@@ -7442,7 +7388,7 @@ index 9e5c83e..953e0e8 100644
+/lib/udev/devices/ppp -c gen_context(system_u:object_r:ppp_device_t,s0)
+/lib/udev/devices/net/.* -c gen_context(system_u:object_r:tun_tap_device_t,s0)
diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
-index 2ecdde8..f15e5ba 100644
+index 36ba519..ba41f1f 100644
--- a/policy/modules/kernel/corenetwork.te.in
+++ b/policy/modules/kernel/corenetwork.te.in
@@ -24,6 +24,7 @@ dev_node(ppp_device_t)
@@ -7497,7 +7443,7 @@ index 2ecdde8..f15e5ba 100644
network_port(ftp, tcp,21,s0, tcp,990,s0, udp,990,s0)
network_port(ftp_data, tcp,20,s0)
network_port(gatekeeper, udp,1718,s0, udp,1719,s0, tcp,1721,s0, tcp,7000,s0)
-@@ -109,7 +118,7 @@ network_port(hddtemp, tcp,7634,s0)
+@@ -111,7 +120,7 @@ network_port(hddtemp, tcp,7634,s0)
network_port(howl, tcp,5335,s0, udp,5353,s0)
network_port(hplip, tcp,1782,s0, tcp,2207,s0, tcp,2208,s0, tcp, 8290,s0, tcp,50000,s0, tcp,50002,s0, tcp,8292,s0, tcp,9100,s0, tcp,9101,s0, tcp,9102,s0, tcp,9220,s0, tcp,9221,s0, tcp,9222,s0, tcp,9280,s0, tcp,9281,s0, tcp,9282,s0, tcp,9290,s0, tcp,9291,s0, tcp,9292,s0)
network_port(http, tcp,80,s0, tcp,443,s0, tcp,488,s0, tcp,8008,s0, tcp,8009,s0, tcp,8443,s0) #8443 is mod_nss default port
@@ -7506,7 +7452,7 @@ index 2ecdde8..f15e5ba 100644
network_port(i18n_input, tcp,9010,s0)
network_port(imaze, tcp,5323,s0, udp,5323,s0)
network_port(inetd_child, tcp,1,s0, udp,1,s0, tcp,7,s0, udp,7,s0, tcp,9,s0, udp,9,s0, tcp,13,s0, udp,13,s0, tcp,19,s0, udp,19,s0, tcp,37,s0, udp,37,s0, tcp,512,s0, tcp,543,s0, tcp,544,s0, tcp,891,s0, udp,891,s0, tcp,892,s0, udp,892,s0, tcp,2105,s0, tcp,5666,s0)
-@@ -123,30 +132,34 @@ network_port(iscsi, tcp,3260,s0)
+@@ -125,30 +134,34 @@ network_port(iscsi, tcp,3260,s0)
network_port(isns, tcp,3205,s0, udp,3205,s0)
network_port(jabber_client, tcp,5222,s0, tcp,5223,s0)
network_port(jabber_interserver, tcp,5269,s0)
@@ -7545,7 +7491,7 @@ index 2ecdde8..f15e5ba 100644
network_port(ntp, udp,123,s0)
network_port(ocsp, tcp,9080,s0)
network_port(openvpn, tcp,1194,s0, udp,1194,s0)
-@@ -154,12 +167,20 @@ network_port(pegasus_http, tcp,5988,s0)
+@@ -156,12 +169,20 @@ network_port(pegasus_http, tcp,5988,s0)
network_port(pegasus_https, tcp,5989,s0)
network_port(pgpkeyserver, udp, 11371,s0, tcp,11371,s0)
network_port(pingd, tcp,9125,s0)
@@ -7566,7 +7512,7 @@ index 2ecdde8..f15e5ba 100644
network_port(printer, tcp,515,s0)
network_port(ptal, tcp,5703,s0)
network_port(pulseaudio, tcp,4713,s0)
-@@ -174,24 +195,28 @@ network_port(ricci, tcp,11111,s0, udp,11111,s0)
+@@ -176,24 +197,28 @@ network_port(ricci, tcp,11111,s0, udp,11111,s0)
network_port(ricci_modcluster, tcp,16851,s0, udp,16851,s0)
network_port(rlogind, tcp,513,s0)
network_port(rndc, tcp,953,s0)
@@ -7599,7 +7545,7 @@ index 2ecdde8..f15e5ba 100644
network_port(syslogd, udp,514,s0)
network_port(telnetd, tcp,23,s0)
network_port(tftp, udp,69,s0)
-@@ -201,16 +226,17 @@ network_port(transproxy, tcp,8081,s0)
+@@ -203,16 +228,17 @@ network_port(transproxy, tcp,8081,s0)
network_port(ups, tcp,3493,s0)
type utcpserver_port_t, port_type; dnl network_port(utcpserver) # no defined portcon
