diff --git a/policy/modules/services/abrt.if b/policy/modules/services/abrt.if
index 1adfe2f..0b827c5 100644
--- a/policy/modules/services/abrt.if
+++ b/policy/modules/services/abrt.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -62,7 +62,7 @@ interface(`abrt_signull',`
##
##
##
-## Domain to allow access.
+## Domain allowed access.
##
##
#
@@ -120,7 +120,7 @@ interface(`abrt_dbus_chat',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -139,7 +139,7 @@ interface(`abrt_domtrans_helper',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/afs.if b/policy/modules/services/afs.if
index ada201c..8559cdc 100644
--- a/policy/modules/services/afs.if
+++ b/policy/modules/services/afs.if
@@ -44,7 +44,7 @@ interface(`afs_rw_udp_sockets',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
@@ -63,7 +63,7 @@ interface(`afs_rw_cache',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/aide.if b/policy/modules/services/aide.if
index 23d7889..838d25b 100644
--- a/policy/modules/services/aide.if
+++ b/policy/modules/services/aide.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -25,7 +25,7 @@ interface(`aide_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/aisexec.if b/policy/modules/services/aisexec.if
index 4827f39..0370dba 100644
--- a/policy/modules/services/aisexec.if
+++ b/policy/modules/services/aisexec.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/amavis.if b/policy/modules/services/amavis.if
index 15c6df1..adb3d5f 100644
--- a/policy/modules/services/amavis.if
+++ b/policy/modules/services/amavis.if
@@ -28,7 +28,7 @@ interface(`amavis_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if
index 223bfc2..c9e1a44 100644
--- a/policy/modules/services/apache.if
+++ b/policy/modules/services/apache.if
@@ -299,7 +299,7 @@ interface(`apache_read_user_content',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -391,7 +391,7 @@ interface(`apache_use_fds',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -410,7 +410,7 @@ interface(`apache_dontaudit_rw_fifo_file',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -429,7 +429,7 @@ interface(`apache_dontaudit_rw_stream_sockets',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -615,7 +615,7 @@ interface(`apache_domtrans_helper',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -785,7 +785,7 @@ interface(`apache_exec_modules',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -848,7 +848,7 @@ interface(`apache_manage_sys_content',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -872,7 +872,7 @@ interface(`apache_domtrans_sys_script',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -891,7 +891,7 @@ interface(`apache_dontaudit_rw_sys_script_stream_sockets',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -911,7 +911,7 @@ interface(`apache_domtrans_all_scripts',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -991,7 +991,7 @@ interface(`apache_search_sys_content',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -1054,7 +1054,7 @@ interface(`apache_manage_all_user_content',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -1093,7 +1093,7 @@ interface(`apache_read_tmp_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/apcupsd.if b/policy/modules/services/apcupsd.if
index acd4956..e342775 100644
--- a/policy/modules/services/apcupsd.if
+++ b/policy/modules/services/apcupsd.if
@@ -25,7 +25,7 @@ interface(`apcupsd_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -84,7 +84,7 @@ interface(`apcupsd_read_log',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/apm.if b/policy/modules/services/apm.if
index 77d31b9..1ea99b2 100644
--- a/policy/modules/services/apm.if
+++ b/policy/modules/services/apm.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/arpwatch.if b/policy/modules/services/arpwatch.if
index d41aee1..c804110 100644
--- a/policy/modules/services/arpwatch.if
+++ b/policy/modules/services/arpwatch.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/asterisk.if b/policy/modules/services/asterisk.if
index 57d74bd..8b8143e 100644
--- a/policy/modules/services/asterisk.if
+++ b/policy/modules/services/asterisk.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if
index 904f700..d80a16b 100644
--- a/policy/modules/services/automount.if
+++ b/policy/modules/services/automount.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -95,7 +95,7 @@ interface(`automount_dontaudit_use_fds',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/avahi.if b/policy/modules/services/avahi.if
index a5e598e..210ca0b 100644
--- a/policy/modules/services/avahi.if
+++ b/policy/modules/services/avahi.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -119,7 +119,7 @@ interface(`avahi_stream_connect',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/bind.if b/policy/modules/services/bind.if
index 5d3c891..44a1e3d 100644
--- a/policy/modules/services/bind.if
+++ b/policy/modules/services/bind.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -24,7 +24,7 @@ interface(`bind_initrc_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -97,7 +97,7 @@ interface(`bind_kill',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -122,7 +122,7 @@ interface(`bind_run_ndc',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if
index d17e012..3e45431 100644
--- a/policy/modules/services/bluetooth.if
+++ b/policy/modules/services/bluetooth.if
@@ -64,7 +64,7 @@ interface(`bluetooth_stream_connect',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -121,7 +121,7 @@ interface(`bluetooth_dbus_chat',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -136,7 +136,7 @@ interface(`bluetooth_domtrans_helper',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -161,7 +161,7 @@ interface(`bluetooth_run_helper',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/certmonger.if b/policy/modules/services/certmonger.if
index 95a9290..a3728d4 100644
--- a/policy/modules/services/certmonger.if
+++ b/policy/modules/services/certmonger.if
@@ -45,7 +45,7 @@ interface(`certmonger_dbus_chat',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if
index 16e4342..9a0da94 100644
--- a/policy/modules/services/chronyd.if
+++ b/policy/modules/services/chronyd.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/clamav.if b/policy/modules/services/clamav.if
index ecb594c..1f11572 100644
--- a/policy/modules/services/clamav.if
+++ b/policy/modules/services/clamav.if
@@ -24,7 +24,7 @@ interface(`clamav_domtrans',`
##
##
##
-## Domain allowed to connect.
