diff --git a/modules-targeted.conf b/modules-targeted.conf
index 854a12d..ec4d9b5 100644
--- a/modules-targeted.conf
+++ b/modules-targeted.conf
@@ -511,6 +511,20 @@ dmidecode = base
domain = base
# Layer: services
+# Module: drbd
+#
+# DRBD mirrors a block device over the network to another machine.
+#
+drbd = module
+
+# Layer: services
+# Module: ddclient
+#
+# Update dynamic IP address at DynDNS.org
+#
+ddclient = module
+
+# Layer: services
# Module: dovecot
#
# Dovecot POP and IMAP mail server
diff --git a/policy-F15.patch b/policy-F15.patch
index b4180e6..ac104f6 100644
--- a/policy-F15.patch
+++ b/policy-F15.patch
@@ -7335,70 +7335,27 @@ index 82842a0..369c3b5 100644
dbus_system_bus_client($1_wm_t)
dbus_session_bus_client($1_wm_t)
diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
-index 34c9d01..8b6dc89 100644
+index 34c9d01..94ec653 100644
--- a/policy/modules/kernel/corecommands.fc
+++ b/policy/modules/kernel/corecommands.fc
-@@ -122,6 +122,8 @@ ifdef(`distro_debian',`
- /etc/mysql/debian-start -- gen_context(system_u:object_r:bin_t,s0)
- ')
+@@ -128,8 +128,8 @@ ifdef(`distro_debian',`
-+/etc/vmware-tools(/.*)? gen_context(system_u:object_r:bin_t,s0)
-+
- #
- # /lib
- #
-@@ -130,6 +132,7 @@ ifdef(`distro_debian',`
+ /lib/readahead(/.*)? gen_context(system_u:object_r:bin_t,s0)
/lib/security/pam_krb5/pam_krb5_storetmp -- gen_context(system_u:object_r:bin_t,s0)
- /lib/systemd/systemd.* -- gen_context(system_u:object_r:bin_t,s0)
+-/lib/systemd/systemd.* -- gen_context(system_u:object_r:bin_t,s0)
/lib/udev/[^/]* -- gen_context(system_u:object_r:bin_t,s0)
+/lib/udev/devices/MAKEDEV -l gen_context(system_u:object_r:bin_t,s0)
/lib/udev/scsi_id -- gen_context(system_u:object_r:bin_t,s0)
/lib/upstart(/.*)? gen_context(system_u:object_r:bin_t,s0)
-@@ -146,6 +149,8 @@ ifdef(`distro_gentoo',`
- /lib/rcscripts/net\.modules\.d/helpers\.d/dhclient-.* -- gen_context(system_u:object_r:bin_t,s0)
- /lib/rcscripts/net\.modules\.d/helpers\.d/udhcpc-.* -- gen_context(system_u:object_r:bin_t,s0)
- ')
-+/lib/readahead(/.*)? gen_context(system_u:object_r:bin_t,s0)
-+/lib/upstart(/.*)? gen_context(system_u:object_r:bin_t,s0)
-
- #
- # /sbin
-@@ -266,6 +271,8 @@ ifdef(`distro_gentoo',`
- /usr/share/cluster/svclib_nfslock -- gen_context(system_u:object_r:bin_t,s0)
- /usr/share/e16/misc(/.*)? gen_context(system_u:object_r:bin_t,s0)
- /usr/share/gedit-2/plugins/externaltools/tools(/.*)? gen_context(system_u:object_r:bin_t,s0)
-+/usr/share/gitolite/hooks/common/update -- gen_context(system_u:object_r:bin_t,s0)
-+/usr/share/gitolite/hooks/gitolite-admin/post-update -- gen_context(system_u:object_r:bin_t,s0)
- /usr/share/gitolite/hooks/common/update -- gen_context(system_u:object_r:bin_t,s0)
- /usr/share/gitolite/hooks/gitolite-admin/post-update -- gen_context(system_u:object_r:bin_t,s0)
- /usr/share/gnucash/finance-quote-check -- gen_context(system_u:object_r:bin_t,s0)
-@@ -382,3 +389,25 @@ ifdef(`distro_suse', `
- ifdef(`distro_suse',`
- /var/lib/samba/bin/.+ gen_context(system_u:object_r:bin_t,s0)
- ')
-+/var/lib/asterisk/agi-bin(/.*)? gen_context(system_u:object_r:bin_t,s0)
-+
-+/lib/security/pam_krb5/pam_krb5_storetmp -- gen_context(system_u:object_r:bin_t,s0)
-+/lib64/security/pam_krb5/pam_krb5_storetmp -- gen_context(system_u:object_r:bin_t,s0)
-+
-+/usr/lib/oracle/xe/apps(/.*)? gen_context(system_u:object_r:bin_t,s0)
-+
-+/usr/lib(64)?/pm-utils(/.*)? gen_context(system_u:object_r:bin_t,s0)
-+
-+/usr/lib/wicd/monitor.py -- gen_context(system_u:object_r:bin_t, s0)
-+
-+/usr/lib(64)?/nspluginwrapper/np.* gen_context(system_u:object_r:bin_t,s0)
-+
-+/usr/lib(64)?/rpm/rpmd -- gen_context(system_u:object_r:bin_t,s0)
-+/usr/lib(64)?/rpm/rpmq -- gen_context(system_u:object_r:bin_t,s0)
-+/usr/lib(64)?/rpm/rpmk -- gen_context(system_u:object_r:bin_t,s0)
-+/usr/lib(64)?/rpm/rpmv -- gen_context(system_u:object_r:bin_t,s0)
-+
-+/usr/lib(64)?/gimp/.*/plug-ins(/.*)? gen_context(system_u:object_r:bin_t,s0)
-+