network_port(uucpd, tcp,540,s0)
@@ -7617,9 +7563,9 @@ index 2ecdde8..f15e5ba 100644
-network_port(xserver, tcp,6000-6020,s0)
+network_port(xserver, tcp,6000-6150,s0)
+network_port(zarafa, tcp,236,s0)
- network_port(zebra, tcp,2600-2604,s0, tcp,2606,s0, udp,2600-2604,s0, udp,2606,s0)
- network_port(zope, tcp,8021,s0)
-
+ network_port(zookeeper_client, tcp,2181,s0)
+ network_port(zookeeper_election, tcp,3888,s0)
+ network_port(zookeeper_leader, tcp,2888,s0)
diff --git a/policy/modules/kernel/devices.fc b/policy/modules/kernel/devices.fc
index 3b2da10..7c29e17 100644
--- a/policy/modules/kernel/devices.fc
@@ -8313,7 +8259,7 @@ index 3517db2..bd4c23d 100644
+/nsr(/.*)? gen_context(system_u:object_r:var_t,s0)
+/nsr/logs(/.*)? gen_context(system_u:object_r:var_log_t,s0)
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
-index 5302dac..a738502 100644
+index 5302dac..2bf2d69 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -1053,10 +1053,8 @@ interface(`files_relabel_all_files',`
@@ -8666,10 +8612,9 @@ index 5302dac..a738502 100644
#
interface(`files_delete_generic_locks',`
- gen_require(`
-- type var_t, var_lock_t;
-- ')
+ gen_require(`
-+ type var_t, var_lock_t;
+ type var_t, var_lock_t;
+- ')
+ ')
- allow $1 var_t:dir search_dir_perms;
@@ -10045,10 +9990,10 @@ index ebe6a9c..e3a1987 100644
########################################
#
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
-index 1854002..571c76e 100644
+index e0e2550..3653516 100644
--- a/policy/modules/roles/staff.te
+++ b/policy/modules/roles/staff.te
-@@ -8,12 +8,46 @@ policy_module(staff, 2.1.2)
+@@ -8,12 +8,46 @@ policy_module(staff, 2.1.3)
role staff_r;
userdom_unpriv_user_template(staff)
@@ -10095,7 +10040,7 @@ index 1854002..571c76e 100644
optional_policy(`
apache_role(staff_r, staff_t)
')
-@@ -27,6 +61,35 @@ optional_policy(`
+@@ -27,25 +61,104 @@ optional_policy(`
')
optional_policy(`
@@ -10128,10 +10073,12 @@ index 1854002..571c76e 100644
+')
+
+optional_policy(`
- oident_manage_user_content(staff_t)
- oident_relabel_user_content(staff_t)
- ')
-@@ -36,21 +99,66 @@ optional_policy(`
++ oident_manage_user_content(staff_t)
++ oident_relabel_user_content(staff_t)
++')
++
++optional_policy(`
+ postgresql_role(staff_r, staff_t)
')
optional_policy(`
@@ -10200,7 +10147,7 @@ index 1854002..571c76e 100644
optional_policy(`
xserver_role(staff_r, staff_t)
-@@ -138,10 +246,6 @@ ifndef(`distro_redhat',`
+@@ -133,10 +246,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -10212,7 +10159,7 @@ index 1854002..571c76e 100644
')
diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
-index 2a19751..1a95085 100644
+index 6b54416..bbbc6d0 100644
--- a/policy/modules/roles/sysadm.te
+++ b/policy/modules/roles/sysadm.te
@@ -24,20 +24,41 @@ ifndef(`enable_mls',`
@@ -10293,7 +10240,7 @@ index 2a19751..1a95085 100644
')
optional_policy(`
-@@ -159,6 +184,13 @@ optional_policy(`
+@@ -163,6 +188,13 @@ optional_policy(`
ipsec_stream_connect(sysadm_t)
# for lsof
ipsec_getattr_key_sockets(sysadm_t)
@@ -10307,7 +10254,7 @@ index 2a19751..1a95085 100644
')
optional_policy(`
