selinux-refpolicy/policy/modules
Dave Sugar 8f5cbc7779 Setup domain for tpm2_* binaries
The various /bin/tpm2_* binaries use dbus to communicate
with tpm2-abrmd and also can directly access /dev/tpmrm0.  This
seems like a way to help limit access to the TPM by running the
tpm_* binaries in their own domain.

I setup this domain because I have a process that needs to use
tpm2_hmac to encode something, but didn't want that domain to
have direct access to the TPM.  I did some basic testing to verify
that the other tpm2_* binaries have basically the same access needs.
But it wasn't through testing of all the tpm2_* binaries.

Signed-off-by: Dave Sugar <dsugar@tresys.com>
2020-04-16 15:40:09 -04:00
..
admin various: Module version bump. 2020-03-19 14:07:12 -04:00
apps mozilla, mailman, init, modutils: Module version bump. 2020-04-14 14:16:49 -04:00
kernel corecommands, init, lvm, systemd: Module version bump. 2020-04-01 13:15:28 -04:00
roles corenetwork, sysadm, sysnetwork: Module version bump. 2020-03-08 15:52:56 -04:00
services Setup domain for tpm2_* binaries 2020-04-16 15:40:09 -04:00
system mozilla, mailman, init, modutils: Module version bump. 2020-04-14 14:16:49 -04:00