-+/etc/kde/env(/.*)? gen_context(system_u:object_r:bin_t,s0)
-+/etc/kde/shutdown(/.*)? gen_context(system_u:object_r:bin_t,s0)
+@@ -307,6 +307,7 @@ ifdef(`distro_redhat', `
+ /usr/lib64/.*/program(/.*)? gen_context(system_u:object_r:bin_t,s0)
+ /usr/lib/bluetooth(/.*)? -- gen_context(system_u:object_r:bin_t,s0)
+ /usr/lib64/bluetooth(/.*)? -- gen_context(system_u:object_r:bin_t,s0)
++/usr/lib/oracle/xe/apps(/.*)? gen_context(system_u:object_r:bin_t,s0)
+ /usr/lib/vmware-tools/(s)?bin32(/.*)? gen_context(system_u:object_r:bin_t,s0)
+ /usr/lib/vmware-tools/(s)?bin64(/.*)? gen_context(system_u:object_r:bin_t,s0)
+ /usr/share/authconfig/authconfig-gtk\.py -- gen_context(system_u:object_r:bin_t,s0)
diff --git a/policy/modules/kernel/corecommands.if b/policy/modules/kernel/corecommands.if
index 9e9263a..24018ce 100644
--- a/policy/modules/kernel/corecommands.if
@@ -8319,7 +8276,7 @@ index 3517db2..bd4c23d 100644
+/nsr(/.*)? gen_context(system_u:object_r:var_t,s0)
+/nsr/logs(/.*)? gen_context(system_u:object_r:var_log_t,s0)
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
-index 5302dac..5dcb9ad 100644
+index 5302dac..9b828ee 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -1053,10 +1053,8 @@ interface(`files_relabel_all_files',`
@@ -8335,7 +8292,32 @@ index 5302dac..5dcb9ad 100644
# satisfy the assertions:
seutil_relabelto_bin_policy($1)
-@@ -1446,6 +1444,60 @@ interface(`files_dontaudit_search_all_mountpoints',`
+@@ -1410,6 +1408,24 @@ interface(`files_getattr_all_mountpoints',`
+
+ ########################################
+ ##
++## Set the attributes of all mount points.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`files_setattr_all_mountpoints',`
++ gen_require(`
++ attribute mountpoint;
++ ')
++
++ allow $1 mountpoint:dir setattr;
++')
++
++########################################
++##
+ ## Search all mount points.
+ ##
+ ##
+@@ -1446,6 +1462,60 @@ interface(`files_dontaudit_search_all_mountpoints',`
########################################
##
@@ -8396,7 +8378,7 @@ index 5302dac..5dcb9ad 100644
## List the contents of the root directory.
##
##
-@@ -1836,6 +1888,25 @@ interface(`files_relabelfrom_boot_files',`
+@@ -1836,6 +1906,25 @@ interface(`files_relabelfrom_boot_files',`
relabelfrom_files_pattern($1, boot_t, boot_t)
')
@@ -8422,7 +8404,7 @@ index 5302dac..5dcb9ad 100644
########################################
##
## Read and write symbolic links
-@@ -2435,6 +2506,24 @@ interface(`files_delete_etc_files',`
+@@ -2435,6 +2524,24 @@ interface(`files_delete_etc_files',`
########################################
##
@@ -8447,7 +8429,7 @@ index 5302dac..5dcb9ad 100644
## Execute generic files in /etc.
##
##
-@@ -2605,6 +2694,24 @@ interface(`files_read_etc_runtime_files',`
+@@ -2605,6 +2712,24 @@ interface(`files_read_etc_runtime_files',`
########################################
##
@@ -8472,7 +8454,7 @@ index 5302dac..5dcb9ad 100644
## Do not audit attempts to read files
## in /etc that are dynamically
## created on boot, such as mtab.
-@@ -3086,6 +3193,7 @@ interface(`files_getattr_home_dir',`
+@@ -3086,6 +3211,7 @@ interface(`files_getattr_home_dir',`
')
allow $1 home_root_t:dir getattr;
@@ -8480,7 +8462,7 @@ index 5302dac..5dcb9ad 100644
')
########################################
-@@ -3106,6 +3214,7 @@ interface(`files_dontaudit_getattr_home_dir',`
+@@ -3106,6 +3232,7 @@ interface(`files_dontaudit_getattr_home_dir',`
')
dontaudit $1 home_root_t:dir getattr;
@@ -8488,7 +8470,7 @@ index 5302dac..5dcb9ad 100644
')
########################################
-@@ -3347,6 +3456,24 @@ interface(`files_list_mnt',`
+@@ -3347,6 +3474,24 @@ interface(`files_list_mnt',`
allow $1 mnt_t:dir list_dir_perms;
')
@@ -8513,7 +8495,7 @@ index 5302dac..5dcb9ad 100644
########################################
##
## Mount a filesystem on /mnt.
-@@ -3420,6 +3547,24 @@ interface(`files_read_mnt_files',`
+@@ -3420,6 +3565,24 @@ interface(`files_read_mnt_files',`
read_files_pattern($1, mnt_t, mnt_t)
')