-@@ -166,15 +198,15 @@ optional_policy(`
+@@ -170,15 +202,15 @@ optional_policy(`
')
optional_policy(`
@@ -10326,7 +10273,7 @@ index 2a19751..1a95085 100644
')
optional_policy(`
-@@ -198,14 +230,7 @@ optional_policy(`
+@@ -202,14 +234,7 @@ optional_policy(`
optional_policy(`
mount_run(sysadm_t, sysadm_r)
@@ -10342,7 +10289,7 @@ index 2a19751..1a95085 100644
')
optional_policy(`
-@@ -221,6 +246,10 @@ optional_policy(`
+@@ -225,6 +250,10 @@ optional_policy(`
')
optional_policy(`
@@ -10353,7 +10300,7 @@ index 2a19751..1a95085 100644
netutils_run(sysadm_t, sysadm_r)
netutils_run_ping(sysadm_t, sysadm_r)
netutils_run_traceroute(sysadm_t, sysadm_r)
-@@ -254,7 +283,7 @@ optional_policy(`
+@@ -253,7 +282,7 @@ optional_policy(`
')
optional_policy(`
@@ -10362,7 +10309,7 @@ index 2a19751..1a95085 100644
')
optional_policy(`
-@@ -266,10 +295,6 @@ optional_policy(`
+@@ -265,10 +294,6 @@ optional_policy(`
')
optional_policy(`
@@ -10373,7 +10320,7 @@ index 2a19751..1a95085 100644
rpc_domtrans_nfsd(sysadm_t)
')
-@@ -277,9 +302,6 @@ optional_policy(`
+@@ -276,9 +301,6 @@ optional_policy(`
rpm_run(sysadm_t, sysadm_r)
')
@@ -10383,7 +10330,7 @@ index 2a19751..1a95085 100644
optional_policy(`
rsync_exec(sysadm_t)
-@@ -304,9 +326,10 @@ optional_policy(`
+@@ -303,9 +325,10 @@ optional_policy(`
')
optional_policy(`
@@ -10395,7 +10342,7 @@ index 2a19751..1a95085 100644
optional_policy(`
ssh_role_template(sysadm, sysadm_r, sysadm_t)
')
-@@ -329,10 +352,6 @@ optional_policy(`
+@@ -328,10 +351,6 @@ optional_policy(`
')
optional_policy(`
@@ -10406,7 +10353,7 @@ index 2a19751..1a95085 100644
tripwire_run_siggen(sysadm_t, sysadm_r)
tripwire_run_tripwire(sysadm_t, sysadm_r)
tripwire_run_twadmin(sysadm_t, sysadm_r)
-@@ -340,18 +359,10 @@ optional_policy(`
+@@ -339,18 +358,10 @@ optional_policy(`
')
optional_policy(`
@@ -10425,7 +10372,7 @@ index 2a19751..1a95085 100644
unconfined_domtrans(sysadm_t)
')
-@@ -364,17 +375,14 @@ optional_policy(`
+@@ -363,17 +374,14 @@ optional_policy(`
')
optional_policy(`
@@ -10445,7 +10392,7 @@ index 2a19751..1a95085 100644
')
optional_policy(`
-@@ -386,19 +394,22 @@ optional_policy(`
+@@ -385,19 +393,22 @@ optional_policy(`
')
optional_policy(`
@@ -10471,7 +10418,7 @@ index 2a19751..1a95085 100644
auth_role(sysadm_r, sysadm_t)
')
-@@ -445,5 +456,60 @@ ifndef(`distro_redhat',`
+@@ -444,5 +455,60 @@ ifndef(`distro_redhat',`
optional_policy(`
java_role(sysadm_r, sysadm_t)
')
@@ -11736,10 +11683,10 @@ index 0000000..31bbe95
+
+gen_user(unconfined_u, user, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
diff --git a/policy/modules/roles/unprivuser.te b/policy/modules/roles/unprivuser.te
-index 9b55b00..2932c13 100644
+index 183ea8e..91b4504 100644
--- a/policy/modules/roles/unprivuser.te
+++ b/policy/modules/roles/unprivuser.te
-@@ -12,6 +12,8 @@ role user_r;
+@@ -12,15 +12,46 @@ role user_r;
userdom_unpriv_user_template(user)
@@ -11748,10 +11695,13 @@ index 9b55b00..2932c13 100644
optional_policy(`
apache_role(user_r, user_t)
')
-@@ -22,10 +24,34 @@ optional_policy(`
- ')
optional_policy(`
++ oident_manage_user_content(user_t)
