diff --git a/policy/modules/services/bind.if b/policy/modules/services/bind.if index 31032a6ea..ccbc53723 100644 --- a/policy/modules/services/bind.if +++ b/policy/modules/services/bind.if @@ -253,7 +253,7 @@ interface(`bind_manage_cache',` ######################################## ## -## Do not audit attempts to set the attributes +## Allow domain to set the attributes ## of the BIND pid directory. ## ## @@ -270,6 +270,25 @@ interface(`bind_setattr_pid_dirs',` allow $1 named_var_run_t:dir setattr; ') +######################################## +## +## Allow domain to set attributes +## of the BIND zone directory. +## +## +## +## Domain allowed access. +## +## +# +interface(`bind_setattr_zone_dirs',` + gen_require(` + type named_zone_t; + ') + + allow $1 named_zone_t:dir setattr; +') + ######################################## ## ## Read BIND zone files. @@ -356,7 +375,7 @@ interface(`bind_admin',` bind_run_ndc($1, $2) - init_labeled_script_domtrans($1, bind_initrc_exec_t) + init_labeled_script_domtrans($1, named_initrc_exec_t) domain_system_change_exemption($1) role_transition $2 named_initrc_exec_t system_r; allow $2 system_r; diff --git a/policy/modules/services/bind.te b/policy/modules/services/bind.te index 362ab64de..3e8554b85 100644 --- a/policy/modules/services/bind.te +++ b/policy/modules/services/bind.te @@ -145,8 +145,6 @@ logging_send_syslog_msg(named_t) miscfiles_read_localization(named_t) miscfiles_read_certs(named_t) -sysnet_read_config(named_t) - userdom_dontaudit_use_unpriv_user_fds(named_t) userdom_dontaudit_search_user_home_dirs(named_t)