@@ -8538,7 +8520,7 @@ index 5302dac..5dcb9ad 100644
########################################
##
## Create, read, write, and delete symbolic links in /mnt.
-@@ -3711,6 +3856,100 @@ interface(`files_read_world_readable_sockets',`
+@@ -3711,6 +3874,100 @@ interface(`files_read_world_readable_sockets',`
allow $1 readable_t:sock_file read_sock_file_perms;
')
@@ -8639,7 +8621,7 @@ index 5302dac..5dcb9ad 100644
########################################
##
## Allow the specified type to associate
-@@ -3896,6 +4135,32 @@ interface(`files_manage_generic_tmp_dirs',`
+@@ -3896,6 +4153,32 @@ interface(`files_manage_generic_tmp_dirs',`
########################################
##
@@ -8672,7 +8654,7 @@ index 5302dac..5dcb9ad 100644
## Manage temporary files and directories in /tmp.
##
##
-@@ -3950,6 +4215,42 @@ interface(`files_rw_generic_tmp_sockets',`
+@@ -3950,6 +4233,42 @@ interface(`files_rw_generic_tmp_sockets',`
########################################
##
@@ -8715,7 +8697,7 @@ index 5302dac..5dcb9ad 100644
## Set the attributes of all tmp directories.
##
##
-@@ -4109,6 +4410,13 @@ interface(`files_purge_tmp',`
+@@ -4109,6 +4428,13 @@ interface(`files_purge_tmp',`
delete_lnk_files_pattern($1, tmpfile, tmpfile)
delete_fifo_files_pattern($1, tmpfile, tmpfile)
delete_sock_files_pattern($1, tmpfile, tmpfile)
@@ -8729,7 +8711,7 @@ index 5302dac..5dcb9ad 100644
')
########################################
-@@ -4718,6 +5026,24 @@ interface(`files_read_var_files',`
+@@ -4718,6 +5044,24 @@ interface(`files_read_var_files',`
########################################
##
@@ -8754,7 +8736,7 @@ index 5302dac..5dcb9ad 100644
## Read and write files in the /var directory.
##
##
-@@ -5053,6 +5379,24 @@ interface(`files_manage_mounttab',`
+@@ -5053,6 +5397,24 @@ interface(`files_manage_mounttab',`
########################################
##
@@ -8779,7 +8761,7 @@ index 5302dac..5dcb9ad 100644
## Search the locks directory (/var/lock).
##
##
-@@ -5138,12 +5482,12 @@ interface(`files_getattr_generic_locks',`
+@@ -5138,12 +5500,12 @@ interface(`files_getattr_generic_locks',`
##
#
interface(`files_delete_generic_locks',`
@@ -8796,64 +8778,103 @@ index 5302dac..5dcb9ad 100644
')
########################################
-@@ -5189,6 +5533,27 @@ interface(`files_delete_all_locks',`
+@@ -5189,29 +5551,28 @@ interface(`files_delete_all_locks',`
########################################
##
+-## Read all lock files.
+## Relabel all lock files.
+ ##
+ ##
+ ##
+ ## Domain allowed access.
+ ##
+ ##
++##
+ #
+-interface(`files_read_all_locks',`
++interface(`files_relabel_all_lock_dirs',`
+ gen_require(`
+ attribute lockfile;
+- type var_t, var_lock_t;
++ type var_t;
+ ')
+
+- allow $1 { var_t var_lock_t }:dir search_dir_perms;
+- allow $1 lockfile:dir list_dir_perms;
+- read_files_pattern($1, lockfile, lockfile)
+- read_lnk_files_pattern($1, lockfile, lockfile)
++ allow $1 var_t:dir search_dir_perms;
++ relabel_dirs_pattern($1, lockfile, lockfile)
+ ')
+
+ ########################################
+ ##
+-## manage all lock files.
++## Read all lock files.
+ ##
+ ##
+ ##
+@@ -5219,15 +5580,37 @@ interface(`files_read_all_locks',`
+ ##
+ ##
+ #
+-interface(`files_manage_all_locks',`
++interface(`files_read_all_locks',`
+ gen_require(`
+ attribute lockfile;
+ type var_t, var_lock_t;
+ ')
+
+ allow $1 { var_t var_lock_t }:dir search_dir_perms;
+- manage_dirs_pattern($1, lockfile, lockfile)
+- manage_files_pattern($1, lockfile, lockfile)
++ allow $1 lockfile:dir list_dir_perms;
++ read_files_pattern($1, lockfile, lockfile)
++ read_lnk_files_pattern($1, lockfile, lockfile)
++')
++
++########################################
++##
++## manage all lock files.
+##
+##
+##
+## Domain allowed access.
+##
+##
-+##
+#
-+interface(`files_relabel_all_lock_dirs',`
++interface(`files_manage_all_locks',`
+ gen_require(`
+ attribute lockfile;
-+ type var_t;
++ type var_t, var_lock_t;
+ ')
+
-+ allow $1 var_t:dir search_dir_perms;
-+ relabel_dirs_pattern($1, lockfile, lockfile)
-+')
-+
-+########################################
-+##
- ## Read all lock files.
- ##
- ##
-@@ -5317,23 +5682,60 @@ interface(`files_search_pids',`
++ allow $1 { var_t var_lock_t }:dir search_dir_perms;
++ manage_dirs_pattern($1, lockfile, lockfile)
++ manage_files_pattern($1, lockfile, lockfile)
+ manage_lnk_files_pattern($1, lockfile, lockfile)
+ ')
+
+@@ -5317,6 +5700,43 @@ interface(`files_search_pids',`
search_dirs_pattern($1, var_t, var_run_t)
')
--########################################
+######################################
- ##
--## Do not audit attempts to search
--## the /var/run directory.
++##
+## Add and remove entries from pid directories.
