- Change etc files to config files to allow users to read them
This commit is contained in:
parent
a6a82aec79
commit
4b1d56da14
@ -1,228 +0,0 @@
|
|||||||
# Allow making anonymous memory executable, e.g.for runtime-code generation or executable stack.
|
|
||||||
#
|
|
||||||
allow_execmem = false
|
|
||||||
|
|
||||||
# Allow making a modified private filemapping executable (text relocation).
|
|
||||||
#
|
|
||||||
allow_execmod = false
|
|
||||||
|
|
||||||
# Allow making the stack executable via mprotect.Also requires allow_execmem.
|
|
||||||
#
|
|
||||||
allow_execstack = false
|
|
||||||
|
|
||||||
# Allow ftp servers to modify public filesused for public file transfer services.
|
|
||||||
#
|
|
||||||
allow_ftpd_anon_write = false
|
|
||||||
|
|
||||||
# Allow gssd to read temp directory.
|
|
||||||
#
|
|
||||||
allow_gssd_read_tmp = false
|
|
||||||
|
|
||||||
# Allow Apache to modify public filesused for public file transfer services.
|
|
||||||
#
|
|
||||||
allow_httpd_anon_write = false
|
|
||||||
|
|
||||||
# Allow system to run with kerberos
|
|
||||||
#
|
|
||||||
allow_kerberos = true
|
|
||||||
|
|
||||||
# Allow rsync to modify public filesused for public file transfer services.
|
|
||||||
#
|
|
||||||
allow_rsync_anon_write = false
|
|
||||||
|
|
||||||
# Allow sasl to read shadow
|
|
||||||
#
|
|
||||||
allow_saslauthd_read_shadow = false
|
|
||||||
|
|
||||||
# Allow samba to modify public filesused for public file transfer services.
|
|
||||||
#
|
|
||||||
allow_smbd_anon_write = false
|
|
||||||
|
|
||||||
# Allow sysadm to ptrace all processes
|
|
||||||
#
|
|
||||||
allow_ptrace = false
|
|
||||||
|
|
||||||
# Allow system to run with NIS
|
|
||||||
#
|
|
||||||
allow_ypbind = false
|
|
||||||
|
|
||||||
# Enable extra rules in the cron domainto support fcron.
|
|
||||||
#
|
|
||||||
fcron_crond = false
|
|
||||||
|
|
||||||
# Allow ftp to read and write files in the user home directories
|
|
||||||
#
|
|
||||||
ftp_home_dir = false
|
|
||||||
|
|
||||||
# Allow ftpd to run directly without inetd
|
|
||||||
#
|
|
||||||
ftpd_is_daemon = true
|
|
||||||
|
|
||||||
# Allow httpd to use built in scripting (usually php)
|
|
||||||
#
|
|
||||||
httpd_builtin_scripting = false
|
|
||||||
|
|
||||||
# Allow http daemon to tcp connect
|
|
||||||
#
|
|
||||||
httpd_can_network_connect = false
|
|
||||||
|
|
||||||
# Allow httpd cgi support
|
|
||||||
#
|
|
||||||
httpd_enable_cgi = false
|
|
||||||
|
|
||||||
# Allow httpd to act as a FTP server bylistening on the ftp port.
|
|
||||||
#
|
|
||||||
httpd_enable_ftp_server = false
|
|
||||||
|
|
||||||
# Allow httpd to read home directories
|
|
||||||
#
|
|
||||||
httpd_enable_homedirs = false
|
|
||||||
|
|
||||||
# Run SSI execs in system CGI script domain.
|
|
||||||
#
|
|
||||||
httpd_ssi_exec = false
|
|
||||||
|
|
||||||
# Allow http daemon to communicate with the TTY
|
|
||||||
#
|
|
||||||
httpd_tty_comm = false
|
|
||||||
|
|
||||||
# Run CGI in the main httpd domain
|
|
||||||
#
|
|
||||||
httpd_unified = false
|
|
||||||
|
|
||||||
# Allow BIND to write the master zone files.Generally this is used for dynamic DNS.
|
|
||||||
#
|
|
||||||
named_write_master_zones = false
|
|
||||||
|
|
||||||
# Allow nfs to be exported read/write.
|
|