++ oident_relabel_user_content(user_t)
++')
++
++optional_policy(`
+ mozilla_run_plugin(user_t, user_r)
+')
+
@@ -11783,7 +11733,7 @@ index 9b55b00..2932c13 100644
xserver_role(user_r, user_t)
')
-@@ -115,7 +141,7 @@ ifndef(`distro_redhat',`
+@@ -110,7 +141,7 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -18119,22 +18069,6 @@ index 9d44538..7e9057e 100644
##
#
interface(`cyphesis_domtrans',`
-diff --git a/policy/modules/services/cyphesis.te b/policy/modules/services/cyphesis.te
-index 346f926..1f789f8 100644
---- a/policy/modules/services/cyphesis.te
-+++ b/policy/modules/services/cyphesis.te
-@@ -36,9 +36,10 @@ logging_log_filetrans(cyphesis_t, cyphesis_log_t, file)
- allow cyphesis_t cyphesis_tmp_t:sock_file manage_sock_file_perms;
- files_tmp_filetrans(cyphesis_t, cyphesis_tmp_t, file)
-
-+manage_dirs_pattern(cyphesis_t, cyphesis_var_run_t, cyphesis_var_run_t)
- manage_files_pattern(cyphesis_t, cyphesis_var_run_t, cyphesis_var_run_t)
- manage_sock_files_pattern(cyphesis_t, cyphesis_var_run_t, cyphesis_var_run_t)
--files_pid_filetrans(cyphesis_t, cyphesis_var_run_t, { file sock_file })
-+files_pid_filetrans(cyphesis_t, cyphesis_var_run_t, { dir file sock_file })
-
- kernel_read_system_state(cyphesis_t)
- kernel_read_kernel_sysctls(cyphesis_t)
diff --git a/policy/modules/services/cyrus.te b/policy/modules/services/cyrus.te
index e182bf4..f80e725 100644
--- a/policy/modules/services/cyrus.te
@@ -19324,164 +19258,33 @@ index 69dcd2a..a9a9116 100644
/var/log/xferlog.* -- gen_context(system_u:object_r:xferlog_t,s0)
/var/log/xferreport.* -- gen_context(system_u:object_r:xferlog_t,s0)
+/usr/libexec/webmin/vsftpd/webalizer/xfer_log -- gen_context(system_u:object_r:xferlog_t,s0)
-diff --git a/policy/modules/services/ftp.if b/policy/modules/services/ftp.if
-index bc27421..26cc64b 100644
---- a/policy/modules/services/ftp.if
-+++ b/policy/modules/services/ftp.if
-@@ -53,25 +53,6 @@ interface(`ftp_read_config',`
-
- ########################################
- ##
--## Execute FTP daemon entry point programs.
--##
--##
--##
--## Domain allowed access.
--##
--##
--#
--interface(`ftp_check_exec',`
-- gen_require(`
-- type ftpd_exec_t;
-- ')
--
-- corecmd_search_bin($1)
-- allow $1 ftpd_exec_t:file { getattr execute };
--')
--
--########################################
--##
- ## Read FTP transfer logs
- ##
- ##
-@@ -171,9 +152,8 @@ interface(`ftp_dyntrans_sftpd',`
- interface(`ftp_admin',`
- gen_require(`
- type ftpd_t, ftpdctl_t, ftpd_tmp_t;
-- type ftpd_etc_t, ftpd_lock_t;
-+ type ftpd_etc_t, ftpd_lock_t, ftpd_initrc_exec_t;
- type ftpd_var_run_t, xferlog_t;
-- type ftpd_initrc_exec_t;
- ')
-
- allow $1 ftpd_t:process { ptrace signal_perms };
diff --git a/policy/modules/services/ftp.te b/policy/modules/services/ftp.te
-index 8a74a83..2284f4e 100644
+index 8a74a83..ce4f73b 100644
--- a/policy/modules/services/ftp.te
+++ b/policy/modules/services/ftp.te
-@@ -6,70 +6,85 @@ policy_module(ftp, 1.12.0)
- #
-
- ##
--##
--## Allow ftp servers to upload files, used for public file
--## transfer services. Directories must be labeled
--## public_content_rw_t.