- ##
- ##
--##
--## Domain to not audit.
--##
++##
++##
+##
+## Domain allowed access.
+##
- ##
- #
--interface(`files_dontaudit_search_pids',`
-- gen_require(`
-- type var_run_t;
-- ')
++##
++#
+interface(`files_rw_pid_dirs',`
+ gen_require(`
+ type var_run_t;
+ ')
-
-- dontaudit $1 var_run_t:dir search_dir_perms;
++
+ allow $1 var_run_t:dir rw_dir_perms;
+')
+
@@ -8876,27 +8897,10 @@ index 5302dac..5dcb9ad 100644
+ allow $1 var_run_t:dir create_dir_perms;
+')
+
-+########################################
-+##
-+## Do not audit attempts to search
-+## the /var/run directory.
-+##
-+##
-+##
-+## Domain to not audit.
-+##
-+##
-+#
-+interface(`files_dontaudit_search_pids',`
-+ gen_require(`
-+ type var_run_t;
-+ ')
-+
-+ dontaudit $1 var_run_t:dir search_dir_perms;
- ')
-
########################################
-@@ -5524,6 +5926,62 @@ interface(`files_dontaudit_ioctl_all_pids',`
+ ##
+ ## Do not audit attempts to search
+@@ -5524,6 +5944,62 @@ interface(`files_dontaudit_ioctl_all_pids',`
########################################
##
@@ -8959,7 +8963,7 @@ index 5302dac..5dcb9ad 100644
## Read all process ID files.
##
##
-@@ -5541,6 +5999,44 @@ interface(`files_read_all_pids',`
+@@ -5541,6 +6017,44 @@ interface(`files_read_all_pids',`
list_dirs_pattern($1, var_t, pidfile)
read_files_pattern($1, pidfile, pidfile)
@@ -9004,7 +9008,7 @@ index 5302dac..5dcb9ad 100644
')
########################################
-@@ -5826,3 +6322,247 @@ interface(`files_unconfined',`
+@@ -5826,3 +6340,247 @@ interface(`files_unconfined',`
typeattribute $1 files_unconfined_type;
')
@@ -12353,7 +12357,7 @@ index 0b827c5..8961dba 100644
admin_pattern($1, abrt_tmp_t)
')
diff --git a/policy/modules/services/abrt.te b/policy/modules/services/abrt.te
-index 98646c4..5be7dc8 100644
+index 98646c4..73ae7f0 100644
--- a/policy/modules/services/abrt.te
+++ b/policy/modules/services/abrt.te
@@ -5,6 +5,14 @@ policy_module(abrt, 1.1.1)
@@ -12397,7 +12401,15 @@ index 98646c4..5be7dc8 100644
kernel_read_ring_buffer(abrt_t)
kernel_read_system_state(abrt_t)
-@@ -121,6 +130,8 @@ files_read_generic_tmp_files(abrt_t)
+@@ -114,6 +123,7 @@ domain_signull_all_domains(abrt_t)
+
+ files_getattr_all_files(abrt_t)
+ files_read_etc_files(abrt_t)
++files_read_etc_runtime_files(abrt_t)
+ files_read_var_symlinks(abrt_t)
+ files_read_var_lib_files(abrt_t)
+ files_read_usr_files(abrt_t)
+@@ -121,6 +131,8 @@ files_read_generic_tmp_files(abrt_t)
files_read_kernel_modules(abrt_t)
files_dontaudit_list_default(abrt_t)
files_dontaudit_read_default_files(abrt_t)
@@ -12406,7 +12418,7 @@ index 98646c4..5be7dc8 100644
fs_list_inotifyfs(abrt_t)
fs_getattr_all_fs(abrt_t)
-@@ -131,7 +142,7 @@ fs_read_nfs_files(abrt_t)
+@@ -131,7 +143,7 @@ fs_read_nfs_files(abrt_t)
fs_read_nfs_symlinks(abrt_t)
fs_search_all(abrt_t)
@@ -12415,7 +12427,7 @@ index 98646c4..5be7dc8 100644
logging_read_generic_logs(abrt_t)
logging_send_syslog_msg(abrt_t)
-@@ -140,6 +151,15 @@ miscfiles_read_generic_certs(abrt_t)
+@@ -140,6 +152,15 @@ miscfiles_read_generic_certs(abrt_t)
miscfiles_read_localization(abrt_t)
userdom_dontaudit_read_user_home_content_files(abrt_t)
@@ -12431,7 +12443,7 @@ index 98646c4..5be7dc8 100644
optional_policy(`
dbus_system_domain(abrt_t, abrt_exec_t)
-@@ -150,6 +170,11 @@ optional_policy(`
+@@ -150,6 +171,11 @@ optional_policy(`
')
optional_policy(`
@@ -12443,7 +12455,7 @@ index 98646c4..5be7dc8 100644
policykit_dbus_chat(abrt_t)
policykit_domtrans_auth(abrt_t)
policykit_read_lib(abrt_t)
-@@ -178,12 +203,18 @@ optional_policy(`
+@@ -178,12 +204,18 @@ optional_policy(`
')
optional_policy(`
@@ -12463,7 +12475,7 @@ index 98646c4..5be7dc8 100644
#
allow abrt_helper_t self:capability { chown setgid sys_nice };
-@@ -203,6 +234,7 @@ read_lnk_files_pattern(abrt_helper_t, abrt_var_run_t, abrt_var_run_t)
+@@ -203,6 +235,7 @@ read_lnk_files_pattern(abrt_helper_t, abrt_var_run_t, abrt_var_run_t)
domain_read_all_domains_state(abrt_helper_t)
files_read_etc_files(abrt_helper_t)
@@ -12471,7 +12483,7 @@ index 98646c4..5be7dc8 100644
