diff --git a/refpolicy/Changelog b/refpolicy/Changelog
index ad77faf..0ab624a 100644
--- a/refpolicy/Changelog
+++ b/refpolicy/Changelog
@@ -2,6 +2,7 @@
 	* Add missing parts of unix stream socket connect interface
 	  of ipsec.
 	* Rename inetd connect interface for consistency.
+	* Misc. cleanups.
 	* Added policies:
 		mysql
 
diff --git a/refpolicy/policy/modules/system/ipsec.te b/refpolicy/policy/modules/system/ipsec.te
index a73e707..cc06b3e 100644
--- a/refpolicy/policy/modules/system/ipsec.te
+++ b/refpolicy/policy/modules/system/ipsec.te
@@ -13,15 +13,17 @@ role system_r types ipsec_t;
 
 # type for ipsec configuration file(s) - not for keys
 type ipsec_conf_file_t;
+files_type(ipsec_conf_file_t)
 
 # type for file(s) containing ipsec keys - RSA or preshared
 type ipsec_key_file_t;
+files_type(ipsec_key_file_t)
 
 # type for runtime files, including pluto.ctl
 type ipsec_var_run_t;
 files_pid_file(ipsec_var_run_t)
 
-type ipsec_mgmt_t; # admin, privmodule;
+type ipsec_mgmt_t;
 type ipsec_mgmt_exec_t;
 init_system_domain(ipsec_mgmt_t,ipsec_mgmt_exec_t)
 role system_r types ipsec_mgmt_t;
@@ -37,6 +39,7 @@ files_pid_file(ipsec_mgmt_var_run_t)
 allow ipsec_t self:capability { net_admin dac_override dac_read_search };
 dontaudit ipsec_t self:capability sys_tty_config;
 allow ipsec_t self:process signal;
+allow ipsec_t self:tcp_socket create_stream_socket_perms;
 allow ipsec_t self:key_socket { create write read setopt };
 allow ipsec_t self:fifo_file { read getattr };
 
@@ -74,6 +77,13 @@ kernel_read_software_raid_state(ipsec_t)
 kernel_getattr_core(ipsec_t)
 kernel_getattr_message_if(ipsec_t)
 
+# Pluto needs network access
+corenet_tcp_sendrecv_all_if(ipsec_t)
+corenet_raw_sendrecv_all_if(ipsec_t)
+corenet_tcp_sendrecv_all_nodes(ipsec_t)
+corenet_raw_sendrecv_all_nodes(ipsec_t)
+corenet_tcp_sendrecv_all_ports(ipsec_t)
+corenet_tcp_bind_all_nodes(ipsec_t)
 corenet_udp_bind_reserved_port(ipsec_t)
 
 dev_read_sysfs(ipsec_t)
@@ -84,6 +94,7 @@ fs_getattr_all_fs(ipsec_t)
 fs_search_auto_mountpoints(ipsec_t)
 
 term_use_console(ipsec_t)
+term_dontaudit_use_all_user_ttys(ipsec_t)
 
 corecmd_exec_shell(ipsec_t)
 corecmd_exec_bin(ipsec_t)
@@ -102,6 +113,8 @@ logging_send_syslog_msg(ipsec_t)
 
 miscfiles_read_localization(ipsec_t)
 
+sysnet_read_config(ipsec_t)
+
 userdom_dontaudit_use_unpriv_user_fd(ipsec_t)
 userdom_dontaudit_search_sysadm_home_dir(ipsec_t)
 
@@ -127,14 +140,6 @@ optional_policy(`udev.te', `
 	udev_read_db(ipsec_t)
 ')
 
-ifdef(`TODO',`
-allow ipsec_t etc_t:lnk_file read;
-allow ipsec_t initrc_t:fifo_file write;
-dontaudit ipsec_t ttyfile:chr_file { read write };
-# Pluto needs network access
-can_network_server(ipsec_t)
-') dnl end TODO
-
 ########################################
 #
 # ipsec_mgmt Local policy
@@ -241,6 +246,8 @@ libs_use_shared_libs(ipsec_mgmt_t)
 
 miscfiles_read_localization(ipsec_mgmt_t)
 
+modutils_domtrans_insmod(ipsec_mgmt_t)
+
 seutil_dontaudit_search_config(ipsec_mgmt_t)
 
 sysnet_domtrans_ifconfig(ipsec_mgmt_t)
diff --git a/refpolicy/policy/modules/system/pcmcia.te b/refpolicy/policy/modules/system/pcmcia.te
index 9e7bbdb..28ac24a 100644
--- a/refpolicy/policy/modules/system/pcmcia.te
+++ b/refpolicy/policy/modules/system/pcmcia.te
@@ -123,6 +123,17 @@ optional_policy(`selinuxutils.te',`
 	seutil_sigchld_newrole(cardmgr_t)
 ')
 
+optional_policy(`sysnetwork.te',`
+	sysnet_domtrans_dhcpc(cardmgr_t)
+
+	sysnet_read_dhcpc_pid(cardmgr_t)
+	sysnet_kill_dhcpc(cardmgr_t)
+	sysnet_sigchld_dhcpc(cardmgr_t)
+	sysnet_signal_dhcpc(cardmgr_t)
+	sysnet_signull_dhcpc(cardmgr_t)
+	sysnet_sigstop_dhcpc(cardmgr_t)
+')
+
 optional_policy(`udev.te', `
 	udev_read_db(cardmgr_t)
 ')
diff --git a/refpolicy/policy/modules/system/raid.te b/refpolicy/policy/modules/system/raid.te
index 8d28d83..a8a2f46 100644
--- a/refpolicy/policy/modules/system/raid.te
+++ b/refpolicy/policy/modules/system/raid.te
@@ -1,5 +1,5 @@
 
-policy_module(mdadm,1.0)
+policy_module(raid,1.0)
 
 ########################################
 #
diff --git a/refpolicy/policy/modules/system/sysnetwork.te b/refpolicy/policy/modules/system/sysnetwork.te
index 5dbd0f1..4086c6a 100644
--- a/refpolicy/policy/modules/system/sysnetwork.te
+++ b/refpolicy/policy/modules/system/sysnetwork.te
@@ -209,18 +209,6 @@ optional_policy(`rhgb.te',`
 rhgb_domain(dhcpc_t)
 ')
 
-#this goes to pcmcia module
-optional_policy(`sysnetwork.te',`
-	sysnet_domtrans_dhcpc(cardmgr_t)
-
-	sysnet_read_dhcpc_pid(cardmgr_t)
-	sysnet_kill_dhcpc(cardmgr_t)
-	sysnet_sigchld_dhcpc(cardmgr_t)
-	sysnet_signal_dhcpc(cardmgr_t)
-	sysnet_signull_dhcpc(cardmgr_t)
-	sysnet_sigstop_dhcpc(cardmgr_t)
-')
-
 dontaudit dhcpc_t domain:dir getattr;
 ') dnl endif TODO