Description of problem, bug, incorrect information, or enhancement request: Under Overview of This Release, for SELinux, you list daemons protected by the targeted policy in FC4. However, the list is somewhat misleading on two counts: 1) Several of these domains are given unconfined_domain() access in the targeted policy and only exist as separate domains to help with proper domain transitions into other domains or can otherwise transition to unconfined_t without real restriction; hence, they are not truly 'protected' in any real sense by the targeted policy (unlike strict). grep 'typeattribute.*unrestricted' /etc/selinux/targeted/src/policy/policy.conf to see at least a partial list of domains that aren't really restricted. Examples include crond, inetd, login, rshd, udev, ?hotplug?. 2) Several of these domains are not for daemons at all. Examples of non-daemons include checkpolicy, chkpwd, ?compat?, consoletype, dmidecode, fsadm, hostname, hotplug, hwclock, ifconfig, init, initrc, kudzu, ldconfig, load_policy, ?login?, modutil, netutils, restorecon, rpm, setfiles. Hence, I'd recommend a thorough review of the list and pruning out domains/programs that are not truly protected by targeted policy as well as those that are not daemons. Version of release notes this bug refers to: Fedora Core 4 final release
This situation here has been overcome by events. Closing as WONTFIX since we are no longer maintaining anything about FC4. Blocking master tracker so that it is part of our statistics and doesn't entirely disappear from memory.