[REFPOLICY PATCH] Added policy module for the oident daemon.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Signed-off-by: Dominick Grift <domg472@xxxxxxxxx>
---
 policy/modules/services/oidentd.fc |    9 +++++
 policy/modules/services/oidentd.if |    7 ++++
 policy/modules/services/oidentd.te |   68
++++++++++++++++++++++++++++++++++++
 3 files changed, 84 insertions(+), 0 deletions(-)
 create mode 100644 policy/modules/services/oidentd.fc
 create mode 100644 policy/modules/services/oidentd.if
 create mode 100644 policy/modules/services/oidentd.te

diff --git a/policy/modules/services/oidentd.fc
b/policy/modules/services/oidentd.fc
new file mode 100644
index 0000000..a9209dc
--- /dev/null
+++ b/policy/modules/services/oidentd.fc
@@ -0,0 +1,9 @@
+
+/etc/oidentd.conf		--
gen_context(system_u:object_r:oidentd_config_t,s0)
+/etc/oidentd_masq.conf	--
gen_context(system_u:object_r:oidentd_config_t,s0)
+
+ifdef(`distro_redhat', `
+/etc/rc\.d/init\.d/oidentd		--
gen_context(system_u:object_r:oidentd_script_exec_t,s0)
+')
+
+/usr/sbin/oidentd		--	gen_context(system_u:object_r:oidentd_exec_t,s0)
diff --git a/policy/modules/services/oidentd.if
b/policy/modules/services/oidentd.if
new file mode 100644
index 0000000..a745861
--- /dev/null
+++ b/policy/modules/services/oidentd.if
@@ -0,0 +1,7 @@
+## <summary>SELinux policy for the oident daemon.</summary>
+## <desc>
+##	<p>
+##	Applies SELinux security to the oident daemon.
+##	</p>
+## </desc>
+
diff --git a/policy/modules/services/oidentd.te
b/policy/modules/services/oidentd.te
new file mode 100644
index 0000000..1b770cf
--- /dev/null
+++ b/policy/modules/services/oidentd.te
@@ -0,0 +1,68 @@
+
+policy_module(oidentd, 0.0.1) 
+
+########################################
+#
+# oidentd private declarations
+#
+
+## <desc>
+## <p>
+## Allow the oident daemon to read
+## unprivileged user home content files.
+## </p>
+## </desc>
+gen_tunable(oidentd_read_unprivileged_user_home_content_files, false)
+
+type oidentd_t;
+type oidentd_exec_t;
+init_daemon_domain(oidentd_t, oidentd_exec_t)
+
+ifdef(`distro_redhat', `
+type oidentd_script_exec_t;
+init_script_type(oidentd_script_exec_t)
+')
+
+type oidentd_config_t;
+files_config_file(oidentd_config_t)
+
+########################################
+#
+# oidentd private policy
+#
+allow oidentd_t self:capability { setuid setgid };
+allow oidentd_t self:netlink_route_socket { write getattr read bind
create nlmsg_read };
+allow oidentd_t self:netlink_tcpdiag_socket { write read create
nlmsg_read };
+allow oidentd_t self:tcp_socket { setopt read bind create accept write
getattr listen };
+allow oidentd_t self:udp_socket { write read create connect getattr };
+allow oidentd_t self:unix_dgram_socket { create connect };
+
+allow oidentd_t oidentd_config_t:file read_file_perms;
+
+corenet_all_recvfrom_unlabeled(oidentd_t)
+corenet_all_recvfrom_netlabel(oidentd_t)
+corenet_tcp_sendrecv_all_if(oidentd_t)
+corenet_tcp_sendrecv_all_nodes(oidentd_t)
+corenet_tcp_bind_all_nodes(oidentd_t)
+corenet_tcp_bind_auth_port(oidentd_t);
+
+files_read_etc_files(oidentd_t)
+
+kernel_read_kernel_sysctls(oidentd_t)
+kernel_read_network_state(oidentd_t)
+kernel_read_network_state_symlinks(oidentd_t)
+kernel_read_sysctl(oidentd_t)
+
+libs_use_ld_so(oidentd_t)
+libs_use_shared_libs(oidentd_t)
+
+logging_send_syslog_msg(oidentd_t)
+
+miscfiles_read_localization(oidentd_t)
+
+sysnet_read_config(oidentd_t)
+
+tunable_policy(`oidentd_read_unprivileged_user_home_content_files', `
+	# ~/.oidentd.conf
+	userdom_read_unpriv_users_home_content_files(oidentd_t)
+')
-- 
1.5.5.2

-- 
Dominick Grift <domg472@xxxxxxxxx>

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux