Package: selinux-policy-default Version: 1:1.18-1 Followup-For: Bug #288647
Hello, It looks like the suggested patch has been applied, given that I'm seeing this in /usr/share/selinux/policy/default/domains/program/cups.te : /************************************************* ifdef(distro_redhat', ifdef(rpm.te', allow cupsd_config_t rpm_var_lib_t:dir { getattr search }; allow cupsd_config_t rpm_var_lib_t:file { getattr read }; ') allow cupsd_config_t initrc_exec_t:file getattr; ')dnl end distro_redhat \************************************************* So, I'm afraid that I don't understand why I'm encounterng the following, from dpkg. (This is what I'd meant to file a bug report about, but it looks like it's already an issue, "made" in the Deb BTS) /************************************************* Setting up selinux-policy-default (1.18-1) ... /usr/bin/checkpolicy: loading policy configuration from policy.conf domains/program/cups.te:245:ERROR 'unknown type rpm_var_lib_t' at token ';' on line 140828: #line 245 allow cupsd_config_t rpm_var_lib_t:file { getattr read }; /usr/bin/checkpolicy: error(s) encountered while parsing configuration make: *** [/etc/selinux/policy/policy.18] Error 1 dpkg: error processing selinux-policy-default (--configure): subprocess post-installation script returned error exit status 2 \************************************************* In what I know of this, it looks as if rpm_var_lib_t should not even be seen by the policy-chcker (given that rpm.te is not defined, in tunables/distro.tun). It seems that the policy checker is seeing it, anyway. (This is as much detail as I can presume to even be of help with, for figuring-out why I'm running into that bug, during the pkg. install scripts, and with the cups.te file; I will, quite sincerely, appreciate if this could be resolved ) Incidentally, I'm using deb http://www.coker.com.au/newselinux/ ./ now, with the installation; I'm not sure if that's pertinent, but I figured it bears mentioning Ok. SELinux policy-file editors would be off topic. I'll cut the wire, here, then, after: "Dude", this "package stuff" is seriously apprciated, in the making of some 99.100% cracker-unfriendly, cheese-free systems. I dunno any convention circuits, either, but I know that this pkg is made by someone who has a pretty well iron-clad "vector" on host-sytem security, and so I presume that convention-talks would be from a *real* authority, if presented by the same, and (e.g.: to SAGE?) regarding the utmost of security for a Linux host, in a whole network env. (OSDL seems to bear some real relevance here, either - esp at their DCL/CGL projects, "for what it's worth". SELinux could probably keep a *good* spot, in regards to that OSDL CGL working-group - not my business is it to fuss about, granted, but it seems to bear some real mention, given: A spot for it, heh, even if it is somehow "off topic" from the msg.) So, "with no added sugar, here's the most I can think to say, of how this one thing in the pkg install script isn't working out" & "Thank you, mr. maintainer fellow", seriously. - schamp -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i586) Kernel: Linux 2.6.9 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages selinux-policy-default depends on: ii checkpolicy 1.20-1 SELinux policy compiler ii libpam-modules 0.77-0.se5 Pluggable Authentication Modules f ii libselinux1 1.20-1 SELinux shared libraries ii m4 1.4.2-2 a macro processing language ii make 3.80-9 The GNU version of the "make" util ii policycoreutils 1.18-1 SELinux core policy utilities ii python 2.3.4-5 An interactive high-level object-o -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]