+## Domain allowed access.
##
##
#
@@ -101,7 +101,7 @@ interface(`clamav_search_lib',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/clockspeed.if b/policy/modules/services/clockspeed.if
index 9e3f911..0797617 100644
--- a/policy/modules/services/clockspeed.if
+++ b/policy/modules/services/clockspeed.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -24,7 +24,7 @@ interface(`clockspeed_domtrans_cli',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if
index 9f7dd57..293e08d 100644
--- a/policy/modules/services/cobbler.if
+++ b/policy/modules/services/cobbler.if
@@ -34,7 +34,7 @@ interface(`cobblerd_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -72,7 +72,7 @@ interface(`cobbler_read_config',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if
index 5318dce..5220c9d 100644
--- a/policy/modules/services/corosync.if
+++ b/policy/modules/services/corosync.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/courier.if b/policy/modules/services/courier.if
index 6192cc3..37b03f6 100644
--- a/policy/modules/services/courier.if
+++ b/policy/modules/services/courier.if
@@ -90,7 +90,7 @@ template(`courier_domain_template',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -109,7 +109,7 @@ interface(`courier_domtrans_authdaemon',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -201,7 +201,7 @@ interface(`courier_read_spool',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if
index 06ff274..35241ed 100644
--- a/policy/modules/services/cron.if
+++ b/policy/modules/services/cron.if
@@ -272,7 +272,7 @@ interface(`cron_system_entry',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -308,7 +308,7 @@ interface(`cron_exec',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -381,7 +381,7 @@ interface(`cron_read_pipes',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -435,7 +435,7 @@ interface(`cron_rw_tcp_sockets',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -453,7 +453,7 @@ interface(`cron_dontaudit_rw_tcp_sockets',`
##
##
##
-## The type of the process to performing this action.
+## Domain allowed access.
##
##
#
@@ -490,7 +490,7 @@ interface(`cron_manage_pid_files',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/cups.if b/policy/modules/services/cups.if
index 9a751a1..305ddf4 100644
--- a/policy/modules/services/cups.if
+++ b/policy/modules/services/cups.if
@@ -33,7 +33,7 @@ interface(`cups_backend',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -124,7 +124,7 @@ interface(`cups_read_pid_files',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/dbus.if b/policy/modules/services/dbus.if
index d76131b..39e901a 100644
--- a/policy/modules/services/dbus.if
+++ b/policy/modules/services/dbus.if
@@ -172,7 +172,7 @@ template(`dbus_role_template',`
##
##
##
-## The type of the domain.
+## Domain allowed access.
##
##
#
@@ -202,7 +202,7 @@ interface(`dbus_system_bus_client',`
##
##
##
-## The type of the domain.
+## Domain allowed access.
