-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Fri, Jul 11, 2008 at 10:59:13PM +0200, Bastian Blank wrote:
> I'm currently not able to see the problem to push a _fix_, not a
> _workaround_, through stable-security. Please explain.

Pushing a fix to stable-security is easy -- we can patch the needed permission
into refpolicy and ship it out as an update (http://tinyurl.com/5m3oza has a
set of patched packages to do that).  The problem is that with the way the
refpolicy packages work today, this will fix only new installations;
preexisting ones will stay broken.  That will take a little time, and I don't
want to do it without some testing and review, if at all possible with the
refpolicy maintainers themselves -- mistakes in selinux configuration could
either screw us now or set us up for trouble in the future.

In the interim, we can address questions about the near-term breakage with a
documented workaround.  I've drafted one such here:

        http://wiki.debian.org/SELinux/Issues/BindPortRandomization

Edits and clarifications, as well as input on a long-term fix, would be
welcome.


- -- 
Devin  \ aqua(at)devin.com, IRC:Requiem; http://www.devin.com
Carraway \ 1024D/E9ABFCD2: 13E7 199E DD1E 65F0 8905 2E43 5395 CA0D E9AB FCD2
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIfFh3U5XKDemr/NIRAmP2AKCZFYeDzyNYtfrlw5falDubIQZO6gCfQWZi
/rV6aSMzAyt2mZHmBB/1qbo=
=jlYt
-----END PGP SIGNATURE-----



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to