Dear P,the Nazi involvement in question is only coming to attention.Keep you ears open.Kent Mc.
fedora-selinux-list-request@redhat.com wrote:Send fedora-selinux-list mailing list submissions to fedora-selinux-list@redhat.com
To subscribe or unsubscribe via the World Wide Web, visit http://www.redhat.com/mailman/listinfo/fedora-selinux-list or, via email, send a message with subject or body 'help' to fedora-selinux-list-request@redhat.com
You can reach the person managing the list at fedora-selinux-list-owner@redhat.com
When replying, please edit your Subject line so it is more specific than "Re: Contents of fedora-selinux-list digest..."
Today's Topics:
1. NAZI DATA (kent mcclanahan) 2. Re: NAZI DATA (Richard Irving) 3. Re: Today's targeted policy... (Stephen Smalley)
----------------------------------------------------------------------
Message: 1 Date: Thu, 10 Feb 2005 07:48:37 -0800 (PST) From: kent mcclanahan Subject: NAZI DATA To: fedora-selinux-list@redhat.com Message-ID: 20050210154837.76812.qmail@web50606.mail.yahoo.com Content-Type: text/plain; charset="us-ascii"
Gentlemen,could you please inform me how to obtain data on Nazi involvement with the National Security Agency and The Central Intelligence Agency including names of the projects?Most Sincerely,Kent McClanahan csm
--------------------------------- Do you Yahoo!? Meet the all-new My Yahoo! � Try it today! -------------- next part -------------- An HTML attachment was scrubbed... URL: https://www.redhat.com/archives/fedora-selinux-list/attachments/20050210/880...
------------------------------
Message: 2 Date: Thu, 10 Feb 2005 11:54:24 -0500 From: Richard Irving Subject: Re: NAZI DATA To: "Fedora SELinux support list for users & developers."
Message-ID: 420B91C0.3070502@antient.org Content-Type: text/plain; charset=windows-1252; format=flowed
kent mcclanahan wrote:
Gentlemen,could you please inform me how to obtain data on Nazi involvement with the National Security Agency and The Central Intelligence Agency including names of the projects?Most Sincerely,Kent McClanahan csm
The answer to those questions, and more, have been encoded into the wrinkles in the aluminum foil beanie, you are now wearing.
Your challenge is to decode the message, without removing the aluminum foil hat, and exposing yourself to the dreaded "mind rays".
Good Luck.
This message will self destruct, shortly after you hit delete.
:P
(ROTFLMAO!)
Do you Yahoo!? Meet the all-new My Yahoo! � Try it today!
-- fedora-selinux-list mailing list fedora-selinux-list@redhat.com http://www.redhat.com/mailman/listinfo/fedora-selinux-list
------------------------------
Message: 3 Date: Thu, 10 Feb 2005 11:48:55 -0500 From: Stephen Smalley Subject: Re: Today's targeted policy... To: Tom London , "Fedora SELinux support list for users & developers." Message-ID: 1108054135.22172.90.camel@moss-spartans.epoch.ncsc.mil Content-Type: text/plain
On Thu, 2005-02-10 at 10:23, Tom London wrote:
Running targeted/enforcing, latest rawhide.
After installing today's policy files and rebooting, had X/execmem problems. Solved by 'setsebool -P allow_execmem 1'.
Rebooting produces scads of use and sigchild denials. Attached is /var/log/messages.
In the past, use/fd denials were usually due to leaky file descriptors across execs. That likely the case here? Not sure about sigchild....
No, I removed rules from the general unconfined_domain() macro that shouldn't be applied to _all_ unconfined domains, and no one has yet added them back to the specific unconfined.te file in the targeted policy (which is the only place they were needed). In the targeted policy, all other domains are launched from the unconfined_t domain, and these rules used to be covered by the domain_auto_trans rules, but the re-introduction of initrc_t into the targeted policy means that they have to be separately allowed. So the allow domain unconfined_t:fd use; allow domain unconfined_t:process sigchld; rules need to go into the targeted unconfined.te file.