##
##
#
@@ -449,7 +449,7 @@ interface(`dbus_system_domain',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/dcc.if b/policy/modules/services/dcc.if
index ffce351..784753e 100644
--- a/policy/modules/services/dcc.if
+++ b/policy/modules/services/dcc.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -26,7 +26,7 @@ interface(`dcc_domtrans_cdcc',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -51,7 +51,7 @@ interface(`dcc_run_cdcc',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -89,7 +89,7 @@ interface(`dcc_signal_client',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -114,7 +114,7 @@ interface(`dcc_run_client',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -134,7 +134,7 @@ interface(`dcc_domtrans_dbclean',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/ddclient.if b/policy/modules/services/ddclient.if
index ead762a..0a1a61b 100644
--- a/policy/modules/services/ddclient.if
+++ b/policy/modules/services/ddclient.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -25,7 +25,7 @@ interface(`ddclient_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/denyhosts.if b/policy/modules/services/denyhosts.if
index de7e074..567865f 100644
--- a/policy/modules/services/denyhosts.if
+++ b/policy/modules/services/denyhosts.if
@@ -32,7 +32,7 @@ interface(`denyhosts_domtrans', `
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/dhcp.if b/policy/modules/services/dhcp.if
index 0d9f10c..5e2cea8 100644
--- a/policy/modules/services/dhcp.if
+++ b/policy/modules/services/dhcp.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -45,7 +45,7 @@ interface(`dhcpd_setattr_state_files',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if
index a4840a7..9bd812b 100644
--- a/policy/modules/services/dnsmasq.if
+++ b/policy/modules/services/dnsmasq.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -26,7 +26,7 @@ interface(`dnsmasq_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -102,7 +102,7 @@ interface(`dnsmasq_kill',`
##
##
##
-## Domain allowed.
+## Domain allowed access.
##
##
#
@@ -121,7 +121,7 @@ interface(`dnsmasq_read_config',`
##
##
##
-## Domain allowed.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/dovecot.if b/policy/modules/services/dovecot.if
index eed4e6c..e1d7dc5 100644
--- a/policy/modules/services/dovecot.if
+++ b/policy/modules/services/dovecot.if
@@ -25,7 +25,7 @@ interface(`dovecot_stream_connect_auth',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/exim.if b/policy/modules/services/exim.if
index 88c5ede..6bef7f8 100644
--- a/policy/modules/services/exim.if
+++ b/policy/modules/services/exim.if
@@ -43,7 +43,7 @@ interface(`exim_dontaudit_read_tmp_files',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -102,7 +102,7 @@ interface(`exim_read_log',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/fail2ban.if b/policy/modules/services/fail2ban.if
index 43dd962..f590a1f 100644
--- a/policy/modules/services/fail2ban.if
+++ b/policy/modules/services/fail2ban.if
@@ -103,7 +103,7 @@ interface(`fail2ban_read_log',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/finger.if b/policy/modules/services/finger.if
index cda687c..b5dd671 100644
--- a/policy/modules/services/finger.if
+++ b/policy/modules/services/finger.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/ftp.if b/policy/modules/services/ftp.if
index dfa52fd..bc27421 100644
--- a/policy/modules/services/ftp.if
+++ b/policy/modules/services/ftp.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -95,7 +95,7 @@ interface(`ftp_read_log',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -114,7 +114,7 @@ interface(`ftp_domtrans_ftpdctl',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -139,7 +139,7 @@ interface(`ftp_run_ftpdctl',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/gnomeclock.if b/policy/modules/services/gnomeclock.if
index 3da830b..671d8fd 100644
--- a/policy/modules/services/gnomeclock.if
+++ b/policy/modules/services/gnomeclock.if
@@ -25,7 +25,7 @@ interface(`gnomeclock_domtrans',`
##
##
##
-## Domain allowed access
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/gpm.if b/policy/modules/services/gpm.if
index 1fecb11..7d97298 100644
--- a/policy/modules/services/gpm.if
+++ b/policy/modules/services/gpm.if
@@ -48,7 +48,7 @@ interface(`gpm_getattr_gpmctl',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/gpsd.if b/policy/modules/services/gpsd.if
index 8fe31eb..c0ee676 100644
--- a/policy/modules/services/gpsd.if
+++ b/policy/modules/services/gpsd.if
@@ -25,7 +25,7 @@ interface(`gpsd_domtrans',`
##
##
##
-## Domain allowed access
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/hal.if b/policy/modules/services/hal.if
index 3707830..7cf6763 100644
--- a/policy/modules/services/hal.if
+++ b/policy/modules/services/hal.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -42,7 +42,7 @@ interface(`hal_getattr',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -78,7 +78,7 @@ interface(`hal_ptrace',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -115,7 +115,7 @@ interface(`hal_dontaudit_use_fds',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -190,7 +190,7 @@ interface(`hal_stream_connect',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -248,7 +248,7 @@ interface(`hal_dbus_chat',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -344,7 +344,7 @@ interface(`hal_read_tmp_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/icecast.if b/policy/modules/services/icecast.if
