diff --git a/www/api-docs/admin.html b/www/api-docs/admin.html index 86b55ddb..7d129659 100644 --- a/www/api-docs/admin.html +++ b/www/api-docs/admin.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -111,6 +120,11 @@ acct

Berkeley process accounting

+ + + anaconda +

Policy for the Anaconda installer.

+ consoletype @@ -123,6 +137,11 @@ Determine of the console connected to the controlling terminal. dmesg

Policy for dmesg.

+ + + dmidecode +

Decode DMI data for x86/ia64 bioses.

+ firstboot @@ -131,6 +150,11 @@ Final system configuration run during the first boot after installation of Red Hat/Fedora systems.

+ + + kudzu +

Hardware detection and configuration tools

+ logrotate diff --git a/www/api-docs/admin_acct.html b/www/api-docs/admin_acct.html index 0ebc8c1d..30672e1e 100644 --- a/www/api-docs/admin_acct.html +++ b/www/api-docs/admin_acct.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/admin_anaconda.html b/www/api-docs/admin_anaconda.html new file mode 100644 index 00000000..55b58ae0 --- /dev/null +++ b/www/api-docs/admin_anaconda.html @@ -0,0 +1,123 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: anaconda

+ +

Description:

+ +

Policy for the Anaconda installer.

+ + + + + +

No interfaces or templates.

+ + +
+ + diff --git a/www/api-docs/admin_consoletype.html b/www/api-docs/admin_consoletype.html index 796337ad..dbf7c29a 100644 --- a/www/api-docs/admin_consoletype.html +++ b/www/api-docs/admin_consoletype.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/admin_dmesg.html b/www/api-docs/admin_dmesg.html index da7f797d..0da57528 100644 --- a/www/api-docs/admin_dmesg.html +++ b/www/api-docs/admin_dmesg.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/admin_dmidecode.html b/www/api-docs/admin_dmidecode.html new file mode 100644 index 00000000..b2cfacd9 --- /dev/null +++ b/www/api-docs/admin_dmidecode.html @@ -0,0 +1,248 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: dmidecode

+ +

Description:

+ +

Decode DMI data for x86/ia64 bioses.

+ + + + +

Interfaces:

+ + +
+ + +
+ +dmidecode_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute dmidecode in the dmidecode domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +dmidecode_run( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+
+ +
Summary
+

+Execute dmidecode in the dmidecode domain, and +allow the specified role the dmidecode domain. +

+ + +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+role + + +The role to be allowed the dmidecode domain. + + +No +
+terminal + + +The type of the terminal allow the dmidecode domain to use. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/admin_firstboot.html b/www/api-docs/admin_firstboot.html index c84666a9..93e2019e 100644 --- a/www/api-docs/admin_firstboot.html +++ b/www/api-docs/admin_firstboot.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/admin_kudzu.html b/www/api-docs/admin_kudzu.html new file mode 100644 index 00000000..70fa9373 --- /dev/null +++ b/www/api-docs/admin_kudzu.html @@ -0,0 +1,248 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: kudzu

+ +

Description:

+ +

Hardware detection and configuration tools

+ + + + +

Interfaces:

+ + +
+ + +
+ +kudzu_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute kudzu in the kudzu domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +kudzu_run( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+
+ +
Summary
+

+Execute kudzu in the kudzu domain, and +allow the specified role the kudzu domain. +

+ + +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+role + + +The role to be allowed the kudzu domain. + + +No +
+terminal + + +The type of the terminal allow the kudzu domain to use. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/admin_logrotate.html b/www/api-docs/admin_logrotate.html index ff9327ba..d22f285c 100644 --- a/www/api-docs/admin_logrotate.html +++ b/www/api-docs/admin_logrotate.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -354,6 +363,48 @@ No + +
+ + +
+ +logrotate_use_fd( + + + + + domain + + + )
+
+
+ +
Summary
+

+Inherit and use logrotate file descriptors. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ Return diff --git a/www/api-docs/admin_netutils.html b/www/api-docs/admin_netutils.html index f51f45c7..21a44f40 100644 --- a/www/api-docs/admin_netutils.html +++ b/www/api-docs/admin_netutils.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -479,6 +488,85 @@ allow the specified role the ping domain.

+
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+role + + +The role to be allowed the ping domain. + + +No +
+terminal + + +The type of the terminal allow the ping domain to use. + + +No +
+ + + + +
+ + +
+ +netutils_run_ping_cond( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+
+ +
Summary
+

+Conditionally execute ping in the ping domain, and +allow the specified role the ping domain. +

+ +
Parameters
@@ -558,6 +646,85 @@ allow the specified role the traceroute domain.