||||||
#
|
|
||||||
nfs_export_all_rw = false
|
|
||||||
|
|
||||||
# Allow nfs to be exported read only
|
|
||||||
#
|
|
||||||
nfs_export_all_ro = false
|
|
||||||
|
|
||||||
# Allow pppd to load kernel modules for certain modems
|
|
||||||
#
|
|
||||||
pppd_can_insmod = false
|
|
||||||
|
|
||||||
# Allow reading of default_t files.
|
|
||||||
#
|
|
||||||
read_default_t = false
|
|
||||||
|
|
||||||
# Allow ssh to run from inetd instead of as a daemon.
|
|
||||||
#
|
|
||||||
run_ssh_inetd = false
|
|
||||||
|
|
||||||
# Allow samba to export user home directories.
|
|
||||||
#
|
|
||||||
samba_enable_home_dirs = false
|
|
||||||
|
|
||||||
# Allow squid to connect to all ports, not justHTTP, FTP, and Gopher ports.
|
|
||||||
#
|
|
||||||
squid_connect_any = false
|
|
||||||
|
|
||||||
# Allow ssh logins as sysadm_r:sysadm_t
|
|
||||||
#
|
|
||||||
ssh_sysadm_login = false
|
|
||||||
|
|
||||||
# Configure stunnel to be a standalone daemon orinetd service.
|
|
||||||
#
|
|
||||||
stunnel_is_daemon = false
|
|
||||||
|
|
||||||
# Support NFS home directories
|
|
||||||
#
|
|
||||||
use_nfs_home_dirs = false
|
|
||||||
|
|
||||||
# Support SAMBA home directories
|
|
||||||
#
|
|
||||||
use_samba_home_dirs = false
|
|
||||||
|
|
||||||
# Control users use of ping and traceroute
|
|
||||||
#
|
|
||||||
user_ping = false
|
|
||||||
|
|
||||||
# Allow gpg executable stack
|
|
||||||
#
|
|
||||||
allow_gpg_execstack = false
|
|
||||||
|
|
||||||
# allow host key based authentication
|
|
||||||
#
|
|
||||||
allow_ssh_keysign = false
|
|
||||||
|
|
||||||
# Allow users to connect to mysql
|
|
||||||
#
|
|
||||||
allow_user_mysql_connect = false
|
|
||||||
|
|
||||||
# Allow system cron jobs to relabel filesystemfor restoring file contexts.
|
|
||||||
#
|
|
||||||
cron_can_relabel = false
|
|
||||||
|
|
||||||
# Allow pppd to be run for a regular user
|
|
||||||
#
|
|
||||||
pppd_for_user = false
|
|
||||||
|
|
||||||
# Allow applications to read untrusted contentIf this is disallowed, Internet content hasto be manually relabeled for read access to be granted
|
|
||||||
#
|
|
||||||
read_untrusted_content = true
|
|
||||||
|
|
||||||
# Allow user spamassassin clients to use the network.
|
|
||||||
#
|
|
||||||
spamassassin_can_network = false
|
|
||||||
|
|
||||||
# Allow staff_r users to search the sysadm homedir and read files (such as ~/.bashrc)
|
|
||||||
#
|
|
||||||
staff_read_sysadm_file = false
|
|
||||||
|
|
||||||
# Allow regular users direct mouse access
|
|
||||||
#
|
|
||||||
user_direct_mouse = false
|
|
||||||
|
|
||||||
# Allow users to read system messages.
|
|
||||||
#
|
|
||||||
user_dmesg = false
|
|
||||||
|
|
||||||
# Allow users to control network interfaces(also needs USERCTL=true)
|
|
||||||
#
|
|
||||||
user_net_control = false
|
|
||||||
|
|
||||||
# Allow user to r/w files on filesystemsthat do not have extended attributes (FAT, CDROM, FLOPPY)
|
|
||||||
#
|
|
||||||
user_rw_noexattrfile = false
|
|
||||||
|
|
||||||
# Allow users to rw usb devices
|
|
||||||
#
|
|
||||||
user_rw_usb = false
|
|
||||||
|
|
||||||
# Allow users to run TCP servers (bind to ports and accept connection fromthe same domain and outside users) disabling this forces FTP passive modeand may change other protocols.