fs_list_inotifyfs(abrt_helper_t)
fs_getattr_all_fs(abrt_helper_t)
-@@ -216,7 +248,8 @@ miscfiles_read_localization(abrt_helper_t)
+@@ -216,7 +249,8 @@ miscfiles_read_localization(abrt_helper_t)
term_dontaudit_use_all_ttys(abrt_helper_t)
term_dontaudit_use_all_ptys(abrt_helper_t)
@@ -12481,7 +12493,7 @@ index 98646c4..5be7dc8 100644
userdom_dontaudit_read_user_home_content_files(abrt_helper_t)
userdom_dontaudit_read_user_tmp_files(abrt_helper_t)
dev_dontaudit_read_all_blk_files(abrt_helper_t)
-@@ -224,4 +257,18 @@ ifdef(`hide_broken_symptoms', `
+@@ -224,4 +258,18 @@ ifdef(`hide_broken_symptoms', `
dev_dontaudit_write_all_chr_files(abrt_helper_t)
dev_dontaudit_write_all_blk_files(abrt_helper_t)
fs_dontaudit_rw_anon_inodefs_files(abrt_helper_t)
@@ -19790,7 +19802,7 @@ index e1d7dc5..ee51a19 100644
admin_pattern($1, dovecot_var_run_t)
diff --git a/policy/modules/services/dovecot.te b/policy/modules/services/dovecot.te
-index cbe14e4..dd7fe41 100644
+index cbe14e4..9e2f6d5 100644
--- a/policy/modules/services/dovecot.te
+++ b/policy/modules/services/dovecot.te
@@ -18,7 +18,7 @@ type dovecot_auth_tmp_t;
@@ -19865,7 +19877,16 @@ index cbe14e4..dd7fe41 100644
allow dovecot_auth_t self:process { signal_perms getcap setcap };
allow dovecot_auth_t self:fifo_file rw_fifo_file_perms;
allow dovecot_auth_t self:unix_dgram_socket create_socket_perms;
-@@ -242,6 +252,7 @@ optional_policy(`
+@@ -189,6 +199,8 @@ allow dovecot_auth_t dovecot_t:unix_stream_socket { connectto rw_stream_socket_p
+
+ read_files_pattern(dovecot_auth_t, dovecot_passwd_t, dovecot_passwd_t)
+
++read_files_pattern(dovecot_auth_t, dovecot_etc_t, dovecot_etc_t)
++
+ manage_dirs_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
+ manage_files_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
+ files_tmp_filetrans(dovecot_auth_t, dovecot_auth_tmp_t, { file dir })
+@@ -242,6 +254,7 @@ optional_policy(`
')
optional_policy(`
@@ -19873,7 +19894,7 @@ index cbe14e4..dd7fe41 100644
postfix_search_spool(dovecot_auth_t)
')
-@@ -253,19 +264,31 @@ allow dovecot_deliver_t self:unix_dgram_socket create_socket_perms;
+@@ -253,19 +266,31 @@ allow dovecot_deliver_t self:unix_dgram_socket create_socket_perms;
allow dovecot_deliver_t dovecot_t:process signull;
@@ -19907,7 +19928,7 @@ index cbe14e4..dd7fe41 100644
miscfiles_read_localization(dovecot_deliver_t)
-@@ -302,4 +325,5 @@ tunable_policy(`use_samba_home_dirs',`
+@@ -302,4 +327,5 @@ tunable_policy(`use_samba_home_dirs',`
optional_policy(`
mta_manage_spool(dovecot_deliver_t)
@@ -25548,15 +25569,16 @@ index 4876cae..5f2ba87 100644
allow ypserv_t self:unix_stream_socket create_stream_socket_perms;
allow ypserv_t self:netlink_route_socket r_netlink_socket_perms;
diff --git a/policy/modules/services/nscd.if b/policy/modules/services/nscd.if
-index 85188dc..99cefb8 100644
+index 85188dc..76f26dd 100644
--- a/policy/modules/services/nscd.if
+++ b/policy/modules/services/nscd.if
-@@ -116,7 +116,25 @@ interface(`nscd_socket_use',`
+@@ -116,7 +116,26 @@ interface(`nscd_socket_use',`
dontaudit $1 nscd_t:nscd { getserv shmempwd shmemgrp shmemhost shmemserv };
files_search_pids($1)
stream_connect_pattern($1, nscd_var_run_t, nscd_var_run_t, nscd_t)
- dontaudit $1 nscd_var_run_t:file { getattr read };
+ dontaudit $1 nscd_var_run_t:file read_file_perms;
++ ps_process_pattern(nscd_t, $1)
+')
+
+########################################
@@ -25578,7 +25600,7 @@ index 85188dc..99cefb8 100644
')
########################################
-@@ -146,11 +164,14 @@ interface(`nscd_shm_use',`
+@@ -146,11 +165,14 @@ interface(`nscd_shm_use',`
# nscd_socket_domain macro. need to investigate
# if they are all actually required
allow $1 self:unix_stream_socket create_stream_socket_perms;
@@ -25596,7 +25618,7 @@ index 85188dc..99cefb8 100644
')
########################################
-@@ -168,7 +189,7 @@ interface(`nscd_dontaudit_search_pid',`
+@@ -168,7 +190,7 @@ interface(`nscd_dontaudit_search_pid',`
type nscd_var_run_t;
')
@@ -25605,7 +25627,7 @@ index 85188dc..99cefb8 100644
')