index 96ab892..ecab47a 100644
--- a/policy/modules/services/icecast.if
+++ b/policy/modules/services/icecast.if
@@ -42,7 +42,7 @@ interface(`icecast_signal',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/inetd.if b/policy/modules/services/inetd.if
index 59d9778..df48e5e 100644
--- a/policy/modules/services/inetd.if
+++ b/policy/modules/services/inetd.if
@@ -159,7 +159,7 @@ interface(`inetd_tcp_connect',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/inn.if b/policy/modules/services/inn.if
index 1240337..ebc9e0d 100644
--- a/policy/modules/services/inn.if
+++ b/policy/modules/services/inn.if
@@ -162,7 +162,7 @@ interface(`inn_dgram_send',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/kerneloops.if b/policy/modules/services/kerneloops.if
index 29f8c16..835b16b 100644
--- a/policy/modules/services/kerneloops.if
+++ b/policy/modules/services/kerneloops.if
@@ -47,7 +47,7 @@ interface(`kerneloops_dbus_chat',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -67,7 +67,7 @@ interface(`kerneloops_dontaudit_dbus_chat',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/ksmtuned.if b/policy/modules/services/ksmtuned.if
index 67e9269..6fd0b4c 100644
--- a/policy/modules/services/ksmtuned.if
+++ b/policy/modules/services/ksmtuned.if
@@ -24,7 +24,7 @@ interface(`ksmtuned_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/lpd.if b/policy/modules/services/lpd.if
index d29dfdf..a4f32f5 100644
--- a/policy/modules/services/lpd.if
+++ b/policy/modules/services/lpd.if
@@ -40,7 +40,7 @@ interface(`lpd_role',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -59,7 +59,7 @@ interface(`lpd_domtrans_checkpc',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -182,7 +182,7 @@ interface(`lpd_read_config',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/mailman.if b/policy/modules/services/mailman.if
index 9ad4c4e..67c7fdd 100644
--- a/policy/modules/services/mailman.if
+++ b/policy/modules/services/mailman.if
@@ -96,7 +96,7 @@ template(`mailman_domain_template', `
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -115,7 +115,7 @@ interface(`mailman_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -339,7 +339,7 @@ interface(`mailman_read_archive',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/mta.if b/policy/modules/services/mta.if
index c57356a..343cee3 100644
--- a/policy/modules/services/mta.if
+++ b/policy/modules/services/mta.if
@@ -344,7 +344,7 @@ interface(`mta_mailserver_user_agent',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -380,7 +380,7 @@ interface(`mta_send_mail',`
##
##
##
-## Domain to transition from.
+## Domain allowed to transition.
##
##
##
@@ -562,7 +562,7 @@ interface(`mta_rw_aliases',`
##
##
##
-## Mail server domain.
+## Domain to not audit.
##
##
#
@@ -580,7 +580,7 @@ interface(`mta_dontaudit_rw_delivery_tcp_sockets',`
##
##
##
-## Mail server domain.
+## Domain allowed access.
##
##
#
@@ -595,7 +595,7 @@ interface(`mta_tcp_connect_all_mailservers',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/munin.if b/policy/modules/services/munin.if
index cb4832e..c358d8f 100644
--- a/policy/modules/services/munin.if
+++ b/policy/modules/services/munin.if
@@ -139,7 +139,7 @@ interface(`munin_search_lib',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/mysql.if b/policy/modules/services/mysql.if
index 1e4b4d5..e9c0982 100644
--- a/policy/modules/services/mysql.if
+++ b/policy/modules/services/mysql.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -261,7 +261,7 @@ interface(`mysql_write_log',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/nagios.if b/policy/modules/services/nagios.if
index b487ec9..8581040 100644
--- a/policy/modules/services/nagios.if
+++ b/policy/modules/services/nagios.if
@@ -164,7 +164,7 @@ interface(`nagios_read_tmp_files',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/networkmanager.if b/policy/modules/services/networkmanager.if
index 18f657e..2324d9e 100644
--- a/policy/modules/services/networkmanager.if
+++ b/policy/modules/services/networkmanager.if
@@ -83,7 +83,7 @@ interface(`networkmanager_rw_routing_sockets',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -102,7 +102,7 @@ interface(`networkmanager_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/nis.if b/policy/modules/services/nis.if
index c7db858..abe3f7f 100644
--- a/policy/modules/services/nis.if
+++ b/policy/modules/services/nis.if
@@ -118,7 +118,7 @@ interface(`nis_authenticate',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -138,7 +138,7 @@ interface(`nis_domtrans_ypbind',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -285,7 +285,7 @@ interface(`nis_read_ypserv_config',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -304,7 +304,7 @@ interface(`nis_domtrans_ypxfr',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -323,7 +323,7 @@ interface(`nis_initrc_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/nscd.if b/policy/modules/services/nscd.if
index a63a657..85188dc 100644
--- a/policy/modules/services/nscd.if
+++ b/policy/modules/services/nscd.if
@@ -60,7 +60,7 @@ interface(`nscd_signull',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -159,7 +159,7 @@ interface(`nscd_shm_use',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -216,7 +216,7 @@ interface(`nscd_unconfined',`
##
##
##
-## Domain allowed access
+## Domain allowed to transition.