|
|
||||||
#
|
|
||||||
user_tcp_server = false
|
|
||||||
|
|
||||||
# Allow w to display everyone
|
|
||||||
#
|
|
||||||
user_ttyfile_stat = false
|
|
||||||
|
|
||||||
# Allow applications to write untrusted contentIf this is disallowed, no Internet contentwill be stored.
|
|
||||||
#
|
|
||||||
write_untrusted_content = true
|
|
||||||
|
|
||||||
spamd_enable_home_dirs = false
|
|
||||||
|
|
||||||
# Allow login domains to polyinstatiate directories
|
|
||||||
#
|
|
||||||
allow_polyinstantiation = false
|
|
||||||
|
|
||||||
# Allow sysadm to ptrace all processes
|
|
||||||
#
|
|
||||||
allow_ptrace = false
|
|
||||||
|
|
||||||
## Control users use of ping and traceroute
|
|
||||||
user_ping = true
|
|
||||||
|
|
||||||
# Allow unlabeled packets to flow
|
|
||||||
#
|
|
||||||
allow_unlabeled_packets = true
|
|
||||||
|
|
||||||
# Allow samba to act as the domain controller
|
|
||||||
#
|
|
||||||
samba_domain_controller = false
|
|
1408
modules-strict.conf
1408
modules-strict.conf
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,11 +0,0 @@
|
|||||||
diff -up serefpolicy-3.3.1/policy/modules/services/rhgb.te.foo serefpolicy-3.3.1/policy/modules/services/rhgb.te
|
|
||||||
--- serefpolicy-3.3.1/policy/modules/services/rhgb.te.foo 2008-03-11 17:50:18.000000000 -0400
|
|
||||||
+++ serefpolicy-3.3.1/policy/modules/services/rhgb.te 2008-03-11 17:50:18.000000000 -0400
|
|
||||||
@@ -92,6 +92,7 @@ term_use_ptmx(rhgb_t)
|
|
||||||
term_getattr_pty_fs(rhgb_t)
|
|
||||||
|
|
||||||
init_write_initctl(rhgb_t)
|
|
||||||
+init_chat(rhgb_t)
|
|
||||||
|
|
||||||
libs_use_ld_so(rhgb_t)
|
|
||||||
libs_use_shared_libs(rhgb_t)
|
|
@ -1,10 +0,0 @@
|
|||||||
--- serefpolicy-2.5.9/policy/modules/system/udev.fc.udev_tbl 2007-03-20 09:36:50.000000000 -0400
|
|
||||||
+++ serefpolicy-2.5.9/policy/modules/system/udev.fc 2007-03-22 06:36:55.000000000 -0400
|
|
||||||
@@ -1,6 +1,6 @@
|
|
||||||
# udev
|
|
||||||
|
|
||||||
-/dev/\.udev(/.*)? gen_context(system_u:object_r:udev_tbl_t,s0)
|
|
||||||
+/dev/\.udev(/.*)? -- gen_context(system_u:object_r:udev_tbl_t,s0)
|
|
||||||
/dev/\.udevdb -- gen_context(system_u:object_r:udev_tbl_t,s0)