########################################
-@@ -224,6 +245,7 @@ interface(`nscd_unconfined',`
+@@ -224,6 +246,7 @@ interface(`nscd_unconfined',`
## Role allowed access.
##
##
@@ -26093,7 +26115,7 @@ index 9d0a67b..9197ef0 100644
#
interface(`openct_domtrans',`
diff --git a/policy/modules/services/openvpn.te b/policy/modules/services/openvpn.te
-index 8b550f4..cb87bef 100644
+index 8b550f4..e41ff47 100644
--- a/policy/modules/services/openvpn.te
+++ b/policy/modules/services/openvpn.te
@@ -6,9 +6,9 @@ policy_module(openvpn, 1.10.0)
@@ -26155,7 +26177,16 @@ index 8b550f4..cb87bef 100644
corecmd_exec_bin(openvpn_t)
corecmd_exec_shell(openvpn_t)
-@@ -113,20 +120,20 @@ sysnet_manage_config(openvpn_t)
+@@ -102,6 +109,8 @@ files_read_etc_runtime_files(openvpn_t)
+
+ auth_use_pam(openvpn_t)
+
++init_read_utmp(openvpn_t)
++
+ logging_send_syslog_msg(openvpn_t)
+
+ miscfiles_read_localization(openvpn_t)
+@@ -113,20 +122,20 @@ sysnet_manage_config(openvpn_t)
sysnet_etc_filetrans_config(openvpn_t)
userdom_use_user_terminals(openvpn_t)
@@ -26183,7 +26214,7 @@ index 8b550f4..cb87bef 100644
optional_policy(`
daemontools_service_domain(openvpn_t, openvpn_exec_t)
-@@ -138,3 +145,7 @@ optional_policy(`
+@@ -138,3 +147,7 @@ optional_policy(`
networkmanager_dbus_chat(openvpn_t)
')
@@ -27733,10 +27764,21 @@ index 55e62d2..c114a40 100644
/usr/sbin/postfix -- gen_context(system_u:object_r:postfix_master_exec_t,s0)
/usr/sbin/postkick -- gen_context(system_u:object_r:postfix_master_exec_t,s0)
diff --git a/policy/modules/services/postfix.if b/policy/modules/services/postfix.if
-index 46bee12..ff521d5 100644
+index 46bee12..9c13189 100644
--- a/policy/modules/services/postfix.if
+++ b/policy/modules/services/postfix.if
-@@ -50,7 +50,7 @@ template(`postfix_domain_template',`
+@@ -34,8 +34,9 @@ template(`postfix_domain_template',`
+ domain_entry_file(postfix_$1_t, postfix_$1_exec_t)
+ role system_r types postfix_$1_t;
+
++ allow postfix_$1_t self:capability sys_nice;
+ dontaudit postfix_$1_t self:capability sys_tty_config;
+- allow postfix_$1_t self:process { signal_perms setpgid };
++ allow postfix_$1_t self:process { signal_perms setpgid setsched };
+ allow postfix_$1_t self:unix_dgram_socket create_socket_perms;
+ allow postfix_$1_t self:unix_stream_socket create_stream_socket_perms;
+ allow postfix_$1_t self:unix_stream_socket connectto;
+@@ -50,7 +51,7 @@ template(`postfix_domain_template',`
can_exec(postfix_$1_t, postfix_$1_exec_t)
@@ -27745,7 +27787,7 @@ index 46bee12..ff521d5 100644
allow postfix_$1_t postfix_master_t:process sigchld;
-@@ -77,6 +77,7 @@ template(`postfix_domain_template',`
+@@ -77,6 +78,7 @@ template(`postfix_domain_template',`
files_read_etc_files(postfix_$1_t)
files_read_etc_runtime_files(postfix_$1_t)
@@ -27753,7 +27795,7 @@ index 46bee12..ff521d5 100644
files_read_usr_symlinks(postfix_$1_t)
files_search_spool(postfix_$1_t)
files_getattr_tmp_dirs(postfix_$1_t)
-@@ -272,7 +273,8 @@ interface(`postfix_read_local_state',`
+@@ -272,7 +274,8 @@ interface(`postfix_read_local_state',`
type postfix_local_t;
')
@@ -27763,7 +27805,7 @@ index 46bee12..ff521d5 100644
')
########################################
-@@ -290,7 +292,8 @@ interface(`postfix_read_master_state',`
+@@ -290,7 +293,8 @@ interface(`postfix_read_master_state',`
type postfix_master_t;
')
@@ -27773,7 +27815,7 @@ index 46bee12..ff521d5 100644
')
########################################
-@@ -376,6 +379,25 @@ interface(`postfix_domtrans_master',`
+@@ -376,6 +380,25 @@ interface(`postfix_domtrans_master',`
domtrans_pattern($1, postfix_master_exec_t, postfix_master_t)
')
