From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id BDE89138334 for ; Sun, 24 Jun 2018 08:46:51 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id BA0ACE0969; Sun, 24 Jun 2018 08:46:47 +0000 (UTC) Received: from smtp.gentoo.org (dev.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 4E717E0969 for ; Sun, 24 Jun 2018 08:46:47 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 953C5335C95 for ; Sun, 24 Jun 2018 08:46:45 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id C0DE730B for ; Sun, 24 Jun 2018 08:46:43 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1528981013.417531b2a24c4ce1da7378579b265abd06a4c983.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/wireshark.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 417531b2a24c4ce1da7378579b265abd06a4c983 X-VCS-Branch: master Date: Sun, 24 Jun 2018 08:46:43 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: d56cdca4-09d9-4c99-8a07-380fbd02e213 X-Archives-Hash: 4777c38781afd0f91c358ba5f465bab6 commit: 417531b2a24c4ce1da7378579b265abd06a4c983 Author: Sven Vermeulen siphos be> AuthorDate: Sun Mar 25 11:57:12 2018 +0000 Commit: Jason Zaman gentoo org> CommitDate: Thu Jun 14 12:56:53 2018 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=417531b2 Make wireshark user content access optional The wireshark application does not need full manage rights on user content. Hence, we make these privileges optional through support of the wireshark_*_user_content booleans. To allow wireshark to read recorded network traffic, wireshark is granted read access on the downloads location. Changes since v1: - Move tunable definition inside template Signed-off-by: Sven Vermeulen siphos.be> policy/modules/contrib/wireshark.te | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/policy/modules/contrib/wireshark.te b/policy/modules/contrib/wireshark.te index 30dd6af8..7eabbc8b 100644 --- a/policy/modules/contrib/wireshark.te +++ b/policy/modules/contrib/wireshark.te @@ -102,8 +102,9 @@ miscfiles_read_localization(wireshark_t) userdom_use_user_terminals(wireshark_t) -userdom_manage_user_home_content_files(wireshark_t) -userdom_user_home_dir_filetrans_user_home_content(wireshark_t, file) +userdom_user_content_access_template(wireshark, wireshark_t) + +xdg_read_downloads(wireshark_t) tunable_policy(`use_nfs_home_dirs',` fs_manage_nfs_dirs(wireshark_t)