reassign 463835 leafnode
severity 463835 normal
user [EMAIL PROTECTED]
usertags 463835 selinux
thanks

Hi,

> permission for leafnode to be started.  Since the people working on
> SELinux in Debian have decided to do all SELinux policy work outside of
> the relevant packages any issues like this should be directed to the
> SELinux intainers.

1. selinux-basics doesn't contain SELinux policy, but is a mere utility
package, and thus the bug is not related to it.
2. leafnode _could_ ship a SELinux policy module itself, this does not
need to be included with the regular policy package (it's just easier to
keep policy in sync with upstream by shipping all upstream-provided
policy in one package). Therefore, the correct address is upstream and
the maintainer of the leafnode package. Albeit they're encouraged to
submit their policy to SELinux upstream, for inclusion in the policy
repository.

I'm adding the SELinux tracking usertag, to keep track of this bug
report. Feel free to add a "help" tag, too.

P.S. audit2why is not really well-suited for automatically generating a
policy. In your case, it would treat leafnode as being part of the
inetd. I've never used audit2why, but you'd probably need to do some
file labeling first, then apply audit2why to the generated errors. You
should also use it in permissive mode first, because otherwise it can't
find all required privileges immediately; leafnode will probably quit
once it had the first access denials.
Using the INN policy as a starting point probably is a good idea.
They'll probably overlap a bit anyway (e.g. both access /var/spool/news
I guess?)

best regards,
Erich Schubert
-- 
    erich@(vitavonni.de|debian.org)    --    GPG Key ID: 4B3A135C     (o_
        The best things in life are free: Friendship and Love.        //\
 Jemanden zu lieben heißt glücklich zu sein, ihn glücklich zu sehen.  V_/_



Reply via email to