@@ -27799,7 +27841,7 @@ index 46bee12..ff521d5 100644
########################################
##
## Execute the master postfix program in the
-@@ -404,7 +426,6 @@ interface(`postfix_exec_master',`
+@@ -404,7 +427,6 @@ interface(`postfix_exec_master',`
## Domain allowed access.
##
##
@@ -27807,7 +27849,7 @@ index 46bee12..ff521d5 100644
#
interface(`postfix_stream_connect_master',`
gen_require(`
-@@ -529,6 +550,25 @@ interface(`postfix_domtrans_smtp',`
+@@ -529,6 +551,25 @@ interface(`postfix_domtrans_smtp',`
########################################
##
@@ -27833,7 +27875,7 @@ index 46bee12..ff521d5 100644
## Search postfix mail spool directories.
##
##
-@@ -539,10 +579,10 @@ interface(`postfix_domtrans_smtp',`
+@@ -539,10 +580,10 @@ interface(`postfix_domtrans_smtp',`
#
interface(`postfix_search_spool',`
gen_require(`
@@ -27846,7 +27888,7 @@ index 46bee12..ff521d5 100644
files_search_spool($1)
')
-@@ -558,10 +598,10 @@ interface(`postfix_search_spool',`
+@@ -558,10 +599,10 @@ interface(`postfix_search_spool',`
#
interface(`postfix_list_spool',`
gen_require(`
@@ -27859,7 +27901,7 @@ index 46bee12..ff521d5 100644
files_search_spool($1)
')
-@@ -577,11 +617,11 @@ interface(`postfix_list_spool',`
+@@ -577,11 +618,11 @@ interface(`postfix_list_spool',`
#
interface(`postfix_read_spool_files',`
gen_require(`
@@ -27873,7 +27915,7 @@ index 46bee12..ff521d5 100644
')
########################################
-@@ -596,11 +636,11 @@ interface(`postfix_read_spool_files',`
+@@ -596,11 +637,11 @@ interface(`postfix_read_spool_files',`
#
interface(`postfix_manage_spool_files',`
gen_require(`
@@ -27887,7 +27929,7 @@ index 46bee12..ff521d5 100644
')
########################################
-@@ -621,3 +661,103 @@ interface(`postfix_domtrans_user_mail_handler',`
+@@ -621,3 +662,103 @@ interface(`postfix_domtrans_user_mail_handler',`
typeattribute $1 postfix_user_domtrans;
')
@@ -30293,13 +30335,47 @@ index 340a6c0..f24c52e 100644
+ ')
')
diff --git a/policy/modules/services/remotelogin.te b/policy/modules/services/remotelogin.te
-index 0a76027..cdd0542 100644
+index 0a76027..88ac667 100644
--- a/policy/modules/services/remotelogin.te
+++ b/policy/modules/services/remotelogin.te
-@@ -114,7 +114,6 @@ optional_policy(`
+@@ -49,6 +49,7 @@ fs_getattr_xattr_fs(remote_login_t)
+ fs_search_auto_mountpoints(remote_login_t)
+
+ term_relabel_all_ptys(remote_login_t)
++term_use_all_ptys(remote_login_t)
+
+ auth_rw_login_records(remote_login_t)
+ auth_rw_faillog(remote_login_t)
+@@ -77,7 +78,7 @@ files_list_mnt(remote_login_t)
+ # for when /var/mail is a sym-link
+ files_read_var_symlinks(remote_login_t)
+
+-sysnet_dns_name_resolve(remote_login_t)
++auth_use_nsswitch(remote_login_t)
+
+ miscfiles_read_localization(remote_login_t)
+
+@@ -87,6 +88,7 @@ userdom_search_user_home_content(remote_login_t)
+ # since very weak authentication is used.
+ userdom_signal_unpriv_users(remote_login_t)
+ userdom_spec_domtrans_unpriv_users(remote_login_t)
++userdom_use_user_ptys(remote_login_t)
+
+ # Search for mail spool file.
+ mta_getattr_spool(remote_login_t)
+@@ -106,15 +108,10 @@ optional_policy(`
+ ')
+
+ optional_policy(`
+- nis_use_ypbind(remote_login_t)
++ telnet_use_ptys(remote_login_t)
')
optional_policy(`
+- nscd_socket_use(remote_login_t)
+-')
+-
+-optional_policy(`
- unconfined_domain(remote_login_t)
unconfined_shell_domtrans(remote_login_t)
')
@@ -34424,6 +34500,30 @@ index 7038b55..4e84f23 100644
type tcpd_tmp_t;
files_tmp_file(tcpd_tmp_t)
+diff --git a/policy/modules/services/telnet.if b/policy/modules/services/telnet.if
+index 58e7ec0..cf4cc85 100644
+--- a/policy/modules/services/telnet.if
++++ b/policy/modules/services/telnet.if
+@@ -1 +1,19 @@
+ ## Telnet daemon
++
++########################################
++##
++## Read and write a telnetd domain pty.
++##
++##
++##
++## Domain allowed access.
