2005-06-01 14:17:43 +00:00
|
|
|
## <module name="iptables" layer="system">
|
|
|
|
## <summary>Policy for iptables.</summary>
|
2005-05-02 19:24:29 +00:00
|
|
|
|
2005-05-19 21:06:06 +00:00
|
|
|
########################################
|
2005-06-13 17:35:46 +00:00
|
|
|
## <interface name="iptables_domtrans">
|
2005-05-19 21:06:06 +00:00
|
|
|
## <description>
|
|
|
|
## Execute iptables in the iptables domain.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-05-02 19:24:29 +00:00
|
|
|
#
|
2005-06-13 17:35:46 +00:00
|
|
|
define(`iptables_domtrans',`
|
2005-06-13 20:47:04 +00:00
|
|
|
gen_require(`$0'_depend)
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 iptables_exec_t:file rx_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
allow $1 iptables_t:process transition;
|
|
|
|
type_transition $1 iptables_exec_t:process iptables_t;
|
|
|
|
dontaudit $1 iptables_t:process { noatsecure siginh rlimitinh };
|
|
|
|
|
|
|
|
allow $1 iptables_t:fd use;
|
|
|
|
allow iptables_t $1:fd use;
|
|
|
|
allow iptables_t $1:fifo_file rw_file_perms;
|
|
|
|
allow iptables_t $1:process sigchld;
|
2005-05-02 19:24:29 +00:00
|
|
|
')
|
|
|
|
|
2005-06-13 17:35:46 +00:00
|
|
|
define(`iptables_domtrans_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type iptables_t, iptables_exec_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class file rx_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
class process { transition noatsecure siginh rlimitinh sigchld };
|
|
|
|
class fd use;
|
|
|
|
class fifo_file rw_file_perms;
|
2005-05-02 19:24:29 +00:00
|
|
|
')
|
|
|
|
|
2005-05-19 21:06:06 +00:00
|
|
|
########################################
|
2005-06-13 17:35:46 +00:00
|
|
|
## <interface name="iptables_run">
|
2005-05-19 21:06:06 +00:00
|
|
|
## <description>
|
|
|
|
## Execute iptables in the iptables domain, and
|
|
|
|
## allow the specified role the iptables domain.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## <parameter name="role">
|
|
|
|
## The role to be allowed the iptables domain.
|
|
|
|
## </parameter>
|
|
|
|
## <parameter name="terminal">
|
|
|
|
## The type of the terminal allow the iptables domain to use.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-05-02 19:24:29 +00:00
|
|
|
#
|
2005-06-13 17:35:46 +00:00
|
|
|
define(`iptables_run',`
|
2005-06-13 20:47:04 +00:00
|
|
|
gen_require(`$0'_depend)
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-13 17:35:46 +00:00
|
|
|
iptables_domtrans($1)
|
2005-06-03 12:25:14 +00:00
|
|
|
role $2 types iptables_t;
|
|
|
|
allow iptables_t $3:chr_file { getattr read write ioctl };
|
2005-05-19 21:06:06 +00:00
|
|
|
')
|
|
|
|
|
2005-06-13 17:35:46 +00:00
|
|
|
define(`iptables_run_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type iptables_t;
|
|
|
|
|
|
|
|
class chr_file { getattr read write ioctl };
|
2005-05-19 21:06:06 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-13 17:35:46 +00:00
|
|
|
## <interface name="iptables_exec">
|
2005-05-19 21:06:06 +00:00
|
|
|
## <description>
|
|
|
|
## Execute iptables in the caller domain.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-05-02 19:24:29 +00:00
|
|
|
#
|
2005-06-13 17:35:46 +00:00
|
|
|
define(`iptables_exec',`
|
2005-06-13 20:47:04 +00:00
|
|
|
gen_require(`$0'_depend)
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
can_exec($1,iptables_exec_t)
|
|
|
|
|
2005-05-02 19:24:29 +00:00
|
|
|
')
|
|
|
|
|
2005-06-13 17:35:46 +00:00
|
|
|
define(`iptables_exec_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type iptables_t, iptables_exec_t;
|
|
|
|
|
|
|
|
class file { getattr read execute execute_no_trans };
|
2005-05-02 19:24:29 +00:00
|
|
|
')
|
2005-06-01 14:17:43 +00:00
|
|
|
|
|
|
|
## </module>
|