+
Parameters
+
Parameter:Description:Optional:
+ + + + + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+role + + +The role to be allowed the traceroute domain. + + +No +
+terminal + + +The type of the terminal allow the traceroute domain to use. + + +No +
+
+
+ + +
+ + +
+ +netutils_run_traceroute_cond( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+
+ +
Summary
+

+Conditionally execute traceroute in the traceroute domain, and +allow the specified role the traceroute domain. +

+ +
Parameters
diff --git a/www/api-docs/admin_quota.html b/www/api-docs/admin_quota.html index 0cf7629b..863c9f7f 100644 --- a/www/api-docs/admin_quota.html +++ b/www/api-docs/admin_quota.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/admin_rpm.html b/www/api-docs/admin_rpm.html index 7e70e155..928b2572 100644 --- a/www/api-docs/admin_rpm.html +++ b/www/api-docs/admin_rpm.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/admin_su.html b/www/api-docs/admin_su.html index 1f63acf8..d645e0f8 100644 --- a/www/api-docs/admin_su.html +++ b/www/api-docs/admin_su.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -98,12 +107,63 @@

Layer: admin

Module: su

+Interfaces +Templates +

Description:

Run shells with substitute user and group

+ +

Interfaces:

+ + +
+ + +
+ +su_exec( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute su in the caller domain. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return +

Templates:

diff --git a/www/api-docs/admin_sudo.html b/www/api-docs/admin_sudo.html index 4d635b84..77d87d9a 100644 --- a/www/api-docs/admin_sudo.html +++ b/www/api-docs/admin_sudo.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/admin_tmpreaper.html b/www/api-docs/admin_tmpreaper.html index dba0046c..dc8753ed 100644 --- a/www/api-docs/admin_tmpreaper.html +++ b/www/api-docs/admin_tmpreaper.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/admin_updfstab.html b/www/api-docs/admin_updfstab.html index 94f349dc..249da55c 100644 --- a/www/api-docs/admin_updfstab.html +++ b/www/api-docs/admin_updfstab.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/admin_usermanage.html b/www/api-docs/admin_usermanage.html index 1f4c0c74..89fa6df5 100644 --- a/www/api-docs/admin_usermanage.html +++ b/www/api-docs/admin_usermanage.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -107,6 +116,49 @@

Interfaces:

+ +
+ + +
+ +usermanage_domtrans_admin_passwd( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute password admin functions in +the admin passwd domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/admin_vpn.html b/www/api-docs/admin_vpn.html index f1cf90a6..5276de74 100644 --- a/www/api-docs/admin_vpn.html +++ b/www/api-docs/admin_vpn.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
diff --git a/www/api-docs/apps.html b/www/api-docs/apps.html index df5f7337..b9616d6d 100644 --- a/www/api-docs/apps.html +++ b/www/api-docs/apps.html @@ -25,6 +25,9 @@    -  loadkeys
+    -  + webalizer
+
+  @@ -81,6 +84,11 @@ loadkeys

Load keyboard mappings.

+ + + webalizer +

Web server log analysis

+ diff --git a/www/api-docs/apps_gpg.html b/www/api-docs/apps_gpg.html index 4fc64167..a60e44b9 100644 --- a/www/api-docs/apps_gpg.html +++ b/www/api-docs/apps_gpg.html @@ -25,6 +25,9 @@    -  loadkeys
+    -  + webalizer
+ +  diff --git a/www/api-docs/apps_loadkeys.html b/www/api-docs/apps_loadkeys.html index fde47c41..44b768c4 100644 --- a/www/api-docs/apps_loadkeys.html +++ b/www/api-docs/apps_loadkeys.html @@ -25,6 +25,9 @@    -  loadkeys
+    -  + webalizer
+ +  diff --git a/www/api-docs/apps_webalizer.html b/www/api-docs/apps_webalizer.html new file mode 100644 index 00000000..c97a25bf --- /dev/null +++ b/www/api-docs/apps_webalizer.html @@ -0,0 +1,206 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: apps

+

Module: webalizer

+ +

Description:

+ +

Web server log analysis

+ + + + +

Interfaces:

+ + +
+ + +
+ +webalizer_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute webalizer in the webalizer domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +webalizer_run( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+
+ +
Summary
+

+Execute webalizer in the webalizer domain, and +allow the specified role the webalizer domain. +

+ + +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+role + + +The role to be allowed the webalizer domain. + + +No +
+terminal + + +The type of the terminal allow the webalizer domain to use. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/global_booleans.html b/www/api-docs/global_booleans.html index 42974ac5..3ae081e7 100644 --- a/www/api-docs/global_booleans.html +++ b/www/api-docs/global_booleans.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -67,6 +76,9 @@    -  loadkeys
+    -  + webalizer
+ +  @@ -88,6 +100,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -103,9 +118,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -127,6 +154,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -151,6 +184,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -172,9 +208,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -190,6 +232,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -330,10 +375,7 @@
Description

-Enabling secure mode disallows programs, such as -newrole, from transitioning to administrative -user domains. -

+Enabling secure mode disallows programs, such asnewrole, from transitioning to administrativeuser domains.

diff --git a/www/api-docs/global_tunables.html b/www/api-docs/global_tunables.html index ba986ce3..64e2fc36 100644 --- a/www/api-docs/global_tunables.html +++ b/www/api-docs/global_tunables.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -67,6 +76,9 @@    -  loadkeys
+    -  + webalizer
+ +  @@ -88,6 +100,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -103,9 +118,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -127,6 +154,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -151,6 +184,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -172,9 +208,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -190,6 +232,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -330,9 +375,7 @@
Description

-Allow making anonymous memory executable, e.g. -for runtime-code generation or executable stack. -

+Allow making anonymous memory executable, e.g.for runtime-code generation or executable stack.