++##
++##
++#
++interface(`telnet_use_ptys',`
++ gen_require(`
++ type telnetd_devpts_t;
++ ')
++
++ allow $1 telnetd_devpts_t:chr_file rw_term_perms;
++')
diff --git a/policy/modules/services/telnet.te b/policy/modules/services/telnet.te
index f40e67b..34c4c57 100644
--- a/policy/modules/services/telnet.te
@@ -42712,7 +42812,7 @@ index 8b5c196..3490497 100644
+ role $2 types showmount_t;
')
diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
-index fca6947..43cb923 100644
+index fca6947..e1f7531 100644
--- a/policy/modules/system/mount.te
+++ b/policy/modules/system/mount.te
@@ -17,8 +17,15 @@ type mount_exec_t;
@@ -42762,7 +42862,7 @@ index fca6947..43cb923 100644
allow mount_t mount_loopback_t:file read_file_perms;
-@@ -46,50 +68,83 @@ can_exec(mount_t, mount_exec_t)
+@@ -46,50 +68,84 @@ can_exec(mount_t, mount_exec_t)
files_tmp_filetrans(mount_t, mount_tmp_t, { file dir })
@@ -42814,6 +42914,7 @@ index fca6947..43cb923 100644
+# for when /etc/mtab loses its type
+files_delete_etc_files(mount_t)
files_mounton_all_mountpoints(mount_t)
++files_setattr_all_mountpoints(mount_t)
+# ntfs-3g checks whether the mountpoint is writable before mounting
+files_write_all_mountpoints(mount_t)
files_unmount_rootfs(mount_t)
@@ -42853,7 +42954,7 @@ index fca6947..43cb923 100644
mls_file_read_all_levels(mount_t)
mls_file_write_all_levels(mount_t)
-@@ -100,6 +155,7 @@ storage_raw_read_fixed_disk(mount_t)
+@@ -100,6 +156,7 @@ storage_raw_read_fixed_disk(mount_t)
storage_raw_write_fixed_disk(mount_t)
storage_raw_read_removable_device(mount_t)
storage_raw_write_removable_device(mount_t)
@@ -42861,7 +42962,7 @@ index fca6947..43cb923 100644
term_use_all_terms(mount_t)
-@@ -108,6 +164,8 @@ auth_use_nsswitch(mount_t)
+@@ -108,6 +165,8 @@ auth_use_nsswitch(mount_t)
init_use_fds(mount_t)
init_use_script_ptys(mount_t)
init_dontaudit_getattr_initctl(mount_t)
@@ -42870,7 +42971,7 @@ index fca6947..43cb923 100644
logging_send_syslog_msg(mount_t)
-@@ -118,6 +176,12 @@ sysnet_use_portmap(mount_t)
+@@ -118,6 +177,12 @@ sysnet_use_portmap(mount_t)
seutil_read_config(mount_t)
userdom_use_all_users_fds(mount_t)
@@ -42883,7 +42984,7 @@ index fca6947..43cb923 100644
ifdef(`distro_redhat',`
optional_policy(`
-@@ -133,10 +197,17 @@ ifdef(`distro_ubuntu',`
+@@ -133,10 +198,17 @@ ifdef(`distro_ubuntu',`
')
')
@@ -42901,7 +43002,7 @@ index fca6947..43cb923 100644
')
optional_policy(`
-@@ -166,6 +237,8 @@ optional_policy(`
+@@ -166,6 +238,8 @@ optional_policy(`
fs_search_rpc(mount_t)
rpc_stub(mount_t)
@@ -42910,7 +43011,7 @@ index fca6947..43cb923 100644
')
optional_policy(`
-@@ -173,6 +246,28 @@ optional_policy(`
+@@ -173,6 +247,28 @@ optional_policy(`
')
optional_policy(`
@@ -42939,7 +43040,7 @@ index fca6947..43cb923 100644
ifdef(`hide_broken_symptoms',`
# for a bug in the X server
rhgb_dontaudit_rw_stream_sockets(mount_t)
-@@ -180,13 +275,44 @@ optional_policy(`
+@@ -180,13 +276,44 @@ optional_policy(`
')
')
@@ -42984,7 +43085,7 @@ index fca6947..43cb923 100644
')
########################################
-@@ -195,6 +321,42 @@ optional_policy(`
+@@ -195,6 +322,42 @@ optional_policy(`
#
optional_policy(`
@@ -43932,9 +44033,18 @@ index 0e48679..78b3429 100644
type setrans_initrc_exec_t;
init_script_file(setrans_initrc_exec_t)
diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc
-index 726619b..4bb3158 100644
+index 726619b..36426f7 100644
--- a/policy/modules/system/sysnetwork.fc
+++ b/policy/modules/system/sysnetwork.fc
+@@ -13,7 +13,7 @@
+ /etc/dhcpd\.conf -- gen_context(system_u:object_r:dhcp_etc_t,s0)
+ /etc/dhcp/dhcpd\.conf -- gen_context(system_u:object_r:dhcp_etc_t,s0)
+ /etc/ethers -- gen_context(system_u:object_r:net_conf_t,s0)
+-/etc/hosts -- gen_context(system_u:object_r:net_conf_t,s0)
++/etc/hosts[^/]* -- gen_context(system_u:object_r:net_conf_t,s0)
+ /etc/hosts\.deny.* -- gen_context(system_u:object_r:net_conf_t,s0)
+ /etc/denyhosts.* -- gen_context(system_u:object_r:net_conf_t,s0)
+ /etc/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
@@ -64,3 +64,5 @@ ifdef(`distro_redhat',`
ifdef(`distro_gentoo',`
/var/lib/dhcpc(/.*)? gen_context(system_u:object_r:dhcpc_state_t,s0)
diff --git a/selinux-policy.spec b/selinux-policy.spec
index f230f82..ab47532 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -21,7 +21,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.9.8
-Release: 1%{?dist}
+Release: 2%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -319,6 +319,7 @@ Conflicts: audispd-plugins <= 1.7.7-1
Obsoletes: mod_fcgid-selinux <= %{version}-%{release}
Obsoletes: cachefilesd-selinux <= 0.10-1
Conflicts: seedit
+Conflicts: 389-ds-base < 1.2.7, 389-admin < 1.1.12
%description targeted
SELinux Reference policy targeted base module.
@@ -470,6 +471,9 @@ exit 0
%endif
%changelog
+* Fri Nov 5 2010 Dan Walsh 3.9.8-2
+- Add conflicts for dirsrv package
+
* Fri Nov 5 2010 Dan Walsh 3.9.8-1
- Update to upstream
- Add vlock policy