##
##
##
@@ -240,7 +240,7 @@ interface(`nscd_run',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/nslcd.if b/policy/modules/services/nslcd.if
index 01d6be9..23c769c 100644
--- a/policy/modules/services/nslcd.if
+++ b/policy/modules/services/nslcd.if
@@ -24,7 +24,7 @@ interface(`nslcd_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -61,7 +61,7 @@ interface(`nslcd_read_pid_files',`
##
##
##
-## Domain allowed to connect.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/ntp.if b/policy/modules/services/ntp.if
index c42c7ab..e80f8c0 100644
--- a/policy/modules/services/ntp.if
+++ b/policy/modules/services/ntp.if
@@ -22,7 +22,7 @@ interface(`ntp_stub',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -42,7 +42,7 @@ interface(`ntp_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -67,7 +67,7 @@ interface(`ntp_run',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -86,7 +86,7 @@ interface(`ntp_domtrans_ntpdate',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/nx.if b/policy/modules/services/nx.if
index ccc68c7..79a225c 100644
--- a/policy/modules/services/nx.if
+++ b/policy/modules/services/nx.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/oav.if b/policy/modules/services/oav.if
index d44783f..7f0d644 100644
--- a/policy/modules/services/oav.if
+++ b/policy/modules/services/oav.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -26,7 +26,7 @@ interface(`oav_domtrans_update',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/oddjob.if b/policy/modules/services/oddjob.if
index 6433998..bd76ec2 100644
--- a/policy/modules/services/oddjob.if
+++ b/policy/modules/services/oddjob.if
@@ -91,7 +91,7 @@ interface(`oddjob_domtrans_mkhomedir',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/openca.if b/policy/modules/services/openca.if
index 43bb38b..a8c1eef 100644
--- a/policy/modules/services/openca.if
+++ b/policy/modules/services/openca.if
@@ -7,7 +7,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/openvpn.if b/policy/modules/services/openvpn.if
index ae74460..d883214 100644
--- a/policy/modules/services/openvpn.if
+++ b/policy/modules/services/openvpn.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -25,7 +25,7 @@ interface(`openvpn_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/policykit.if b/policy/modules/services/policykit.if
index 2ccacfa..48ff1e8 100644
--- a/policy/modules/services/policykit.if
+++ b/policy/modules/services/policykit.if
@@ -46,7 +46,7 @@ interface(`policykit_domtrans_auth',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -89,7 +89,7 @@ interface(`policykit_domtrans_grant',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/portmap.if b/policy/modules/services/portmap.if
index af55ca0..374afcf 100644
--- a/policy/modules/services/portmap.if
+++ b/policy/modules/services/portmap.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -27,7 +27,7 @@ interface(`portmap_domtrans_helper',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/postfix.if b/policy/modules/services/postfix.if
index 378cee1..c48b45b 100644
--- a/policy/modules/services/postfix.if
+++ b/policy/modules/services/postfix.if
@@ -263,7 +263,7 @@ interface(`postfix_rw_local_pipes',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -281,7 +281,7 @@ interface(`postfix_read_local_state',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -319,7 +319,7 @@ interface(`postfix_dontaudit_use_fds',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -338,7 +338,7 @@ interface(`postfix_domtrans_map',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -364,7 +364,7 @@ interface(`postfix_run_map',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -421,7 +421,7 @@ interface(`postfix_stream_connect_master',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -440,7 +440,7 @@ interface(`postfix_domtrans_postdrop',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -515,7 +515,7 @@ interface(`postfix_manage_private_sockets',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/postgresql.if b/policy/modules/services/postgresql.if
index 394031b..539a7c9 100644
--- a/policy/modules/services/postgresql.if
+++ b/policy/modules/services/postgresql.if
@@ -223,7 +223,7 @@ interface(`postgresql_manage_db',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -241,7 +241,7 @@ interface(`postgresql_domtrans',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/postgrey.if b/policy/modules/services/postgrey.if
index 3927880..ad15fde 100644
--- a/policy/modules/services/postgrey.if
+++ b/policy/modules/services/postgrey.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed to talk to postgrey
+## Domain allowed access.