|
|
||||||
/dev/udev\.tbl -- gen_context(system_u:object_r:udev_tbl_t,s0)
|
|
||||||
|
|
@ -1,3 +0,0 @@
|
|||||||
sysadm_tty_device_t
|
|
||||||
user_tty_device_t
|
|
||||||
staff_tty_device_t
|
|
@ -17,7 +17,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.3.1
|
Version: 3.3.1
|
||||||
Release: 36%{?dist}
|
Release: 39%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -303,6 +303,8 @@ exit 0
|
|||||||
|
|
||||||
|
|
||||||
%triggerpostun targeted -- selinux-policy-targeted < 3.2.5-9.fc9
|
%triggerpostun targeted -- selinux-policy-targeted < 3.2.5-9.fc9
|
||||||
|
. /etc/selinux/config
|
||||||
|
[ "${SELINUXTYPE}" != "targeted" ] && exit 0
|
||||||
setsebool -P use_nfs_home_dirs=1
|
setsebool -P use_nfs_home_dirs=1
|
||||||
semanage user -l | grep -s unconfined_u
|
semanage user -l | grep -s unconfined_u
|
||||||
if [ $? -eq 0 ]; then
|
if [ $? -eq 0 ]; then
|
||||||
@ -311,9 +313,9 @@ else
|
|||||||
semanage user -a -P user -R "unconfined_r system_r" -r s0-s0:c0.c1023 unconfined_u 2> /dev/null
|
semanage user -a -P user -R "unconfined_r system_r" -r s0-s0:c0.c1023 unconfined_u 2> /dev/null
|
||||||
fi
|
fi
|
||||||
seuser=`semanage login -l | grep __default__ | awk '{ print $2 }'`
|
seuser=`semanage login -l | grep __default__ | awk '{ print $2 }'`
|
||||||
[ $seuser == "system_u" ] && semanage login -m -s "unconfined_u" -r s0-s0:c0.c1023 __default__
|
[ "$seuser" != "unconfined_u" ] && semanage login -m -s "unconfined_u" -r s0-s0:c0.c1023 __default__
|
||||||
seuser=`semanage login -l | grep root | awk '{ print $2 }'`
|
seuser=`semanage login -l | grep root | awk '{ print $2 }'`
|
||||||
[ $seuser == "system_u" ] && semanage login -m -s "unconfined_u" -r s0-s0:c0.c1023 root
|
[ "$seuser" == "system_u" ] && semanage login -m -s "unconfined_u" -r s0-s0:c0.c1023 root
|
||||||
restorecon -R /root /etc/selinux/targeted 2> /dev/null
|
restorecon -R /root /etc/selinux/targeted 2> /dev/null
|
||||||
semodule -r qmail 2> /dev/null
|
semodule -r qmail 2> /dev/null
|
||||||
exit 0
|
exit 0
|
||||||
@ -383,6 +385,12 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Apr 23 2008 Dan Walsh <dwalsh@redhat.com> 3.3.1-39
