This is a (partial) credits file of organizations and people who have
contributed to the SELinux project.  It is modeled after the Linux
kernel CREDITS file, i.e. it is sorted by name and uses the following
fields for each entry: name (N), email (E), web-address (W), and
description (D).  Unlike the Contributors web page
(http://www.nsa.gov/selinux/contrib.html), this file does not
partition the list into different categories of contributions;
it is merely a flat listing of all contributors.

---------

N: Ryan Bergauer
E: bergauer@rice.edu
D: Developed Samba policy.

N: Joshua Brindle
E: JBrindle@snu.edu
D: original setfiles altroot patch
D: Ported and packaged SELinux for Hardened Gentoo with Chris PeBenito.

N: Russell Coker
E: russell@coker.com.au
D: Significantly expanded and improved the example policy. 
D: Enhanced the run_init and spasswd utilities.
D: Developed a devfsd module for managing devfs file contexts.
D: Implemented improvements to the setfiles program.
D: Extended strace to trace SELinux system calls.
D: Ported and packaged SELinux for Debian.
D: Ported several SELinux application patches to the Debian base packages.
D: Developed new SELinux patches for additional applications.

N: Brian Fegler
E: fegler@bigfoot.com
D: Developed the cando script for analyzing rules from a policy.conf file.

N: Carsten Grohmann
E: mail@carstengrohmann.de
W: http://www.securityenhancedlinux.de
D: Developed amanda policy.
D: Contributed several patches to other policy files.
D: Adapted the policy configuration for SuSE.
D: Created a mailing list for German-language SELinux users.

N: Paul Krumviede
E: pwk@acm.org
D: Contributed to the IPSEC policy configuration.

N: Brian May
E: bam@snoopy.apana.org.au
D: Contributed several new domains and patches to the policy.
D: Maintaining SELinux packages for Debian stable, based on Russell Coker's work.

N: The MITRE Corporation
E: aherzog@mitre.org
W: http://www.mitre.org/about/ciis/selinux/
D: Developed many new or modified utilities.
D: Developed several application policies (e.g. Apache, sendmail, crond).

N: James Morris
E: jmorris@intercode.com.au
W: http://www.intercode.com.au/jmorris
D: Developed the SELinux labeled networking support
D: Provided patches and feedback for the SELinux security module.

N: Yuichi Nakamura
E: ynakam@ori.hitachi-sk.co.jp
D: Contributed the initial policy configuration for BIND.

N: National Security Agency (NSA)
E: selinux-team@epoch.ncsc.mil
W: http://www.nsa.gov/selinux
D: Designed and implemented the original SELinux kernel patch.
D: Reworking the 2.5 SELinux for inclusion in mainline 2.5. 

N: Network Associates Laboratories (NAI Labs)
E: selinux@nailabs.com
D: Developed example policy configuration.
D: Ported SELinux kernel patch to 2.4 kernel.
D: Contributed to LSM kernel patch and adapted SELinux to LSM.

N: Chris PeBenito
D: Updated setfiles altroot patch to new API.
D: Contributed patch for run_init to fix a leaked descriptor.
D: Ported and packaged SELinux for Hardened Gentoo with Joshua Brindle.

N: Shaun Savage
E: savages@savages.com
D: Ported several of the SELinux utility patches to newer RedHat base versions.
D: Contributed several domains to the example policy configuration.

N: Secure Computing Corporation (SCC)
D: Developed preliminary policy configuration.
D: Developed some new and modified utilities.

N: Rogelio Serrano Jr.
E: rogelio@evoworks.evoserve.com
D: Implemented support for automatic type transitions for devfs pts nodes.

N: Justin Smith
E: jsmith@mcs.drexel.edu
W: http://vorpal.mcs.drexel.edu
D: Developed ipchains policy.
D: Contributed some patches to the existing policy.
D: Developed initial version of the newrules.pl script.

N: Steve Tate (University of North Texas COPS Lab)
E: srt@cs.unt.edu
D: Developed a GUI browser for analyzing type enforcement rules.

N: Tresys Technology
E: selinux@tresys.com
W: http://www.tresys.com/selinux
D: Developed policy management patch.
D: Extended checkpolicy username definition.
D: Developed usermod+group* patch.
D: Developed tools for policy analysis, user management, and policy customization.
D: Wrote some policy primer documents for SELinux.

N: Tom Vogt
E: tom@lemuria.org
D: Developed patches for the Apache and MySQL policies,
D: Developed a SubVersion policy.

N: Reino Wallin (Oribium Labs)
E: reino@oribium.com
D: Contributed some patches to the network policy configuration.
D: Developed a policy for a proxy firewall.

N: Dan Walsh (Red Hat)
D: Ported SELinux daemon/utility patches to the 2.5 SELinux API and RH9.
D: Ported newrole and run_init to the 2.5 SELinux API.
D: Created spec files for checkpolicy, libselinux, policycoreutils, policy.

N: Colin Walters
D: Contributed build patches and cleanups for checkpolicy, libselinux, policycoreutils.
D: Enhanced chcon to accept individual field options.
D: Contributed policy regression testing patch and package metadata patch.
D: Ported and packaged 2.5/6-based SELinux for Debian.

N: Mark Westerman
E: mark.westerman@westcam.com
D: Contributed several domains to the example policy.
D: Developed the default user patch.
D: Developed a patch for the GNOME Display Manager.
D: Created RPMs for SELinux.

N: David A. Wheeler
E: dwheeler@ida.org
D: Contributed several new domains to the policy configuration.
D: Provided feedback on the existing configuration.
D: Made helpful suggestions for improving the SELinux policy.
