diff --git a/refpolicy/policy/modules/admin/kudzu.te b/refpolicy/policy/modules/admin/kudzu.te
index f13f83b..4e99ea1 100644
--- a/refpolicy/policy/modules/admin/kudzu.te
+++ b/refpolicy/policy/modules/admin/kudzu.te
@@ -62,6 +62,8 @@ fs_search_ramfs(kudzu_t)
fs_write_ramfs_socket(kudzu_t)
modutils_read_mods_deps(kudzu_t)
+modutils_read_module_conf(kudzu_t)
+modutils_rename_module_conf(kudzu_t)
storage_read_scsi_generic(kudzu_t)
storage_read_tape_device(kudzu_t)
diff --git a/refpolicy/policy/modules/services/bind.if b/refpolicy/policy/modules/services/bind.if
index 72c5c0e..e5469a9 100644
--- a/refpolicy/policy/modules/services/bind.if
+++ b/refpolicy/policy/modules/services/bind.if
@@ -5,7 +5,7 @@
## Execute ndc in the ndc domain.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`bind_domtrans_ndc',`
@@ -30,7 +30,7 @@ interface(`bind_domtrans_ndc',`
## allow the specified role the ndc domain.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
## The role to be allowed the bind domain.
@@ -52,6 +52,30 @@ interface(`bind_run_ndc',`
########################################
##
+## Execute bind in the named domain.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`bind_domtrans',`
+ gen_require(`
+ type named_t, named_exec_t;
+ class process sigchld;
+ class fd use;
+ class fifo_file rw_file_perms;
+ ')
+
+ domain_auto_trans($1,named_exec_t,named_t)
+
+ allow $1 named_t:fd use;
+ allow named_t $1:fd use;
+ allow named_t $1:fifo_file rw_file_perms;
+ allow named_t $1:process sigchld;
+')
+
+########################################
+##
## Read DNSSEC keys.
##
##
diff --git a/refpolicy/policy/modules/services/dbus.te b/refpolicy/policy/modules/services/dbus.te
index 5d0821d..14dabc3 100644
--- a/refpolicy/policy/modules/services/dbus.te
+++ b/refpolicy/policy/modules/services/dbus.te
@@ -124,6 +124,10 @@ tunable_policy(`read_default_t',`
files_read_default_pipes(system_dbusd_t)
')
+optional_policy(`bind.te',`
+ bind_domtrans(system_dbusd_t)
+')
+
optional_policy(`nscd.te',`
nscd_use_socket(system_dbusd_t)
')
diff --git a/refpolicy/policy/modules/services/mta.te b/refpolicy/policy/modules/services/mta.te
index be8777a..98733d3 100644
--- a/refpolicy/policy/modules/services/mta.te
+++ b/refpolicy/policy/modules/services/mta.te
@@ -91,6 +91,8 @@ sysnet_dns_name_resolve(system_mail_t)
userdom_use_sysadm_terms(system_mail_t)
ifdef(`targeted_policy',`
+ typealias system_mail_t alias sysadm_mail_t;
+
allow system_mail_t etc_mail_t:file r_file_perms;
allow system_mail_t mail_spool_t:dir create_dir_perms;
diff --git a/refpolicy/policy/modules/system/modutils.if b/refpolicy/policy/modules/system/modutils.if
index 999312c..9bb2340 100644
--- a/refpolicy/policy/modules/system/modutils.if
+++ b/refpolicy/policy/modules/system/modutils.if
@@ -43,6 +43,23 @@ interface(`modutils_read_module_conf',`
########################################
##
+## Rename a file with the configuration options used when
+## loading modules.
+##
+##
+## The type of the process performing this action.
+##
+#
+interface(`modutils_rename_module_conf',`
+ gen_require(`
+ type modules_conf_t;
+ ')
+
+ allow $1 modules_conf_t:file rename;
+')
+
+########################################
+##
## Execute insmod in the insmod domain.
##
##
diff --git a/strict/domains/program/kudzu.te b/strict/domains/program/kudzu.te
index c560dc7..149b222 100644
--- a/strict/domains/program/kudzu.te
+++ b/strict/domains/program/kudzu.te
@@ -20,7 +20,7 @@ allow kudzu_t memory_device_t:chr_file { read write execute };
allow kudzu_t ramfs_t:dir search;
allow kudzu_t ramfs_t:sock_file write;
allow kudzu_t self:capability { dac_override sys_admin sys_rawio net_admin sys_tty_config mknod };
-allow kudzu_t modules_conf_t:file { getattr read unlink };
+allow kudzu_t modules_conf_t:file { getattr read unlink rename };
allow kudzu_t modules_object_t:dir r_dir_perms;
allow kudzu_t { modules_object_t modules_dep_t }:file { getattr read };
allow kudzu_t mouse_device_t:chr_file { read write };
diff --git a/strict/domains/program/mta.te b/strict/domains/program/mta.te
index d7d49e1..89a7bb9 100644
--- a/strict/domains/program/mta.te
+++ b/strict/domains/program/mta.te
@@ -72,3 +72,7 @@ allow mta_delivery_agent { etc_runtime_t proc_t }:file { getattr read };
allow system_mail_t etc_runtime_t:file { getattr read };
allow system_mail_t { random_device_t urandom_device_t }:chr_file { getattr read };
+ifdef(`targeted_policy', `
+typealias system_mail_t alias sysadm_mail_t;
+')
+
diff --git a/strict/domains/program/named.te b/strict/domains/program/named.te
index 08d6718..b3d9508 100644
--- a/strict/domains/program/named.te
+++ b/strict/domains/program/named.te
@@ -104,6 +104,7 @@ allow named_t self:fifo_file rw_file_perms;
# Enable named dbus support:
ifdef(`dbusd.te', `
dbusd_client(system, named)
+domain_auto_trans(system_dbusd_t, named_exec_t, named_t)
allow named_t system_dbusd_t:dbus { acquire_svc send_msg };
allow named_t self:dbus send_msg;
')