|
||||||
|
- Change etc files to config files to allow users to read them
|
||||||
|
|
||||||
|
* Fri Apr 14 2008 Dan Walsh <dwalsh@redhat.com> 3.3.1-37
|
||||||
|
- Lots of fixes for confined domains on NFS_t homedir
|
||||||
|
|
||||||
* Mon Apr 14 2008 Dan Walsh <dwalsh@redhat.com> 3.3.1-36
|
* Mon Apr 14 2008 Dan Walsh <dwalsh@redhat.com> 3.3.1-36
|
||||||
- dontaudit mrtg reading /proc
|
- dontaudit mrtg reading /proc
|
||||||
- Allow iscsi to signal itself
|
- Allow iscsi to signal itself
|
||||||
|
@ -1,19 +0,0 @@
|
|||||||
#
|
|
||||||
# Multi-Category Security translation table for SELinux
|
|
||||||
#
|
|
||||||
# Uncomment the following to disable translation libary
|
|
||||||
# disable=1
|
|
||||||
#
|
|
||||||
# Objects can be categorized with 0-1023 categories defined by the admin.
|
|
||||||
# Objects can be in more than one category at a time.
|
|
||||||
# Categories are stored in the system as c0-c1023. Users can use this
|
|
||||||
# table to translate the categories into a more meaningful output.
|
|
||||||
# Examples:
|
|
||||||
# s0:c0=CompanyConfidential
|
|
||||||
# s0:c1=PatientRecord
|
|
||||||
# s0:c2=Unclassified
|
|
||||||
# s0:c3=TopSecret
|
|
||||||
# s0:c1,c3=CompanyConfidentialRedHat
|
|
||||||
s0=
|
|
||||||
s0-s0:c0.c1023=SystemLow-SystemHigh
|
|
||||||
s0:c0.c1023=SystemHigh
|
|
@ -1,3 +0,0 @@
|
|||||||
system_u:system_u:s0-s0:c0.c1023
|
|
||||||
root:root:s0-s0:c0.c1023
|
|
||||||
__default__:user_u:s0
|
|
@ -1,4 +0,0 @@
|
|||||||
user root prefix staff;
|
|
||||||
user staff_u prefix staff;
|
|
||||||
user user_u prefix user;
|
|
||||||
user sysadm_u prefix sysadm;
|
|
136
xm.patch
136
xm.patch
@ -1,136 +0,0 @@
|
|||||||
diff -ru serefpolicy-2.2.35-orig/policy/modules/system/xen.fc serefpolicy-2.2.35/policy/modules/system/xen.fc
|
|
||||||
--- serefpolicy-2.2.35-orig/policy/modules/system/xen.fc 2006-04-24 20:14:54.000000000 -0400
|
|
||||||
+++ serefpolicy-2.2.35/policy/modules/system/xen.fc 2006-04-25 11:01:03.000000000 -0400
|
|
||||||
@@ -14,3 +14,4 @@
|
|
||||||
/var/run/xend\.pid -- gen_context(system_u:object_r:xend_var_run_t,s0)
|
|
||||||
/var/run/xenstore\.pid -- gen_context(system_u:object_r:xenstored_var_run_t,s0)
|
|
||||||
/var/run/xenstored(/.*)? gen_context(system_u:object_r:xenstored_var_run_t,s0)
|
|
||||||
+/usr/sbin/xm -- gen_context(system_u:object_r:xm_exec_t,s0)
|
|
||||||
--- serefpolicy-2.2.35-orig/policy/modules/system/xen.if 2006-04-25 10:27:36.000000000 -0400
|
|
||||||
+++ serefpolicy-2.2.35/policy/modules/system/xen.if 2006-04-25 11:03:07.000000000 -0400
|
|
||||||
@@ -83,3 +83,66 @@
|
|
||||||
allow $1 xenstored_var_run_t:sock_file { getattr write };
|
|
||||||
allow $1 xenstored_t:unix_stream_socket connectto;
|
|
||||||
')
|
|
||||||
+
|
|
||||||
+########################################
|
|
||||||
+## <summary>
|
|
||||||
+## Connect to xend over an unix stream socket.
|
|
||||||
+## </summary>
|
|
||||||
+## <param name="domain">
|
|
||||||
+## <summary>
|
|
||||||
+## Domain allowed access.
|
|
||||||
+## </summary>
|
|
||||||
+## </param>
|
|
||||||
+#
|
|
||||||
+interface(`xen_connect',`
|
|
||||||
+ gen_require(`
|
|
||||||
+ type xend_t, xend_var_run_t;
|
|
||||||
+ ')
|
|
||||||
+
|
|
||||||
+ files_search_pids($1)
|
|
||||||
+ allow $1 xend_var_run_t:dir search;
|
|
||||||
+ allow $1 xend_var_run_t:sock_file getattr;
|
|
||||||
+ allow $1 xend_t:unix_stream_socket connectto;
|
|
||||||
+')
|
|
||||||
+
|
|
||||||
+########################################
|
|
||||||
+## <summary>
|
|
||||||
+## Write to xend over an unix stream socket.
|
|
||||||
+## </summary>
|
|
||||||
+## <param name="domain">
|
|
||||||
+## <summary>
|
|
||||||
+## Domain allowed access.
|
|
||||||
+## </summary>
|
|
||||||
+## </param>
|
|
||||||
+#
|
|
||||||
+interface(`xen_writeto',`
|
|
||||||
+ gen_require(`
|
|
||||||
+ type xend_var_run_t;
|
|
||||||
+ ')
|
|
||||||
+
|
|
||||||
+ allow $1 xend_var_run_t:sock_file write;
|
|
||||||
+')
|
|
||||||
+
|
|
||||||
+
|
|
||||||
+########################################
|
|
||||||
+## <summary>
|
|
||||||
+## Execute a domain transition to run xm.