@@ -344,9 +387,7 @@ for runtime-code generation or executable stack.
Description

-Allow making a modified private file -mapping executable (text relocation). -

+Allow making a modified private filemapping executable (text relocation).

@@ -358,9 +399,19 @@ mapping executable (text relocation).
Description

-Allow making the stack executable via mprotect. -Also requires allow_execmem. -

+Allow making the stack executable via mprotect.Also requires allow_execmem.

+ + + +
+
allow_ftpd_anon_write
+
+
Default value
+

false

+ +
Description
+

+Allow ftp servers to modify public filesused for public file transfer services.

@@ -372,8 +423,19 @@ Also requires allow_execmem.
Description

-Allow gpg executable stack -

+Allow gpg executable stack

+ + + +
+
allow_httpd_anon_write
+
+
Default value
+

false

+ +
Description
+

+Allow Apache to modify public filesused for public file transfer services.

@@ -385,8 +447,31 @@ Allow gpg executable stack
Description

-Allow system to run with kerberos -

+Allow system to run with kerberos

+ + + +
+
allow_ptrace
+
+
Default value
+

false

+ +
Description
+

+Allow sysadm to ptrace all processes

+ +
+ +
+
allow_saslauthd_read_shadow
+
+
Default value
+

false

+ +
Description
+

+Allow sasl to read shadow

@@ -398,8 +483,7 @@ Allow system to run with kerberos
Description

-allow host key based authentication -

+allow host key based authentication

@@ -411,8 +495,7 @@ allow host key based authentication
Description

-Allow users to connect to mysql -

+Allow users to connect to mysql

@@ -424,8 +507,7 @@ Allow users to connect to mysql
Description

-Allow system to run with NIS -

+Allow system to run with NIS

@@ -437,9 +519,7 @@ Allow system to run with NIS
Description

-Allow system cron jobs to relabel filesystem -for restoring file contexts. -

+Allow system cron jobs to relabel filesystemfor restoring file contexts.

@@ -451,9 +531,115 @@ for restoring file contexts.
Description

-Enable extra rules in the cron domain -to support fcron. -

+Enable extra rules in the cron domainto support fcron.

+ + + +
+
ftp_home_dir
+
+
Default value
+

false

+ +
Description
+

+Allow ftp to read and write files in the user home directories

+ +
+ +
+
ftpd_is_daemon
+
+
Default value
+

false

+ +
Description
+

+Allow ftpd to run directly without inetd

+ +
+ +
+
httpd_builtin_scripting
+
+
Default value
+

false

+ +
Description
+

+Allow httpd to use built in scripting (usually php)

+ +
+ +
+
httpd_can_network_connect
+
+
Default value
+

false

+ +
Description
+

+Allow http daemon to tcp connect

+ +
+ +
+
httpd_enable_cgi
+
+
Default value
+

false

+ +
Description
+

+Allow httpd cgi support

+ +
+ +
+
httpd_enable_homedirs
+
+
Default value
+

false

+ +
Description
+

+Allow httpd to read home directories

+ +
+ +
+
httpd_ssi_exec
+
+
Default value
+

false

+ +
Description
+

+Run SSI execs in system CGI script domain.

+ +
+ +
+
httpd_tty_comm
+
+
Default value
+

false

+ +
Description
+

+Allow http daemon to communicate with the TTY

+ +
+ +
+
httpd_unified
+
+
Default value
+

false

+ +
Description
+

+Run CGI in the main httpd domain

@@ -465,9 +651,31 @@ to support fcron.
Description

-Allow BIND to write the master zone files. -Generally this is used for dynamic DNS. -

+Allow BIND to write the master zone files.Generally this is used for dynamic DNS.

+ + + +
+
pppd_can_insmod
+
+
Default value
+

false

+ +
Description
+

+Allow pppd to load kernel modules for certain modems

+ +
+ +
+
pppd_for_user
+
+
Default value
+

false

+ +
Description
+

+Allow pppd to be run for a regular user

@@ -479,8 +687,7 @@ Generally this is used for dynamic DNS.
Description

-Allow reading of default_t files. -

+Allow reading of default_t files.

@@ -492,10 +699,7 @@ Allow reading of default_t files.
Description

-Allow applications to read untrusted content -If this is disallowed, Internet content has -to be manually relabeled for read access to be granted -

+Allow applications to read untrusted contentIf this is disallowed, Internet content hasto be manually relabeled for read access to be granted

@@ -507,8 +711,7 @@ to be manually relabeled for read access to be granted
Description

-Allow ssh to run from inetd instead of as a daemon. -

+Allow ssh to run from inetd instead of as a daemon.

