forked from pool/selinux-policy
cf699a6f0f
- New patches: * fix_accountsd.patch * fix_automount.patch * fix_colord.patch * fix_mcelog.patch * fix_sslh.patch * fix_nagios.patch * fix_openvpn.patch * fix_cron.patch * fix_usermanage.patch * fix_smartmon.patch * fix_geoclue.patch * suse_specific.patch Default systems should now work without selinuxuser_execmod - Removed xdm_entrypoint_pam.patch, necessary change is in fix_unconfineduser.patch - Enable SUSE specific settings again OBS-URL: https://build.opensuse.org/request/show/785956 OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=75
42 lines
1.1 KiB
Diff
42 lines
1.1 KiB
Diff
Index: fedora-policy/policy/modules/contrib/openvpn.te
|
|
===================================================================
|
|
--- fedora-policy.orig/policy/modules/contrib/openvpn.te
|
|
+++ fedora-policy/policy/modules/contrib/openvpn.te
|
|
@@ -28,6 +28,14 @@ gen_tunable(openvpn_enable_homedirs, fal
|
|
## </desc>
|
|
gen_tunable(openvpn_can_network_connect, true)
|
|
|
|
+## <desc>
|
|
+## <p>
|
|
+## Determine whether openvpn can
|
|
+## change sysctl values (e.g. rp_filter)
|
|
+## </p>
|
|
+## </desc>
|
|
+gen_tunable(openvpn_allow_changing_sysctls, false)
|
|
+
|
|
attribute_role openvpn_roles;
|
|
|
|
type openvpn_t;
|
|
@@ -176,6 +184,10 @@ userdom_attach_admin_tun_iface(openvpn_t
|
|
userdom_read_inherited_user_tmp_files(openvpn_t)
|
|
userdom_read_inherited_user_home_content_files(openvpn_t)
|
|
|
|
+tunable_policy(`openvpn_allow_changing_sysctls',`
|
|
+ kernel_rw_net_sysctls(openvpn_t)
|
|
+')
|
|
+
|
|
tunable_policy(`openvpn_enable_homedirs',`
|
|
userdom_search_user_home_dirs(openvpn_t)
|
|
')
|
|
@@ -195,6 +207,10 @@ tunable_policy(`openvpn_can_network_conn
|
|
')
|
|
|
|
optional_policy(`
|
|
+ firewalld_dbus_chat(openvpn_t)
|
|
+')
|
|
+
|
|
+optional_policy(`
|
|
brctl_domtrans(openvpn_t)
|
|
')
|
|
|