Add fcontext for sshd pidfile and directory used for privsep
Also allow sshd_t domain to chroot(2) in this directory as explained in the README.privsep file in the openssh tarball. Thanks to Russell Coker for this patch
This commit is contained in:
parent
33b03a653e
commit
f2313e5304
|
@ -13,4 +13,6 @@ HOME_DIR/\.ssh(/.*)? gen_context(system_u:object_r:ssh_home_t,s0)
|
|||
|
||||
/usr/sbin/sshd -- gen_context(system_u:object_r:sshd_exec_t,s0)
|
||||
|
||||
/var/run/sshd(/.*)? gen_context(system_u:object_r:sshd_var_run_t,s0)
|
||||
/var/run/sshd\.init\.pid -- gen_context(system_u:object_r:sshd_var_run_t,s0)
|
||||
/var/run/sshd\.pid -- gen_context(system_u:object_r:sshd_var_run_t,s0)
|
||||
|
|
|
@ -196,6 +196,7 @@ template(`ssh_server_template', `
|
|||
manage_files_pattern($1_t, $1_tmpfs_t, $1_tmpfs_t)
|
||||
fs_tmpfs_filetrans($1_t, $1_tmpfs_t, file)
|
||||
|
||||
allow $1_t $1_var_run_t:dir search_dir_perms;
|
||||
allow $1_t $1_var_run_t:file manage_file_perms;
|
||||
files_pid_filetrans($1_t, $1_var_run_t, file)
|
||||
|
||||
|
|
Loading…
Reference in New Issue