Hi Guys, As part of the commit https://android.googlesource.com/platform/system/sepolicy/+/21f77f630b656b9acc034a04e5bf2303118937b0 I see that we have added the neverallow rule only for some media domains and not all.
Mediaserver and mediadrmserver doesnot have this neverallow. Is it these domains are accessing the network?? (Don't see any rule for udp/tcp socket permissions) Also are there any security implications due to which we have added these neverallow?? Please help as we are trying to understand the security risk due to which the neverallow is added. Also if these domains need to access the network through udp or tcp , is there a way through which it can be done? Thanks. ----------------------------------------------------------------------------------- This email message is for the sole use of the intended recipient(s) and may contain confidential information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply email and destroy all copies of the original message. -----------------------------------------------------------------------------------
_______________________________________________ Seandroid-list mailing list Seandroid-list@tycho.nsa.gov To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov. To get help, send an email containing "help" to seandroid-list-requ...@tycho.nsa.gov.