@@ -520,9 +723,7 @@ Allow ssh to run from inetd instead of as a daemon.
Description

-Allow squid to connect to all ports, not just -HTTP, FTP, and Gopher ports. -

+Allow squid to connect to all ports, not justHTTP, FTP, and Gopher ports.

@@ -534,8 +735,7 @@ HTTP, FTP, and Gopher ports.
Description

-Allow ssh logins as sysadm_r:sysadm_t -

+Allow ssh logins as sysadm_r:sysadm_t

@@ -547,9 +747,7 @@ Allow ssh logins as sysadm_r:sysadm_t
Description

-Allow staff_r users to search the sysadm home -dir and read files (such as ~/.bashrc) -

+Allow staff_r users to search the sysadm homedir and read files (such as ~/.bashrc)

@@ -561,8 +759,7 @@ dir and read files (such as ~/.bashrc)
Description

-Support NFS home directories -

+Support NFS home directories

@@ -574,8 +771,7 @@ Support NFS home directories
Description

-Support SAMBA home directories -

+Support SAMBA home directories

@@ -587,8 +783,7 @@ Support SAMBA home directories
Description

-Allow regular users direct mouse access -

+Allow regular users direct mouse access

@@ -600,8 +795,7 @@ Allow regular users direct mouse access
Description

-Allow users to read system messages. -

+Allow users to read system messages.

@@ -613,9 +807,7 @@ Allow users to read system messages.
Description

-Allow users to control network interfaces -(also needs USERCTL=true) -

+Allow users to control network interfaces(also needs USERCTL=true)

@@ -627,8 +819,7 @@ Allow users to control network interfaces
Description

-Control users use of ping and traceroute -

+Control users use of ping and traceroute

@@ -640,8 +831,7 @@ Control users use of ping and traceroute
Description

-Allow user to r/w noextattrfile (FAT, CDROM, FLOPPY) -

+Allow user to r/w noextattrfile (FAT, CDROM, FLOPPY)

@@ -653,8 +843,7 @@ Allow user to r/w noextattrfile (FAT, CDROM, FLOPPY)
Description

-Allow users to rw usb devices -

+Allow users to rw usb devices

@@ -666,10 +855,7 @@ Allow users to rw usb devices
Description

-Allow users to run TCP servers (bind to ports and accept connection from -the same domain and outside users) disabling this forces FTP passive mode -and may change other protocols. -

+Allow users to run TCP servers (bind to ports and accept connection fromthe same domain and outside users) disabling this forces FTP passive modeand may change other protocols.

@@ -681,8 +867,7 @@ and may change other protocols.
Description

-Allow w to display everyone -

+Allow w to display everyone

@@ -694,10 +879,7 @@ Allow w to display everyone
Description

-Allow applications to write untrusted content -If this is disallowed, no Internet content -will be stored. -

+Allow applications to write untrusted contentIf this is disallowed, no Internet contentwill be stored.

diff --git a/www/api-docs/index.html b/www/api-docs/index.html index 5fca52db..81c93634 100644 --- a/www/api-docs/index.html +++ b/www/api-docs/index.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -67,6 +76,9 @@    -  loadkeys
+    -  + webalizer
+ +  @@ -88,6 +100,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -103,9 +118,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -127,6 +154,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -151,6 +184,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -172,9 +208,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -190,6 +232,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -336,6 +381,11 @@ acct

Berkeley process accounting

+ + + anaconda +

Policy for the Anaconda installer.

+ consoletype @@ -348,6 +398,11 @@ Determine of the console connected to the controlling terminal. dmesg

Policy for dmesg.

+ + + dmidecode +

Decode DMI data for x86/ia64 bioses.

+ firstboot @@ -356,6 +411,11 @@ Final system configuration run during the first boot after installation of Red Hat/Fedora systems.

+ + + kudzu +

Hardware detection and configuration tools

+ logrotate @@ -469,6 +529,11 @@ Device nodes and interfaces for many basic system devices. Policy for kernel threads, proc filesystem,and unlabeled processes and objects.

+ + + mls +

Multilevel security policy

+ selinux @@ -519,6 +584,11 @@ Policy for kernel security interface, in particular, selinuxfs. loadkeys

Load keyboard mappings.

+ + + webalizer +

Web server log analysis

+ @@ -720,11 +790,31 @@ connection and disconnection of devices at runtime. + + + apache +

Apache web server

+ + + + apm +

Advanced power management daemon

+ + + + arpwatch +

Ethernet activity monitor.

+ bind

Berkeley internet name domain DNS server.

+ + + bluetooth +

Bluetooth tools and system services.

+ comsat @@ -760,6 +850,16 @@ connection and disconnection of devices at runtime. dictd

Dictionary daemon

+ + + finger +

Finger user information service.

