selinux-policy/fix_openvpn.patch
Johannes Segitz cf699a6f0f Accepting request 785956 from home:jsegitz:branches:security:SELinux
- New patches:
  * fix_accountsd.patch
  * fix_automount.patch
  * fix_colord.patch
  * fix_mcelog.patch
  * fix_sslh.patch
  * fix_nagios.patch
  * fix_openvpn.patch
  * fix_cron.patch
  * fix_usermanage.patch
  * fix_smartmon.patch
  * fix_geoclue.patch
  * suse_specific.patch
  Default systems should now work without selinuxuser_execmod
- Removed xdm_entrypoint_pam.patch, necessary change is in
  fix_unconfineduser.patch
- Enable SUSE specific settings again

OBS-URL: https://build.opensuse.org/request/show/785956
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=75
2020-03-17 14:46:20 +00:00

42 lines
1.1 KiB
Diff

Index: fedora-policy/policy/modules/contrib/openvpn.te
===================================================================
--- fedora-policy.orig/policy/modules/contrib/openvpn.te
+++ fedora-policy/policy/modules/contrib/openvpn.te
@@ -28,6 +28,14 @@ gen_tunable(openvpn_enable_homedirs, fal
## </desc>
gen_tunable(openvpn_can_network_connect, true)
+## <desc>
+## <p>
+## Determine whether openvpn can
+## change sysctl values (e.g. rp_filter)
+## </p>
+## </desc>
+gen_tunable(openvpn_allow_changing_sysctls, false)
+
attribute_role openvpn_roles;
type openvpn_t;
@@ -176,6 +184,10 @@ userdom_attach_admin_tun_iface(openvpn_t
userdom_read_inherited_user_tmp_files(openvpn_t)
userdom_read_inherited_user_home_content_files(openvpn_t)
+tunable_policy(`openvpn_allow_changing_sysctls',`
+ kernel_rw_net_sysctls(openvpn_t)
+')
+
tunable_policy(`openvpn_enable_homedirs',`
userdom_search_user_home_dirs(openvpn_t)
')
@@ -195,6 +207,10 @@ tunable_policy(`openvpn_can_network_conn
')
optional_policy(`
+ firewalld_dbus_chat(openvpn_t)
+')
+
+optional_policy(`
brctl_domtrans(openvpn_t)
')