diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch
index b12d4b0..a40dcab 100644
--- a/policy-rawhide-contrib.patch
+++ b/policy-rawhide-contrib.patch
@@ -54988,7 +54988,7 @@ index 86dc29d..98fdac1 100644
+ logging_log_filetrans($1, NetworkManager_var_lib_t, file, "wpa_supplicant.log")
')
diff --git a/networkmanager.te b/networkmanager.te
-index 55f2009..4e7b106 100644
+index 55f2009..6dc7fb1 100644
--- a/networkmanager.te
+++ b/networkmanager.te
@@ -9,15 +9,18 @@ type NetworkManager_t;
@@ -55326,7 +55326,11 @@ index 55f2009..4e7b106 100644
')
optional_policy(`
-@@ -289,6 +350,7 @@ optional_policy(`
+@@ -286,9 +347,11 @@ optional_policy(`
+ openvpn_kill(NetworkManager_t)
+ openvpn_signal(NetworkManager_t)
+ openvpn_signull(NetworkManager_t)
++ openvpn_stream_connect(NetworkManager_t)
')
optional_policy(`
@@ -55334,7 +55338,7 @@ index 55f2009..4e7b106 100644
policykit_domtrans_auth(NetworkManager_t)
policykit_read_lib(NetworkManager_t)
policykit_read_reload(NetworkManager_t)
-@@ -296,7 +358,7 @@ optional_policy(`
+@@ -296,7 +359,7 @@ optional_policy(`
')
optional_policy(`
@@ -55343,7 +55347,7 @@ index 55f2009..4e7b106 100644
')
optional_policy(`
-@@ -307,6 +369,7 @@ optional_policy(`
+@@ -307,6 +370,7 @@ optional_policy(`
ppp_signal(NetworkManager_t)
ppp_signull(NetworkManager_t)
ppp_read_config(NetworkManager_t)
@@ -55351,7 +55355,7 @@ index 55f2009..4e7b106 100644
')
optional_policy(`
-@@ -320,14 +383,20 @@ optional_policy(`
+@@ -320,14 +384,20 @@ optional_policy(`
')
optional_policy(`
@@ -55377,7 +55381,7 @@ index 55f2009..4e7b106 100644
')
optional_policy(`
-@@ -357,6 +426,4 @@ rw_sock_files_pattern(wpa_cli_t, NetworkManager_var_run_t, NetworkManager_var_ru
+@@ -357,6 +427,4 @@ rw_sock_files_pattern(wpa_cli_t, NetworkManager_var_run_t, NetworkManager_var_ru
init_dontaudit_use_fds(wpa_cli_t)
init_use_script_ptys(wpa_cli_t)
@@ -61896,7 +61900,7 @@ index 300213f..4cdfe09 100644
/var/log/openvpn.* gen_context(system_u:object_r:openvpn_var_log_t,s0)
diff --git a/openvpn.if b/openvpn.if
-index 6837e9a..21e6dae 100644
+index 6837e9a..9bac89c 100644
--- a/openvpn.if
+++ b/openvpn.if
@@ -23,6 +23,25 @@ interface(`openvpn_domtrans',`
@@ -61925,7 +61929,34 @@ index 6837e9a..21e6dae 100644
## openvpn domain, and allow the
## specified role the openvpn domain.
##
-@@ -147,9 +166,13 @@ interface(`openvpn_admin',`
+@@ -123,6 +142,26 @@ interface(`openvpn_read_config',`
+ allow $1 openvpn_etc_t:lnk_file read_lnk_file_perms;
+ ')
+
++####################################
++##
++## Connect to openvpn over
++## a unix domain stream socket.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`openvpn_stream_connect',`
++ gen_require(`
++ type openvpn_t, openvpn_var_run_t;
++ ')
++
++ files_search_pids($1)
++ stream_connect_pattern($1, openvpn_var_run_t, openvpn_var_run_t, openvpn_t)
++')
++
+ ########################################
+ ##
+ ## All of the rules required to
+@@ -147,9 +186,13 @@ interface(`openvpn_admin',`
type openvpn_status_t;
')
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 690ebbb..8b69712 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
-Release: 95%{?dist}
+Release: 96%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -604,6 +604,9 @@ SELinux Reference policy mls base module.
%endif
%changelog
+* Thu Nov 20 2014 Lukas Vrabec 3.13.1-96
+- Allow NetworkManager stream connect on openvpn. BZ(1165110)
+
* Wed Nov 19 2014 Lukas Vrabec 3.13.1-95
- Allow networkmanager manage also openvpn sock pid files.