+ + + + ftp +

File transfer protocol service

+ gpm @@ -800,6 +900,11 @@ connection and disconnection of devices at runtime. ldap

OpenLDAP directory server

+ + + mailman +

Mailman is for managing electronic mail discussion and e-newsletter lists

+ mta @@ -835,11 +940,21 @@ connection and disconnection of devices at runtime. postgresql

PostgreSQL relational database

+ + + ppp +

Point to Point Protocol daemon creates links in ppp networks

+ privoxy

Privacy enhancing web proxy.

+ + + radvd +

IPv6 router advertisement daemon

+ remotelogin @@ -863,7 +978,16 @@ connection and disconnection of devices at runtime. samba -

SMB and CIFS client/server programs for UNIX

+

+SMB and CIFS client/server programs for UNIX and +name Service Switch daemon for resolving names +from Windows NT servers. +

+ + + + sasl +

SASL authentication server

diff --git a/www/api-docs/interfaces.html b/www/api-docs/interfaces.html index f141f571..ea502ad5 100644 --- a/www/api-docs/interfaces.html +++ b/www/api-docs/interfaces.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -67,6 +76,9 @@    -  loadkeys
+    -  + webalizer
+
+  @@ -88,6 +100,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -103,9 +118,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -127,6 +154,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -151,6 +184,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -172,9 +208,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -190,6 +232,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -426,6 +471,777 @@ Create, read, write, and delete process accounting data.
+
+Module: +apache

+Layer: +services

+

+ +apache_append_squirrelmail_data( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to append +apache squirrelmail data. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_domtrans( + + + + + domain + + + )
+
+ +
+

+Transition to apache. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_domtrans_all_scripts( + + + + + domain + + + )
+
+ +
+

+Execute all user scripts in the user +script domain. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_domtrans_helper( + + + + + domain + + + )
+
+ +
+

+Execute the Apache helper program with +a domain transition. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_domtrans_sys_script( + + + + + domain + + + )
+
+ +
+

+Execute all web scripts in the system +script domain. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_dontaudit_append_log( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to append to the +Apache logs. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_dontaudit_rw_stream_socket( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to read and write Apache +unix domain stream sockets. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_dontaudit_rw_sys_script_stream_socket( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to read and write Apache +system script unix domain stream sockets. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_dontaudit_rw_tcp_socket( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to read and write Apache +TCP sockets. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_list_modules( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to list +the contents of the apache modules +directory. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_manage_sys_content( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to manage +apache system content files. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_read_config( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to read +apache configuration files. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_read_log( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to read +apache log files. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_read_squirrelmail_data( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to read +apache squirrelmail data. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_run_all_scripts( + + + + + domain + + + + , + + + + role + + + )
+
+ +
+

+Execute all user scripts in the user +script domain. Add user script domains +to the specified role. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_run_helper( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+ +
+

+Execute the Apache helper program with +a domain transition, and allow the +specified role the dmidecode domain. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_sigchld( + + + + + domain + + + )
+
+ +
+

+Send a SIGCHLD signal to apache. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_signull( + + + + + domain + + + )
+
+ +
+

+Send a null signal to apache. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_use_fd( + + + + + domain + + + )
+
+ +
+

+Inherit and use file descriptors from Apache. +

+
+ +
+ +
+Module: +apm

+Layer: +services

+

+ +apm_append_log( + + + + + domain + + + )
+
+ +
+

+Append to apm's log file. +

+
+ +
+ +
+Module: +apm

+Layer: +services

+

+ +apm_domtrans_client( + + + + + domain + + + )
+
+ +
+

+Execute APM in the apm domain. +

+
+ +
+ +
+Module: +apm

+Layer: +services

+

+ +apm_rw_stream_socket( + + + + + domain + + + )
+
+ +
+

+Read and write to an apm unix stream socket. +

+
+ +
+ +
+Module: +apm

+Layer: +services

+

+ +apm_use_fd( + + + + + domain + + + )
+
+ +
+

+Use file descriptors for apmd. +

+
+ +
+ +
+Module: +apm

+Layer: +services

+

+ +apm_write_pipe( + + + + + domain + + + )
+
+ +
+

+Write to apmd unnamed pipes. +

+
+ +
+ +
+Module: +arpwatch

+Layer: +services

+

+ +arpwatch_dontaudit_rw_packet_socket( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to read and write +arpwatch packet sockets. +

+
+ +
+ +
+Module: +arpwatch

+Layer: +services

+

+ +arpwatch_manage_data_files( + + + + + domain + + + )
+
+ +
+

+Create arpwatch data files. +

+
+ +
+ +
+Module: +arpwatch

+Layer: +services

+

+ +arpwatch_rw_tmp_files( + + + + + domain + + + )
+
+ +
+

+Read and write arpwatch temporary files. +

+
+ +
+ +
+Module: +arpwatch

+Layer: +services

+

+ +arpwatch_search_data( + + + + + domain + + + )
+
+ +
+

+Search arpwatch's data file directories. +

+
+ +
+
Module: authlogin

@@ -452,6 +1268,58 @@ Append to the login failure log.

