file_perms; allow postfix_domain self:unix_stream_socket { accept connectto listen }; allow postfix_domain postfix_etc_t:dir list_dir_perms; -allow postfix_domain postfix_etc_t:file read_file_perms; +allow postfix_domain postfix_etc_t:file { read_file_perms map }; allow postfix_domain postfix_etc_t:lnk_file read_lnk_file_perms; allow postfix_domain postfix_master_t:file read_file_perms; @@ -405,6 +405,7 @@ corenet_tcp_connect_kismet_port(postfix_cleanup_t) corenet_tcp_sendrecv_kismet_port(postfix_cleanup_t) mta_read_aliases(postfix_cleanup_t) +mta_map_aliases(postfix_cleanup_t) optional_policy(` dkim_stream_connect(postfix_cleanup_t) @@ -436,6 +437,7 @@ logging_dontaudit_search_logs(postfix_local_t) mta_delete_spool(postfix_local_t) mta_read_aliases(postfix_local_t) +mta_map_aliases(postfix_local_t) mta_read_config(postfix_local_t) mta_send_mail(postfix_local_t) @@ -489,7 +491,7 @@ allow postfix_map_t self:capability { dac_override setgid setuid }; allow postfix_map_t self:tcp_socket { accept listen }; allow postfix_map_t postfix_etc_t:dir manage_dir_perms; -allow postfix_map_t postfix_etc_t:file manage_file_perms; +allow postfix_map_t postfix_etc_t:file { manage_file_perms map }; allow postfix_map_t postfix_etc_t:lnk_file manage_lnk_file_perms; manage_dirs_pattern(postfix_map_t, postfix_map_tmp_t, postfix_map_tmp_t) @@ -776,6 +778,7 @@ fs_getattr_all_dirs(postfix_smtpd_t) fs_getattr_all_fs(postfix_smtpd_t) mta_read_aliases(postfix_smtpd_t) +mta_map_aliases(postfix_smtpd_t) optional_policy(` dovecot_stream_connect_auth(postfix_smtpd_t) @@ -817,6 +820,7 @@ stream_connect_pattern(postfix_virtual_t, { postfix_private_t postfix_public_t } corecmd_exec_bin(postfix_virtual_t) mta_read_aliases(postfix_virtual_t) +mta_map_aliases(postfix_virtual_t) mta_delete_spool(postfix_virtual_t) mta_read_config(postfix_virtual_t) mta_manage_spool(postfix_virtual_t)