diff --git a/.cvsignore b/.cvsignore
index e69de29..b44f544 100644
--- a/.cvsignore
+++ b/.cvsignore
@@ -0,0 +1 @@
+serefpolicy-2.0.0.tgz
diff --git a/selinux-policy.spec b/selinux-policy.spec
new file mode 100644
index 0000000..2621be4
--- /dev/null
+++ b/selinux-policy.spec
@@ -0,0 +1,196 @@
+%define distro redhat
+%define direct_initrc y
+%define monolithic n
+%define polname1 targeted
+%define type1 targeted-mcs
+%define polname2 strict
+%define type2 strict-mcs
+%define POLICYVER 20
+%define POLICYCOREUTILSVER 1.27.26-1
+%define CHECKPOLICYVER 1.27.17-5
+Summary: SELinux policy configuration
+Name: selinux-policy
+Version: 2.0.0
+Release: 0.6
+License: GPL
+Group: System Environment/Base
+Source: serefpolicy-%{version}.tgz
+Source1: seusers
+Source2: setrans.conf
+patch: policy-20051114.patch
+Url: http://serefpolicy.sourceforge.net
+BuildRoot: %{_tmppath}/serefpolicy-buildroot
+BuildArch: noarch
+BuildRequires: checkpolicy >= %{CHECKPOLICYVER} m4 policycoreutils >= %{POLICYCOREUTILSVER}
+Requires: policycoreutils >= %{POLICYCOREUTILSVER}
+Obsoletes: policy 
+
+%define installCmds() \
+make NAME=%1 TYPE=%2 DISTRO=%{distro} DIRECT_INITRC=%{direct_initrc} MONOLITHIC=%{monolithic} base.pp \
+make NAME=%1 TYPE=%2 DISTRO=%{distro} DIRECT_INITRC=%{direct_initrc} MONOLITHIC=%{monolithic} modules \
+%{__mkdir} -p $RPM_BUILD_ROOT/%{_usr}/share/selinux/%1/ \
+%{__cp} *.pp $RPM_BUILD_ROOT/%{_usr}/share/selinux/%1/ \
+%{__mkdir} -p $RPM_BUILD_ROOT/%{_sysconfdir}/selinux/%1/policy \
+%{__mkdir} -p $RPM_BUILD_ROOT/%{_sysconfdir}/selinux/%1/modules/active \
+%{__mkdir} -p $RPM_BUILD_ROOT/%{_sysconfdir}/selinux/%1/contexts/files \
+make NAME=%1 TYPE=%{type1} DISTRO=%{distro} DIRECT_INITRC=%{direct_initrc} MONOLITHIC=y DESTDIR=$RPM_BUILD_ROOT install-appconfig \
+install -m0644 %{SOURCE1} ${RPM_BUILD_ROOT}%{_sysconfdir}/selinux/%1/modules/active/seusers \
+install -m0644 %{SOURCE2} ${RPM_BUILD_ROOT}%{_sysconfdir}/selinux/%1/setrans.conf \
+rm -rf $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/booleans \
+touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/config \
+touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/seusers \
+touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/policy/policy.%{POLICYVER} \
+touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/contexts/files/file_contexts \
+touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/contexts/files/homedir_template \
+touch $RPM_BUILD_ROOT%{_sysconfdir}/selinux/%1/contexts/files/file_contexts.homedirs 
+
+%define fileList() \
+%defattr(-,root,root) \
+%dir %{_usr}/share/selinux \
+%dir %{_usr}/share/selinux/%1 \
+%config %{_usr}/share/selinux/%1/base.pp \
+%dir %{_sysconfdir}/selinux \
+%ghost %config(noreplace) %{_sysconfdir}/selinux/config \
+%dir %{_sysconfdir}/selinux/%1 \
+%config(noreplace) %{_sysconfdir}/selinux/%1/setrans.conf \
+%ghost %{_sysconfdir}/selinux/%1/seusers \
+%dir %{_sysconfdir}/selinux/%1/modules \
+%dir %{_sysconfdir}/selinux/%1/modules/active \
+%config(noreplace) %{_sysconfdir}/selinux/%1/modules/active/seusers \
+%dir %{_sysconfdir}/selinux/%1/policy/ \
+%ghost %{_sysconfdir}/selinux/%1/policy/policy.%{POLICYVER} \
+%dir %{_sysconfdir}/selinux/%1/contexts \
+%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/customizable_types \
+%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/dbus_contexts \
+%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/default_contexts \
+%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/default_type \
+%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/failsafe_context \
+%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/initrc_context \
+%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/removable_context \
+%config(noreplace) %{_sysconfdir}/selinux/%1/contexts/userhelper_context \
+%dir %{_sysconfdir}/selinux/%1/contexts/files \
+%ghost %config %{_sysconfdir}/selinux/%1/contexts/files/file_contexts \
+%ghost %config %{_sysconfdir}/selinux/%1/contexts/files/homedir_template \
+%ghost %config %{_sysconfdir}/selinux/%1/contexts/files/file_contexts.homedirs \
+%config %{_sysconfdir}/selinux/%1/contexts/files/media
+
+%define saveFileContext() \
+. %{_sysconfdir}/selinux/config; \
+FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \
+if [ "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT} ]; then \
+	cp -f ${FILE_CONTEXT} ${FILE_CONTEXT}.pre; \
+fi 
+
+%define rebuildpolicy() \
+semodule -b /usr/share/selinux/%1/base.pp -s %1 \
+for file in $(ls /usr/share/selinux/%1 | grep -v base.pp) \
+do \
+	semodule -i /usr/share/selinux/%1/$file -s %1;\
+done; 
+
+%define relabel() \
+. %{_sysconfdir}/selinux/config; \
+FILE_CONTEXT=%{_sysconfdir}/selinux/%1/contexts/files/file_contexts; \
+if [ "${SELINUXTYPE}" == %1 -a -f ${FILE_CONTEXT}.pre ]; then \
+	fixfiles -C ${FILE_CONTEXT}.pre restore; \
+	rm -f ${FILE_CONTEXT}.pre; \
+fi; 
+
+%description
+SELinux Reference Policy - modular.