+
+Module: +authlogin

+Layer: +system

+

+ +auth_append_lastlog( + + + + + domain + + + )
+
+ +
+

+Append only to the last logins log. +

+
+ +
+ +
+Module: +authlogin

+Layer: +system

+

+ +auth_append_login_records( + + + + + domain + + + )
+
+ +
+

+Append to login records (wtmp). +

+
+ +
+
Module: authlogin

@@ -969,6 +1837,32 @@ Summary is missing!

+
+Module: +authlogin

+Layer: +system

+

+ +auth_read_lastlog( + + + + + domain + + + )
+
+ +
+

+Read the last logins log. +

+
+ +
+
Module: authlogin

@@ -1260,7 +2154,7 @@ system

- ? + domain )
@@ -1268,7 +2162,7 @@ system

-Summary is missing! +Read and write to the last logins log.

@@ -1352,6 +2246,84 @@ Unconfined access to the authlogin module.
+
+Module: +authlogin

+Layer: +system

+

+ +auth_use_nsswitch( + + + + + domain + + + )
+
+ +
+

+Use nsswitch to look up uid-username mappings. +

+
+ +
+ +
+Module: +authlogin

+Layer: +system

+

+ +auth_write_login_records( + + + + + domain + + + )
+
+ +
+

+Write to login records (wtmp). +

+
+ +
+ +
+Module: +bind

+Layer: +services

+

+ +bind_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute bind in the named domain. +

+
+ +
+
Module: bind

@@ -2096,6 +3068,32 @@ Search the /boot directory.

+
+Module: +bootloader

+Layer: +kernel

+

+ +bootloader_search_kernel_modules( + + + + + domain + + + )
+
+ +
+

+Search the contents of the kernel module directories. +

+
+ +
+
Module: bootloader

@@ -2168,8 +3166,8 @@ system

- Execute hwclock in the caller domain. -

+Execute hwclock in the caller domain. +

@@ -2237,8 +3235,8 @@ system

- Allow executing domain to modify clock drift -

+Allow executing domain to modify clock drift +

@@ -5530,6 +6528,58 @@ Bind TCP sockets to the openvpn port. +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_tcp_bind_pegasus_http_port( + + + + + domain + + + )
+
+ +
+

+Bind TCP sockets to the pegasus_http port. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_tcp_bind_pegasus_https_port( + + + + + domain + + + )
+
+ +
+

+Bind TCP sockets to the pegasus_https port. +

+
+ +
+
Module: corenetwork

@@ -6544,6 +7594,32 @@ Connect TCP sockets to all ports.

+
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_tcp_connect_all_reserved_ports( + + + + + domain + + + )
+
+ +
+

+Connect TCP sockets to reserved ports. +

+
+ +
+
Module: corenetwork

@@ -7688,6 +8764,58 @@ Make a TCP connection to the openvpn port.

+
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_tcp_connect_pegasus_http_port( + + + + + domain + + + )
+
+ +
+

+Make a TCP connection to the pegasus_http port. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_tcp_connect_pegasus_https_port( + + + + + domain + + + )
+
+ +
+

+Make a TCP connection to the pegasus_https port. +

+
+ +
+
Module: corenetwork

@@ -10080,6 +11208,58 @@ Send and receive TCP traffic on the openvpn port.

+
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_tcp_sendrecv_pegasus_http_port( + + + + + domain + + + )
+
+ +
+

+Send and receive TCP traffic on the pegasus_http port. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_tcp_sendrecv_pegasus_https_port( + + + + + domain + + + )
+
+ +
+

+Send and receive TCP traffic on the pegasus_https port. +

+
+ +
+
Module: corenetwork

@@ -12472,6 +13652,58 @@ Bind UDP sockets to the openvpn port.

+
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_bind_pegasus_http_port( + + + + + domain + + + )
+
+ +
+

+Bind UDP sockets to the pegasus_http port. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_bind_pegasus_https_port( + + + + + domain + + + )
+
+ +
+

+Bind UDP sockets to the pegasus_https port. +

+
+ +
+
Module: corenetwork

@@ -14916,6 +16148,58 @@ Receive UDP traffic on the openvpn port.

+
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_receive_pegasus_http_port( + + + + + domain + + + )
+
+ +
+

+Receive UDP traffic on the pegasus_http port. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_receive_pegasus_https_port( + + + + + domain + + + )
+
+ +
+

+Receive UDP traffic on the pegasus_https port. +

+
+ +
+
Module: corenetwork

@@ -17360,6 +18644,58 @@ Send UDP traffic on the openvpn port.

+
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_send_pegasus_http_port( + + + + + domain + + + )
+
+ +
+

+Send UDP traffic on the pegasus_http port. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_send_pegasus_https_port( + + + + + domain + + + )
+
+ +
+

+Send UDP traffic on the pegasus_https port. +

+
+ +
+
Module: corenetwork

@@ -19804,6 +21140,58 @@ Send and receive UDP traffic on the openvpn port.

