Daniel J Walsh wrote:
 > This looks fine for a test policy.  What you have said here is to allow
user_t and secadm_t to bind to all ports that are not labeled.

You could have defined a port, say


gen_require(`
       type secadm_t, sysadm_t, user_t;
       type inaddr_any_node_t;
')
type test_port_t

allow user_t test_port_t:tcp_socket name_bind;
allow secadm_t test_port_t:tcp_socket name_bind;
allow sysadm_t inaddr_any_node_t:tcp_socket node_bind;


Then use semanage to assign ports to test_port_t.

semanage port -a -p tcp -t test_port_t 3333

This would give you a little tighter security and would allow you to
test out some of the other features available with SELinux.

Thank Dan,
I didn't know about the boolean user_tcp_server. I'll set it up and that should take care of the user executing nc correctly.

Thanks for the policy tip as well .. I'll try it :)

- Loulwa

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to