+
+%prep
+%setup -q -n serefpolicy-%{version}
+%patch -p1 
+
+%build
+make conf
+
+%install
+%{__rm} -fR $RPM_BUILD_ROOT
+%installCmds %{polname1} %{type1} 
+
+# Commented out because only targeted ref policy currently builds
+%installCmds %{polname2} %{type2} 
+
+%clean
+%{__rm} -fR $RPM_BUILD_ROOT
+
+%package %{polname1}
+Summary: SELinux %{polname1} base policy
+Group: System Environment/Base
+Provides: selinux-policy-base
+Obsoletes: selinux-policy-%{polname1}-sources
+
+%description %{polname1}
+SELinux Reference policy targeted base module.
+
+%files %{polname1}
+%fileList %{polname1}
+
+%pre %{polname1}
+%saveFileContext %{polname1}
+
+%post %{polname1}
+if [ ! -s /etc/selinux/config ]; then
+	#
+	#	New install so we will default to targeted policy
+	#
+	echo "
+# This file controls the state of SELinux on the system.
+# SELINUX= can take one of these three values:
+#	enforcing - SELinux security policy is enforced.
+#	permissive - SELinux prints warnings instead of enforcing.
+#	disabled - No SELinux policy is loaded.
+SELINUX=enforcing
+# SELINUXTYPE= can take one of these two values:
+#	targeted - Only targeted network daemons are protected.
+#	strict - Full SELinux protection.
+SELINUXTYPE=targeted 
+# SETLOCALDEFS= Check local definition changes
+SETLOCALDEFS=0 
+
+" > /etc/selinux/config
+
+	ln -sf /etc/selinux/config /etc/sysconfig/selinux 
+	restorecon /etc/selinux/config 2> /dev/null
+else
+	# if first time update booleans.local needs to be copied to sandbox
+	[ -f /etc/selinux/%{polname1}/booleans.local ] && mv /etc/selinux/%{polname1}/booleans.local /etc/selinux/%{polname1}/modules/active/
+	[ -f /etc/selinux/%{polname1}/seusers ] && cp -f /etc/selinux/%{polname1}/seusers /etc/selinux/%{polname1}/modules/active/seusers
+	grep -q "^SETLOCALDEFS" /etc/selinux/config || echo -n "
+# SETLOCALDEFS= Check local definition changes
+SETLOCALDEFS=0 
+">> /etc/selinux/config
+fi
+%rebuildpolicy %{polname1}
+%relabel %{polname1}
+
+%triggerpostun %{polname1} -- selinux-policy-%{polname1} <= 2.0.0
+%rebuildpolicy %{polname1}
+
+%package %{polname2} 
+Summary: SELinux %{polname2} base policy
+Group: System Environment/Base
+Provides: selinux-policy-base
+Obsoletes: selinux-policy-%{polname1}-sources
+
+%description %{polname2} 
+SELinux Reference policy %{polname2} base module.
+
+%pre %{polname2} 
+%saveFileContext %{polname2}
+
+%post %{polname2} 
+%rebuildpolicy %{polname2} 
+%relabel %{polname1}
+
+%triggerpostun %{polname2} -- %{polname2} <= 2.0.0
+%{rebuildpolicy} %{polname2} 
+
+%files %{polname2}
+#%#fileList %{polname2}
+
+%changelog
+* Wed Nov 9 2003 Dan Walsh <dwalsh@redhat.com> 2.0.0-5
+- Initial version
diff --git a/setrans.conf b/setrans.conf
new file mode 100644
index 0000000..0d8aaeb
--- /dev/null
+++ b/setrans.conf
@@ -0,0 +1,19 @@
+#
+# Multi-Category Security translation table for SELinux
+# 
+# Uncomment the following to disable translation libary
+# disable=1
+#
+# Objects can be categorized with 0-256 categories defined by the admin.
+# Objects can be in more than one category at a time.
+# Categories are stored in the system as c0-c255.  Users can use this
+# table to translate the categories into a more meaningful output.
+# Examples:
+# s0:c0=CompanyConfidential
+# s0:c1=PatientRecord
+# s0:c2=Unclassified
+# s0:c3=TopSecret
+# s0:c1,c3=CompanyConfidentialRedHat
+s0=
+s0-s0:c0.c255=SystemLow-SystemHigh
+s0:c0.c255=SystemHigh
diff --git a/seusers b/seusers
new file mode 100644
index 0000000..c400c79
--- /dev/null
+++ b/seusers
@@ -0,0 +1,2 @@
+root:root:s0-s0:c0.c255
+__default__:user_u:s0
diff --git a/sources b/sources
index e69de29..0a6f68b 100644
--- a/sources
+++ b/sources
@@ -0,0 +1 @@
+8fcf0948d5caf52cbd6c70b404388b38  serefpolicy-2.0.0.tgz