##
##
#
@@ -26,7 +26,7 @@ interface(`postgrey_stream_connect',`
##
##
##
-## Domain allowed access
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/ppp.if b/policy/modules/services/ppp.if
index 4789268..b524673 100644
--- a/policy/modules/services/ppp.if
+++ b/policy/modules/services/ppp.if
@@ -117,7 +117,7 @@ interface(`ppp_signull',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -136,7 +136,7 @@ interface(`ppp_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -164,7 +164,7 @@ interface(`ppp_run_cond',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -326,7 +326,7 @@ interface(`ppp_pid_filetrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/prelude.if b/policy/modules/services/prelude.if
index 737be4f..2316653 100644
--- a/policy/modules/services/prelude.if
+++ b/policy/modules/services/prelude.if
@@ -79,7 +79,7 @@ interface(`prelude_read_spool',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/procmail.if b/policy/modules/services/procmail.if
index f68e025..b64b02f 100644
--- a/policy/modules/services/procmail.if
+++ b/policy/modules/services/procmail.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/puppet.if b/policy/modules/services/puppet.if
index 34946a2..2855a44 100644
--- a/policy/modules/services/puppet.if
+++ b/policy/modules/services/puppet.if
@@ -17,7 +17,7 @@
##
##
##
-## Domain allowed access
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/pyzor.if b/policy/modules/services/pyzor.if
index 3745b62..494f7e2 100644
--- a/policy/modules/services/pyzor.if
+++ b/policy/modules/services/pyzor.if
@@ -55,7 +55,7 @@ interface(`pyzor_signal',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/qmail.if b/policy/modules/services/qmail.if
index 27fd19e..a55bf44 100644
--- a/policy/modules/services/qmail.if
+++ b/policy/modules/services/qmail.if
@@ -53,7 +53,7 @@ template(`qmail_child_domain_template',`
##
##
##
-## Domain allowed access
+## Domain allowed to transition.
##
##
#
@@ -79,7 +79,7 @@ interface(`qmail_domtrans_inject',`
##
##
##
-## Domain allowed access
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/razor.if b/policy/modules/services/razor.if
index f4a355f..f04a595 100644
--- a/policy/modules/services/razor.if
+++ b/policy/modules/services/razor.if
@@ -146,7 +146,7 @@ interface(`razor_role',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/remotelogin.if b/policy/modules/services/remotelogin.if
index 114f2c2..31be971 100644
--- a/policy/modules/services/remotelogin.if
+++ b/policy/modules/services/remotelogin.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/rgmanager.if b/policy/modules/services/rgmanager.if
index 4504355..7dc38d1 100644
--- a/policy/modules/services/rgmanager.if
+++ b/policy/modules/services/rgmanager.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/rhcs.if b/policy/modules/services/rhcs.if
index 6b7eb35..de37806 100644
--- a/policy/modules/services/rhcs.if
+++ b/policy/modules/services/rhcs.if
@@ -120,7 +120,7 @@ interface(`rhcs_rw_dlm_controld_semaphores',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -180,7 +180,7 @@ interface(`rhcs_stream_connect_fenced',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -260,7 +260,7 @@ interface(`rhcs_stream_connect_gfs_controld',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -341,7 +341,7 @@ interface(`rhcs_rw_groupd_shm',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/rhgb.if b/policy/modules/services/rhgb.if
index 46681c8..96efae7 100644
--- a/policy/modules/services/rhgb.if
+++ b/policy/modules/services/rhgb.if
@@ -95,7 +95,7 @@ interface(`rhgb_rw_stream_sockets',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -167,7 +167,7 @@ interface(`rhgb_use_ptys',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/rlogin.if b/policy/modules/services/rlogin.if
index ba3364d..63e78c6 100644
--- a/policy/modules/services/rlogin.if
+++ b/policy/modules/services/rlogin.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/rpc.if b/policy/modules/services/rpc.if
index 005f516..cda37bb 100644
--- a/policy/modules/services/rpc.if
+++ b/policy/modules/services/rpc.if
@@ -143,7 +143,7 @@ interface(`rpc_udp_send',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -197,7 +197,7 @@ interface(`rpc_write_exports',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -215,7 +215,7 @@ interface(`rpc_domtrans_nfsd',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -233,7 +233,7 @@ interface(`rpc_initrc_domtrans_nfsd',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -252,7 +252,7 @@ interface(`rpc_domtrans_rpcd',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/rshd.if b/policy/modules/services/rshd.if
index 92bcded..2e87d76 100644
--- a/policy/modules/services/rshd.if
+++ b/policy/modules/services/rshd.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/rsync.if b/policy/modules/services/rsync.if
index 6a2d345..3386f29 100644
--- a/policy/modules/services/rsync.if
+++ b/policy/modules/services/rsync.if
@@ -35,7 +35,7 @@ interface(`rsync_entry_type',`
##
##
##
-## Domain to transition from.
