2005-06-27 18:36:56 +00:00
|
|
|
## <summary>Internet services daemon.</summary>
|
|
|
|
|
2005-07-12 20:34:24 +00:00
|
|
|
########################################
|
2005-06-27 18:36:56 +00:00
|
|
|
## <summary>
|
|
|
|
## Define the specified domain as a inetd service.
|
|
|
|
## </summary>
|
|
|
|
## <desc>
|
2006-01-25 15:45:48 +00:00
|
|
|
## <p>
|
2005-06-27 18:36:56 +00:00
|
|
|
## Define the specified domain as a inetd service. The
|
|
|
|
## inetd_service_domain(), inetd_tcp_service_domain(),
|
|
|
|
## or inetd_udp_service_domain() interfaces should be used
|
|
|
|
## instead of this interface, as this interface only provides
|
|
|
|
## the common rules to these three interfaces.
|
2006-01-25 15:45:48 +00:00
|
|
|
## </p>
|
2005-06-27 18:36:56 +00:00
|
|
|
## </desc>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type associated with the inetd service process.
|
|
|
|
## </param>
|
|
|
|
## <param name="entrypoint">
|
|
|
|
## The type associated with the process program.
|
|
|
|
## </param>
|
2005-07-12 20:34:24 +00:00
|
|
|
#
|
2005-06-27 18:36:56 +00:00
|
|
|
interface(`inetd_core_service_domain',`
|
|
|
|
gen_require(`
|
|
|
|
type inetd_t;
|
|
|
|
role system_r;
|
|
|
|
')
|
|
|
|
|
|
|
|
domain_type($1)
|
|
|
|
domain_entry_file($1,$2)
|
|
|
|
|
|
|
|
role system_r types $1;
|
|
|
|
|
2005-10-24 22:08:13 +00:00
|
|
|
ifdef(`targeted_policy',`
|
|
|
|
# this regex is a hack, since it assumes there is a
|
|
|
|
# _t at the end of the domain type. If there is no _t
|
|
|
|
# at the end of the type, it returns empty!
|
2005-10-31 20:32:53 +00:00
|
|
|
ifdef(`__define_'regexp($1, `\(\w+\)_t', `\1_disable_trans'),`',`
|
|
|
|
bool regexp($1, `\(\w+\)_t', `\1_disable_trans') false;
|
|
|
|
define(`__define_'regexp($1, `\(\w+\)_t', `\1_disable_trans'))
|
|
|
|
')
|
2005-10-24 22:08:13 +00:00
|
|
|
if(regexp($1, `\(\w+\)_t', `\1_disable_trans') ) {
|
2005-10-26 21:03:19 +00:00
|
|
|
# can_exec(inetd_t,$2)
|
|
|
|
# cjp: this must be wrong
|
|
|
|
gen_require(`
|
|
|
|
type initrc_t, unconfined_t;
|
|
|
|
')
|
|
|
|
can_exec({ unconfined_t initrc_t },$2)
|
2005-10-24 22:08:13 +00:00
|
|
|
} else {
|
|
|
|
domain_auto_trans(inetd_t,$2,$1)
|
|
|
|
allow inetd_t $1:fd use;
|
|
|
|
allow $1 inetd_t:fd use;
|
|
|
|
allow $1 inetd_t:fifo_file rw_file_perms;
|
|
|
|
allow $1 inetd_t:process sigchld;
|
|
|
|
dontaudit inetd_t $1:process { noatsecure siginh rlimitinh };
|
2005-06-27 18:36:56 +00:00
|
|
|
|
2005-10-26 21:03:19 +00:00
|
|
|
allow inetd_t $1:process sigkill;
|
|
|
|
|
2005-10-24 22:08:13 +00:00
|
|
|
# make sediff happy
|
|
|
|
allow $1 $2:file { rx_file_perms entrypoint };
|
|
|
|
}
|
|
|
|
',`
|
|
|
|
domain_auto_trans(inetd_t,$2,$1)
|
|
|
|
allow inetd_t $1:fd use;
|
|
|
|
allow $1 inetd_t:fd use;
|
|
|
|
allow $1 inetd_t:fifo_file rw_file_perms;
|
|
|
|
allow $1 inetd_t:process sigchld;
|
|
|
|
dontaudit inetd_t $1:process { noatsecure siginh rlimitinh };
|
|
|
|
|
2005-10-26 21:03:19 +00:00
|
|
|
allow inetd_t $1:process sigkill;
|
|
|
|
|
2005-10-24 22:08:13 +00:00
|
|
|
# make sediff happy
|
|
|
|
allow $1 $2:file { rx_file_perms entrypoint };
|
|
|
|
')
|
2005-06-27 18:36:56 +00:00
|
|
|
')
|
|
|
|
|
2005-07-12 20:34:24 +00:00
|
|
|
########################################
|
2005-06-27 18:36:56 +00:00
|
|
|
## <summary>
|
|
|
|
## Define the specified domain as a TCP inetd service.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type associated with the inetd service process.
