Package: selinux-policy-default
Version: 1:1.18-1
Followup-For: Bug #288647


Hello,

It looks like the suggested patch has been applied, given that I'm seeing
this in /usr/share/selinux/policy/default/domains/program/cups.te :

/*************************************************
ifdef(distro_redhat', 
ifdef(rpm.te', 
allow cupsd_config_t
rpm_var_lib_t:dir { getattr search };
allow cupsd_config_t rpm_var_lib_t:file { getattr read };
')
allow cupsd_config_t initrc_exec_t:file getattr;
')dnl end distro_redhat
\*************************************************

So, I'm afraid that I don't understand why I'm encounterng the following,
from dpkg. (This is what I'd meant to file a bug report about, but it looks
like it's already an issue, "made" in the Deb BTS)


/*************************************************
Setting up selinux-policy-default (1.18-1) ...
/usr/bin/checkpolicy:  loading policy configuration from policy.conf
domains/program/cups.te:245:ERROR 'unknown type rpm_var_lib_t' at token ';'
on line 140828:
#line 245
allow cupsd_config_t rpm_var_lib_t:file { getattr read };
/usr/bin/checkpolicy:  error(s) encountered while parsing configuration
make: *** [/etc/selinux/policy/policy.18] Error 1
dpkg: error processing selinux-policy-default (--configure):
 subprocess post-installation script returned error exit status 2
\************************************************* 

In what I know of this, it looks as if rpm_var_lib_t should not even be
seen by the policy-chcker (given that rpm.te is not defined, in
tunables/distro.tun). It seems that the policy checker is seeing it, anyway.

(This is as much detail as I can presume to even be of help with, for
figuring-out why I'm running into that bug, during the pkg. install scripts,
and with the cups.te file; I will, quite sincerely, appreciate if this could
be resolved )

Incidentally, I'm using
  deb http://www.coker.com.au/newselinux/ ./
now, with the installation; I'm not sure if that's pertinent, but I figured
it bears mentioning

Ok. SELinux policy-file editors would be off topic. I'll cut the wire, here,
then, after: "Dude", this "package stuff" is seriously apprciated, in the
making of some 99.100% cracker-unfriendly, cheese-free systems. I dunno any
convention circuits, either, but I know that this pkg is made by someone who
has a pretty well iron-clad "vector" on host-sytem security, and so I
presume that convention-talks would be from a *real* authority, if presented
by the same, and (e.g.: to SAGE?) regarding the utmost of security for a
Linux host, in a whole network env. (OSDL seems to bear some real relevance
here, either - esp at their DCL/CGL projects, "for what it's worth". SELinux
could probably keep a *good* spot, in regards to that OSDL CGL working-group
- not my business is it to fuss about, granted, but it seems to bear some
real mention, given: A spot for it, heh, even if it is somehow "off topic"
from the msg.)


So, "with no added sugar, here's the most I can think to say, of how this 
one thing in the pkg install script isn't working out" & "Thank you, mr.
maintainer fellow", seriously.

- schamp


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i586)
Kernel: Linux 2.6.9
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages selinux-policy-default depends on:
ii  checkpolicy                   1.20-1     SELinux policy compiler
ii  libpam-modules                0.77-0.se5 Pluggable Authentication Modules f
ii  libselinux1                   1.20-1     SELinux shared libraries
ii  m4                            1.4.2-2    a macro processing language
ii  make                          3.80-9     The GNU version of the "make" util
ii  policycoreutils               1.18-1     SELinux core policy utilities
ii  python                        2.3.4-5    An interactive high-level object-o

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to