+## Domain allowed to transition.
##
##
##
@@ -68,7 +68,7 @@ interface(`rsync_entry_spec_domtrans',`
##
##
##
-## Domain to transition from.
+## Domain allowed to transition.
##
##
##
@@ -110,7 +110,7 @@ interface(`rsync_exec',`
##
##
##
-## Domain allowed.
+## Domain allowed access.
##
##
#
@@ -129,7 +129,7 @@ interface(`rsync_read_config',`
##
##
##
-## Domain allowed.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/samba.if b/policy/modules/services/samba.if
index 6d974a7..82cb169 100644
--- a/policy/modules/services/samba.if
+++ b/policy/modules/services/samba.if
@@ -10,7 +10,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -46,7 +46,7 @@ interface(`samba_signal_nmbd',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -64,7 +64,7 @@ interface(`samba_initrc_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -84,7 +84,7 @@ interface(`samba_domtrans_net',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -109,7 +109,7 @@ interface(`samba_run_net',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -129,7 +129,7 @@ interface(`samba_domtrans_smbmount',`
##
##
##
-## Domain allowed acces.
+## Domain allowed to transition.
##
##
##
@@ -360,7 +360,7 @@ interface(`samba_read_var_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -440,7 +440,7 @@ interface(`samba_domtrans_smbcontrol',`
##
##
##
-## Domain allowed access
+## Domain allowed to transition.
##
##
##
@@ -464,7 +464,7 @@ interface(`samba_run_smbcontrol',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -554,7 +554,7 @@ interface(`samba_rw_smbmount_tcp_sockets',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -573,7 +573,7 @@ interface(`samba_domtrans_winbind_helper',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/sendmail.if b/policy/modules/services/sendmail.if
index e4f4051..7e94c7c 100644
--- a/policy/modules/services/sendmail.if
+++ b/policy/modules/services/sendmail.if
@@ -23,7 +23,7 @@ interface(`sendmail_stub',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -41,7 +41,7 @@ interface(`sendmail_rw_pipes',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -63,7 +63,7 @@ interface(`sendmail_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -162,7 +162,7 @@ interface(`sendmail_rw_unix_stream_sockets',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -257,7 +257,7 @@ interface(`sendmail_manage_tmp_files',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -277,7 +277,7 @@ interface(`sendmail_domtrans_unconfined',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/services/setroubleshoot.if b/policy/modules/services/setroubleshoot.if
index c09053b..22dfeb4 100644
--- a/policy/modules/services/setroubleshoot.if
+++ b/policy/modules/services/setroubleshoot.if
@@ -27,7 +27,7 @@ interface(`setroubleshoot_stream_connect',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/slrnpull.if b/policy/modules/services/slrnpull.if
index 66a80b3..d7e8289 100644
--- a/policy/modules/services/slrnpull.if
+++ b/policy/modules/services/slrnpull.if
@@ -6,7 +6,7 @@
##
##
##
-## domain allowed access
+## Domain allowed access.
##
##
#
@@ -26,7 +26,7 @@ interface(`slrnpull_search_spool',`
##
##
##
-## domain allowed access
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/smartmon.if b/policy/modules/services/smartmon.if
index f3d8459..adea9f9 100644
--- a/policy/modules/services/smartmon.if
+++ b/policy/modules/services/smartmon.if
@@ -6,7 +6,7 @@
##
##
##
-## The process type reading the temporary files.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/smokeping.if b/policy/modules/services/smokeping.if
index 6be6642..824d206 100644
--- a/policy/modules/services/smokeping.if
+++ b/policy/modules/services/smokeping.if
@@ -24,7 +24,7 @@ interface(`smokeping_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/spamassassin.if b/policy/modules/services/spamassassin.if
index d159ef3..c954f31 100644
--- a/policy/modules/services/spamassassin.if
+++ b/policy/modules/services/spamassassin.if
@@ -101,7 +101,7 @@ interface(`spamassassin_exec_spamd',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -138,7 +138,7 @@ interface(`spamassassin_exec_client',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/squid.if b/policy/modules/services/squid.if
index 2fe24de..d2496bd 100644
--- a/policy/modules/services/squid.if
+++ b/policy/modules/services/squid.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/ssh.if b/policy/modules/services/ssh.if
index 567592d..5437ffb 100644
--- a/policy/modules/services/ssh.if
+++ b/policy/modules/services/ssh.if
@@ -572,7 +572,7 @@ interface(`ssh_tcp_connect',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -668,7 +668,7 @@ interface(`ssh_read_user_home_files',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -686,7 +686,7 @@ interface(`ssh_domtrans_keygen',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/sssd.if b/policy/modules/services/sssd.if
index 5eff513..941380a 100644
--- a/policy/modules/services/sssd.if
+++ b/policy/modules/services/sssd.if
@@ -24,7 +24,7 @@ interface(`sssd_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/tcpd.if b/policy/modules/services/tcpd.if
index 9de6298..2075ebb 100644
--- a/policy/modules/services/tcpd.if
+++ b/policy/modules/services/tcpd.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/ulogd.if b/policy/modules/services/ulogd.if
index d04b833..b078bf7 100644
--- a/policy/modules/services/ulogd.if
+++ b/policy/modules/services/ulogd.if
@@ -66,7 +66,7 @@ interface(`ulogd_read_log',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/uucp.if b/policy/modules/services/uucp.if
index 36b936a..a4fbe31 100644
--- a/policy/modules/services/uucp.if
+++ b/policy/modules/services/uucp.if
@@ -49,7 +49,7 @@ interface(`uucp_manage_spool',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/uwimap.if b/policy/modules/services/uwimap.if
index 4334b28..8337684 100644
--- a/policy/modules/services/uwimap.if
+++ b/policy/modules/services/uwimap.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/varnishd.if b/policy/modules/services/varnishd.if
index 597679d..b4d90ac 100644
--- a/policy/modules/services/varnishd.if
+++ b/policy/modules/services/varnishd.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/vhostmd.if b/policy/modules/services/vhostmd.if
index a10dc80..1f872b5 100644
--- a/policy/modules/services/vhostmd.if
+++ b/policy/modules/services/vhostmd.if
@@ -24,7 +24,7 @@ interface(`vhostmd_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -42,7 +42,7 @@ interface(`vhostmd_initrc_domtrans',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -80,7 +80,7 @@ interface(`vhostmd_dontaudit_read_tmpfs_files',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -99,7 +99,7 @@ interface(`vhostmd_rw_tmpfs_files',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -175,7 +175,7 @@ interface(`vhostmd_stream_connect',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if
index 7bb17f6..7c5d8d8 100644
--- a/policy/modules/services/virt.if
+++ b/policy/modules/services/virt.if
@@ -200,7 +200,7 @@ interface(`virt_manage_config',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -353,7 +353,7 @@ interface(`virt_read_log',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
@@ -372,7 +372,7 @@ interface(`virt_append_log',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -392,7 +392,7 @@ interface(`virt_manage_log',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -450,7 +450,7 @@ interface(`virt_manage_svirt_cache',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
index 3b31efb..da2601a 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -535,7 +535,7 @@ interface(`xserver_use_user_fonts',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -864,7 +864,7 @@ interface(`xserver_xsession_entry_type',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -1061,7 +1061,7 @@ interface(`xserver_dontaudit_getattr_xdm_tmp_sockets',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -1155,7 +1155,7 @@ interface(`xserver_dontaudit_rw_tcp_sockets',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/zosremote.if b/policy/modules/services/zosremote.if
index 6a5acd5..702e768 100644
--- a/policy/modules/services/zosremote.if
+++ b/policy/modules/services/zosremote.if
@@ -26,7 +26,7 @@ interface(`zosremote_domtrans',`
##
##
##
-## Domain allowed access
+## Domain allowed to transition.
##
##
##