|
|
|
|
## </param>
|
|
|
|
## <param name="entrypoint">
|
|
|
|
## The type associated with the process program.
|
|
|
|
## </param>
|
2005-07-12 20:34:24 +00:00
|
|
|
#
|
2005-06-27 18:36:56 +00:00
|
|
|
interface(`inetd_tcp_service_domain',`
|
|
|
|
|
|
|
|
gen_require(`
|
|
|
|
type inetd_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
inetd_core_service_domain($1,$2)
|
|
|
|
|
|
|
|
allow $1 inetd_t:tcp_socket rw_stream_socket_perms;
|
|
|
|
')
|
|
|
|
|
2005-07-12 20:34:24 +00:00
|
|
|
########################################
|
2005-06-27 18:36:56 +00:00
|
|
|
## <summary>
|
|
|
|
## Define the specified domain as a UDP inetd service.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type associated with the inetd service process.
|
|
|
|
## </param>
|
|
|
|
## <param name="entrypoint">
|
|
|
|
## The type associated with the process program.
|
|
|
|
## </param>
|
2005-07-12 20:34:24 +00:00
|
|
|
#
|
2005-06-27 18:36:56 +00:00
|
|
|
interface(`inetd_udp_service_domain',`
|
|
|
|
gen_require(`
|
|
|
|
type inetd_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
inetd_core_service_domain($1,$2)
|
|
|
|
|
|
|
|
allow $1 inetd_t:udp_socket rw_socket_perms;
|
|
|
|
')
|
|
|
|
|
2005-07-12 20:34:24 +00:00
|
|
|
########################################
|
2005-06-27 18:36:56 +00:00
|
|
|
## <summary>
|
|
|
|
## Define the specified domain as a TCP and UDP inetd service.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type associated with the inetd service process.
|
|
|
|
## </param>
|
|
|
|
## <param name="entrypoint">
|
|
|
|
## The type associated with the process program.
|
|
|
|
## </param>
|
2005-07-12 20:34:24 +00:00
|
|
|
#
|
2005-06-27 18:36:56 +00:00
|
|
|
interface(`inetd_service_domain',`
|
|
|
|
gen_require(`
|
|
|
|
type inetd_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
inetd_core_service_domain($1,$2)
|
|
|
|
|
|
|
|
allow $1 inetd_t:tcp_socket rw_stream_socket_perms;
|
|
|
|
allow $1 inetd_t:udp_socket rw_socket_perms;
|
|
|
|
')
|
2005-07-12 20:34:24 +00:00
|
|
|
|
2005-08-17 17:31:57 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Inherit and use file descriptors from inetd.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`inetd_use_fd',`
|
|
|
|
gen_require(`
|
|
|
|
type inetd_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 inetd_t:fd use;
|
|
|
|
')
|
|
|
|
|
2005-07-12 20:34:24 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Connect to the inetd service using a TCP connection.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
2005-08-03 15:16:33 +00:00
|
|
|
interface(`inetd_tcp_connect',`
|
2005-07-12 20:34:24 +00:00
|
|
|
gen_require(`
|
|
|
|
type inetd_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 inetd_t:tcp_socket { connectto recvfrom };
|
|
|
|
allow inetd_t $1:tcp_socket { acceptfrom recvfrom };
|
2005-09-08 17:12:38 +00:00
|
|
|
kernel_tcp_recvfrom($1)
|
2005-07-12 20:34:24 +00:00
|
|
|
')
|
2005-08-11 15:17:13 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Run inetd child process in the inet child domain
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`inetd_domtrans_child',`
|
|
|
|
gen_require(`
|
|
|
|
type inetd_child_t, inetd_child_exec_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
corecmd_search_sbin($1)
|
|
|
|
domain_auto_trans($1,inetd_child_exec_t,inetd_child_t)
|
|
|
|
|
|
|
|
allow $1 inetd_child_t:fd use;
|
|
|
|
allow inetd_child_t $1:fd use;
|
|
|
|
allow inetd_child_t $1:fifo_file rw_file_perms;
|
|
|
|
allow inetd_child_t $1:process sigchld;
|
|
|
|
')
|
2005-09-08 17:12:38 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Send UDP network traffic to inetd.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`inetd_udp_sendto',`
|
|
|
|
gen_require(`
|
|
|
|
type inetd_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 inetd_t:udp_socket sendto;
|
|
|
|
allow inetd_t $1:udp_socket recvfrom;
|
|
|
|
')
|
2005-11-29 15:49:18 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Read and write inetd TCP sockets.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`inetd_rw_tcp_socket',`
|
|
|
|
gen_require(`
|
|
|
|
type inetd_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 inetd_t:tcp_socket rw_stream_socket_perms;
|
|
|
|
')
|