+
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_sendrecv_pegasus_http_port( + + + + + domain + + + )
+
+ +
+

+Send and receive UDP traffic on the pegasus_http port. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_sendrecv_pegasus_https_port( + + + + + domain + + + )
+
+ +
+

+Send and receive UDP traffic on the pegasus_https port. +

+
+ +
+
Module: corenetwork

@@ -20688,6 +22076,32 @@ Unconfined access to network objects.

+
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_use_ppp_device( + + + + + domain + + + )
+
+ +
+

+Read and write the point-to-point device. +

+
+ +
+
Module: corenetwork

@@ -23233,6 +24647,32 @@ is required to load CPU microcode.

+
+Module: +devices

+Layer: +kernel

+

+ +dev_rw_crypto( + + + + + domain + + + )
+
+ +
+

+Read and write the the hardware SSL accelerator. +

+
+ +
+
Module: devices

@@ -23311,6 +24751,32 @@ Read and write the lvm control device.

+
+Module: +devices

+Layer: +kernel

+

+ +dev_rw_mouse( + + + + + domain + + + )
+
+ +
+

+Read and write to mouse devices. +

+
+ +
+
Module: devices

@@ -24356,6 +25822,75 @@ Execute dmesg in the caller domain.

+
+Module: +dmidecode

+Layer: +admin

+

+ +dmidecode_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute dmidecode in the dmidecode domain. +

+
+ +
+ +
+Module: +dmidecode

+Layer: +admin

+

+ +dmidecode_run( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+ +
+

+Execute dmidecode in the dmidecode domain, and +allow the specified role the dmidecode domain. +

+
+ +
+
Module: domain

@@ -24440,6 +25975,33 @@ constraints.

+
+Module: +domain

+Layer: +system

+

+ +domain_dontaudit_getattr_all_key_sockets( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get attribues of +all domains IPSEC key management sockets. +

+
+ +
+
Module: domain

@@ -25060,6 +26622,32 @@ changing the user identity in object contexts.

+
+Module: +domain

+Layer: +system

+

+ +domain_ptrace_all_domains( + + + + + domain + + + )
+
+ +
+

+Ptrace all domains. +

+
+ +
+
Module: domain

@@ -26237,6 +27825,196 @@ files with the default file type.

+
+Module: +files

+Layer: +system

+

+ +files_dontaudit_getattr_home_dir( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the +attributes of the home directories root +(/home). +

+
+ +
+ +
+Module: +files

+Layer: +system

+

+ +files_dontaudit_getattr_non_security_blk_dev( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of non security block devices. +

+
+ +
+ +
+Module: +files

+Layer: +system

+

+ +files_dontaudit_getattr_non_security_chr_dev( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of non security character devices. +

+
+ +
+ +
+Module: +files

+Layer: +system

+

+ +files_dontaudit_getattr_non_security_files( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of non security files. +

+
+ +
+ +
+Module: +files

+Layer: +system

+

+ +files_dontaudit_getattr_non_security_pipes( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of non security named pipes. +

+
+ +
+ +
+Module: +files

+Layer: +system

+

+ +files_dontaudit_getattr_non_security_sockets( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of non security named sockets. +

+
+ +
+ +
+Module: +files

+Layer: +system

+

+ +files_dontaudit_getattr_non_security_symlinks( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of non security symbolic links. +

+
+ +
+
Module: files

@@ -26344,6 +28122,33 @@ directories with the default file type.

+
+Module: +files

+Layer: +system

+

+ +files_dontaudit_list_non_security( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to list all +non security directories. +

+
+ +
+
Module: files

@@ -26596,6 +28401,33 @@ system

+ domain + + + )
+

+ +
+

+Do not audit attempts to search +the /var/run directory. +

+
+ + + +
+Module: +files

+Layer: +system

+

+ +files_dontaudit_search_src( + + + + ? @@ -26622,7 +28454,7 @@ system

- ? + domain )
@@ -26630,7 +28462,8 @@ system

-Summary is missing! +Do not audit attempts to search +the contents of /var.

@@ -26700,6 +28533,32 @@ system

+ domain + + + )
+

+ +
+

+Execute generic programs in /usr in the caller domain. +

+
+ +
+ +
+Module: +files

+Layer: +system

+

+ +files_exec_usr_src_files( + + + + domain @@ -26890,8 +28749,7 @@ system

-Do not audit attempts to get the -attributes of the home directories root +Get the attributes of the home directories root (/home).

@@ -27238,6 +29096,32 @@ directories in /usr.
+
+Module: +files

+Layer: +system

+

+ +files_list_var( + + + + + domain + + + )
+
+ +
+

+List the contents of /var. +

+
+ +
+
Module: files

@@ -28036,7 +29920,7 @@ system

-Make the specified type a +Make the specified type a polyinstantiated directory.

@@ -28570,7 +30454,33 @@ system

-Read generic files in /var/lib +Read generic files in /var/lib. +

+
+ +
+ +
+Module: +files

+Layer: +system

+

+ +files_read_var_lib_symlinks( + + + + + domain + + + )
+
+ +
+

+Read generic symbolic links in /var/lib

@@ -28896,7 +30806,7 @@ system

-Read and write block device nodes on new filesystems +Read and write block device nodes on new filesystems that have not yet been labeled.