|
|
||||||
+## </summary>
|
|
||||||
+## <param name="domain">
|
|
||||||
+## <summary>
|
|
||||||
+## Domain allowed to transition.
|
|
||||||
+## </summary>
|
|
||||||
+## </param>
|
|
||||||
+#
|
|
||||||
+interface(`xm_domtrans',`
|
|
||||||
+ gen_requires(`
|
|
||||||
+ type xm_t, xm_exec_t;
|
|
||||||
+ ')
|
|
||||||
+
|
|
||||||
+ domain_auto_trans($1,xm_exec_t,xm_t)
|
|
||||||
+
|
|
||||||
+ allow $1 xm_t:fd use;
|
|
||||||
+ allow xm_t $1:fd use;
|
|
||||||
+ allow xm_t:$1:fifo_file rw_file_perms;
|
|
||||||
+ allow xm_t $1:process sigchld;
|
|
||||||
+')
|
|
||||||
Only in serefpolicy-2.2.35/policy/modules/system: xen.if~
|
|
||||||
--- serefpolicy-2.2.35-orig/policy/modules/system/xen.te 2006-04-25 10:27:36.000000000 -0400
|
|
||||||
+++ serefpolicy-2.2.35/policy/modules/system/xen.te 2006-04-25 11:01:03.000000000 -0400
|
|
||||||
@@ -224,3 +224,55 @@
|
|
||||||
miscfiles_read_localization(xenstored_t)
|
|
||||||
|
|
||||||
xen_append_log(xenstored_t)
|
|
||||||
+
|
|
||||||
+########################################
|
|
||||||
+#
|
|
||||||
+# Declarations
|
|
||||||
+#
|
|
||||||
+
|
|
||||||
+type xm_t;
|
|
||||||
+type xm_exec_t;
|
|
||||||
+domain_type(xm_t)
|
|
||||||
+init_daemon_domain(xm_t, xm_exec_t)
|
|
||||||
+
|
|
||||||
+########################################
|
|
||||||
+#
|
|
||||||
+# xm local policy
|
|
||||||
+#
|
|
||||||
+# Check in /etc/selinux/refpolicy/include for macros to use instead of allow rules.
|
|
||||||
+
|
|
||||||
+# Some common macros (you might be able to remove some)
|
|
||||||
+files_read_etc_files(xm_t)
|
|
||||||
+libs_use_ld_so(xm_t)
|
|
||||||
+libs_use_shared_libs(xm_t)
|
|
||||||
+miscfiles_read_localization(xm_t)
|
|
||||||
+# internal communication is often done using fifo and unix sockets.
|
|
||||||
+allow xm_t self:fifo_file { read write };
|
|
||||||
+allow xm_t self:unix_stream_socket create_stream_socket_perms;
|
|
||||||
+
|
|
||||||
+
|
|
||||||
+# james -- aujdit2allow
|
|
||||||
+
|
|
||||||
+corecmd_exec_bin(xm_t)
|
|
||||||
+corecmd_exec_sbin(xm_t)
|
|
||||||
+
|
|
||||||
+kernel_read_system_state(xm_t)
|
|
||||||
+kernel_read_kernel_sysctls(xm_t)
|
|
||||||
+kernel_read_xen_state(xm_t)
|
|
||||||
+kernel_write_xen_state(xm_t)
|
|
||||||
+term_use_all_terms(xm_t)
|
|
||||||
+
|
|
||||||
+dev_read_urand(xm_t)
|
|
||||||
+
|
|
||||||
+xen_append_log(xm_t)
|
|
||||||
+xen_connect(xm_t)
|
|
||||||
+xen_writeto(xm_t)
|
|
||||||
+
|
|
||||||
+xen_stream_connect_xenstore(xm_t)
|
|
||||||
+allow xm_t self:capability dac_override;
|
|
||||||
+
|
|
||||||
+
|
|
||||||
+# allow xm_t root_t:dir search;
|
|
||||||
+# Need to relabel files for xen
|
|
||||||
+auth_read_all_files_except_shadow(xm_t)
|
|
||||||
+
|
|
Loading…
Reference in New Issue
Block a user