--##
-+##
-+## Allow ftp servers to upload files, used for public file
-+## transfer services. Directories must be labeled
-+## public_content_rw_t.
-+##
- ##
- gen_tunable(allow_ftpd_anon_write, false)
-
- ##
--##
--## Allow ftp servers to login to local users and
--## read/write all files on the system, governed by DAC.
--##
-+##
-+## Allow ftp servers to login to local users and
-+## read/write all files on the system, governed by DAC.
-+##
- ##
- gen_tunable(allow_ftpd_full_access, false)
+@@ -40,6 +40,13 @@ gen_tunable(allow_ftpd_use_nfs, false)
##
--##
--## Allow ftp servers to use cifs
--## used for public file transfer services.
--##
-+##
-+## Allow ftp servers to use cifs
-+## used for public file transfer services.
-+##
- ##
- gen_tunable(allow_ftpd_use_cifs, false)
-
- ##
--##
--## Allow ftp servers to use nfs
--## used for public file transfer services.
--##
-+##
-+## Allow ftp servers to use nfs
-+## used for public file transfer services.
-+##
- ##
- gen_tunable(allow_ftpd_use_nfs, false)
-
- ##
--##
--## Allow ftp to read and write files in the user home directories
--##
-+##
-+## Allow ftp servers to use connect to mysql database
-+##
+ ##
++## Allow ftp servers to use connect to mysql database
++##
+##
+gen_tunable(ftpd_connect_db, false)
+
+##
-+##
-+## Allow ftp to read and write files in the user home directories
-+##
- ##
- gen_tunable(ftp_home_dir, false)
-
- ##
--##
--## Allow anon internal-sftp to upload files, used for
--## public file transfer services. Directories must be labeled
--## public_content_rw_t.
--##
-+##
-+## Allow anon internal-sftp to upload files, used for
-+## public file transfer services. Directories must be labeled
-+## public_content_rw_t.
-+##
- ##
- gen_tunable(sftpd_anon_write, false)
-
- ##
--##
--## Allow sftp-internal to read and write files
--## in the user home directories
--##
-+##
-+## Allow sftp-internal to read and write files
-+## in the user home directories
-+##
++##
+ ## Allow ftp to read and write files in the user home directories
+ ##
##
- gen_tunable(sftpd_enable_homedirs, false)
-
- ##
--##
--## Allow sftp-internal to login to local users and
--## read/write all files on the system, governed by DAC.
--##
-+##
-+## Allow sftp-internal to login to local users and
-+## read/write all files on the system, governed by DAC.
-+##
+@@ -70,6 +77,14 @@ gen_tunable(sftpd_enable_homedirs, false)
##
gen_tunable(sftpd_full_access, false)
+##
-+##
-+## Allow interlnal-sftp to read and write files
-+## in the user ssh home directories.
-+##
++##
++## Allow interlnal-sftp to read and write files
++## in the user ssh home directories.
++##
+##
+gen_tunable(sftpd_write_ssh_home, false)
+
@@ -20387,21 +20190,9 @@ index 462de63..a8ce02e 100644
+/usr/libexec/gsd-datetime-mechanism -- gen_context(system_u:object_r:gnomeclock_exec_t,s0)
+
diff --git a/policy/modules/services/gnomeclock.if b/policy/modules/services/gnomeclock.if
-index 671d8fd..b1f8f93 100644
+index 671d8fd..25c7ab8 100644
--- a/policy/modules/services/gnomeclock.if
+++ b/policy/modules/services/gnomeclock.if
-@@ -5,9 +5,9 @@
- ## Execute a domain transition to run gnomeclock.
- ##
- ##