diff --git a/refpolicy/policy/modules/admin/kudzu.te b/refpolicy/policy/modules/admin/kudzu.te
index f13f83b..4e99ea1 100644
--- a/refpolicy/policy/modules/admin/kudzu.te
+++ b/refpolicy/policy/modules/admin/kudzu.te
@@ -62,6 +62,8 @@ fs_search_ramfs(kudzu_t)
 fs_write_ramfs_socket(kudzu_t)
 
 modutils_read_mods_deps(kudzu_t)
+modutils_read_module_conf(kudzu_t)
+modutils_rename_module_conf(kudzu_t)
 
 storage_read_scsi_generic(kudzu_t)
 storage_read_tape_device(kudzu_t)
diff --git a/refpolicy/policy/modules/services/bind.if b/refpolicy/policy/modules/services/bind.if
index 72c5c0e..e5469a9 100644
--- a/refpolicy/policy/modules/services/bind.if
+++ b/refpolicy/policy/modules/services/bind.if
@@ -5,7 +5,7 @@
 ##	Execute ndc in the ndc domain.
 ## </summary>
 ## <param name="domain">
-##	The type of the process performing this action.
+##	Domain allowed access.
 ## </param>
 #
 interface(`bind_domtrans_ndc',`
@@ -30,7 +30,7 @@ interface(`bind_domtrans_ndc',`
 ##	allow the specified role the ndc domain.
 ## </summary>
 ## <param name="domain">
-##	The type of the process performing this action.
+##	Domain allowed access.
 ## </param>
 ## <param name="role">
 ##	The role to be allowed the bind domain.
@@ -52,6 +52,30 @@ interface(`bind_run_ndc',`
 
 ########################################
 ## <summary>
+##	Execute bind in the named domain.
+## </summary>
+## <param name="domain">
+##	Domain allowed access.
+## </param>
+#
+interface(`bind_domtrans',`
+	gen_require(`
+		type named_t, named_exec_t;
+		class process sigchld;
+		class fd use;
+		class fifo_file rw_file_perms;
+	')
+
+	domain_auto_trans($1,named_exec_t,named_t)
+
+	allow $1 named_t:fd use;
+	allow named_t $1:fd use;
+	allow named_t $1:fifo_file rw_file_perms;
+	allow named_t $1:process sigchld;
+')
+
+########################################
+## <summary>
 ##	Read DNSSEC keys.
 ## </summary>
 ## <param name="domain">
diff --git a/refpolicy/policy/modules/services/dbus.te b/refpolicy/policy/modules/services/dbus.te
index 5d0821d..14dabc3 100644
--- a/refpolicy/policy/modules/services/dbus.te
+++ b/refpolicy/policy/modules/services/dbus.te
@@ -124,6 +124,10 @@ tunable_policy(`read_default_t',`
 	files_read_default_pipes(system_dbusd_t)
 ')
 
+optional_policy(`bind.te',`
+	bind_domtrans(system_dbusd_t)
+')
+
 optional_policy(`nscd.te',`
 	nscd_use_socket(system_dbusd_t)
 ')
diff --git a/refpolicy/policy/modules/services/mta.te b/refpolicy/policy/modules/services/mta.te
index be8777a..98733d3 100644
--- a/refpolicy/policy/modules/services/mta.te
+++ b/refpolicy/policy/modules/services/mta.te
@@ -91,6 +91,8 @@ sysnet_dns_name_resolve(system_mail_t)
 userdom_use_sysadm_terms(system_mail_t)
 
 ifdef(`targeted_policy',`
+	typealias system_mail_t alias sysadm_mail_t;
+
 	allow system_mail_t etc_mail_t:file r_file_perms;
 
 	allow system_mail_t mail_spool_t:dir create_dir_perms;
diff --git a/refpolicy/policy/modules/system/modutils.if b/refpolicy/policy/modules/system/modutils.if
index 999312c..9bb2340 100644
--- a/refpolicy/policy/modules/system/modutils.if
+++ b/refpolicy/policy/modules/system/modutils.if
@@ -43,6 +43,23 @@ interface(`modutils_read_module_conf',`
 
 ########################################
 ## <summary>
+##	Rename a file with the configuration options used when
+##	loading modules.
+## </summary>
+## <param name="domain">
+##	The type of the process performing this action.
+## </param>
+#
+interface(`modutils_rename_module_conf',`
+	gen_require(`
+		type modules_conf_t;
+	')
+
+	allow $1 modules_conf_t:file rename;
+')
+
+########################################
+## <summary>
 ##	Execute insmod in the insmod domain.
 ## </summary>
 ## <param name="domain">
diff --git a/strict/domains/program/kudzu.te b/strict/domains/program/kudzu.te
index c560dc7..149b222 100644
--- a/strict/domains/program/kudzu.te
+++ b/strict/domains/program/kudzu.te
@@ -20,7 +20,7 @@ allow kudzu_t memory_device_t:chr_file { read write execute };
 allow kudzu_t ramfs_t:dir search;
 allow kudzu_t ramfs_t:sock_file write;
 allow kudzu_t self:capability { dac_override sys_admin sys_rawio net_admin sys_tty_config mknod };
-allow kudzu_t modules_conf_t:file { getattr read unlink };
+allow kudzu_t modules_conf_t:file { getattr read unlink rename };
 allow kudzu_t modules_object_t:dir r_dir_perms;
 allow kudzu_t { modules_object_t modules_dep_t }:file { getattr read };
 allow kudzu_t mouse_device_t:chr_file { read write };
diff --git a/strict/domains/program/mta.te b/strict/domains/program/mta.te
index d7d49e1..89a7bb9 100644
--- a/strict/domains/program/mta.te
+++ b/strict/domains/program/mta.te
@@ -72,3 +72,7 @@ allow mta_delivery_agent { etc_runtime_t proc_t }:file { getattr read };
 
 allow system_mail_t etc_runtime_t:file { getattr read };
 allow system_mail_t { random_device_t urandom_device_t }:chr_file { getattr read };
+ifdef(`targeted_policy', `
+typealias system_mail_t alias sysadm_mail_t;
+')
+
diff --git a/strict/domains/program/named.te b/strict/domains/program/named.te
index 08d6718..b3d9508 100644
--- a/strict/domains/program/named.te
+++ b/strict/domains/program/named.te
@@ -104,6 +104,7 @@ allow named_t self:fifo_file rw_file_perms;
 # Enable named dbus support:
 ifdef(`dbusd.te', `
 dbusd_client(system, named)
+domain_auto_trans(system_dbusd_t, named_exec_t, named_t)
 allow named_t system_dbusd_t:dbus { acquire_svc send_msg };
 allow named_t self:dbus send_msg;
 ')