@@ -28930,6 +30840,59 @@ that have not yet been labeled.
+
+Module: +files

+Layer: +system

+

+ +files_rw_locks_dir( + + + + + domain + + + )
+
+ +
+

+Add and remove entries in the /var/lock +directories. +

+
+ +
+ +
+Module: +files

+Layer: +system

+

+ +files_search_all( + + + + + domain + + + )
+
+ +
+

+Search all directories. +

+
+ +
+
Module: files

@@ -29202,7 +31165,7 @@ system

- ? + domain )
@@ -29210,7 +31173,7 @@ system

-Summary is missing! +Search the contents of /var.

@@ -29242,6 +31205,34 @@ Search the /var/lib directory.
+
+Module: +files

+Layer: +system

+

+ +files_security_file( + + + + + file_type + + + )
+
+ +
+

+Make the specified type a file that +should not be dontaudited from +browsing from user domains. +

+
+ +
+
Module: files

@@ -29360,7 +31351,7 @@ system

- ? + type )
@@ -29368,7 +31359,8 @@ system

-Summary is missing! +Make the specified type usable for files +in a filesystem.

@@ -29452,6 +31444,58 @@ Summary is missing!
+
+Module: +finger

+Layer: +services

+

+ +finger_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute fingerd in the fingerd domain. +

+
+ +
+ +
+Module: +finger

+Layer: +services

+

+ +finger_tcp_connect( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to connect to fingerd with a tcp socket. +

+
+ +
+
Module: firstboot

@@ -29746,6 +31790,33 @@ Summary is missing!

+
+Module: +filesystem

+Layer: +kernel

+

+ +fs_dontaudit_getattr_all_files( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of all files with a filesystem type. +

+
+ +
+
Module: filesystem

@@ -29773,6 +31844,87 @@ all filesystems.

+
+Module: +filesystem

+Layer: +kernel

+

+ +fs_dontaudit_getattr_all_pipes( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of all named pipes with a filesystem type. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_dontaudit_getattr_all_sockets( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of all named sockets with a filesystem type. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_dontaudit_getattr_all_symlinks( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to get the attributes +of all symbolic links with a filesystem type. +

+
+ +
+
Module: filesystem

@@ -30237,6 +32389,34 @@ with extended attributes.

+
+Module: +filesystem

+Layer: +kernel

+

+ +fs_get_xattr_fs_quotas( + + + + + domain + + + )
+
+ +
+

+Get the quotas of a persistent +filesystem which has extended +attributes, such as ext3, JFS, or XFS. +

+
+ +
+
Module: filesystem

@@ -30249,7 +32429,7 @@ kernel

- ? + domain )
@@ -30257,7 +32437,8 @@ kernel

-Summary is missing! +Get the attributes of all files with +a filesystem type.

@@ -30290,6 +32471,87 @@ filesystems.
+
+Module: +filesystem

+Layer: +kernel

+

+ +fs_getattr_all_pipes( + + + + + domain + + + )
+
+ +
+

+Get the attributes of all named pipes with +a filesystem type. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_getattr_all_sockets( + + + + + domain + + + )
+
+ +
+

+Get the attributes of all named sockets with +a filesystem type. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_getattr_all_symlinks( + + + + + domain + + + )
+
+ +
+

+Get the attributes of all symbolic links with +a filesystem type. +

+
+ +
+
Module: filesystem

@@ -32230,6 +34492,32 @@ Search directories on a NFS filesystem.

+
+Module: +filesystem

+Layer: +kernel

+

+ +fs_search_ramfs( + + + + + domain + + + )
+
+ +
+

+Search directories on a ramfs +

+
+ +
+
Module: filesystem

@@ -32755,6 +35043,32 @@ Read and write character nodes on tmpfs filesystems.

+
+Module: +filesystem

+Layer: +kernel

+

+ +fs_write_ramfs_socket( + + + + + domain + + + )
+
+ +
+

+Write to named socket on a ramfs filesystem. +

+
+ +
+
Module: fstools

@@ -32904,6 +35218,110 @@ allow the specified role the fs tools domain.

+
+Module: +ftp

+Layer: +services

+

+ +ftp_check_exec( + + + + + domain + + + )
+
+ +
+

+Execute FTP daemon entry point programs. +

+
+ +
+ +
+Module: +ftp

+Layer: +services

+

+ +ftp_read_config( + + + + + domain + + + )
+
+ +
+

+Read ftpd etc files +

+
+ +
+ +
+Module: +ftp

+Layer: +services

+

+ +ftp_read_log( + + + + + domain + + + )
+
+ +
+

+Read FTP transfer logs +

+
+ +
+ +
+Module: +ftp

+Layer: +services

+

+ +ftp_tcp_connect( + + + + + domain + + + )
+
+ +
+

+Use ftp by connecting over TCP. +

+
+ +
+
Module: getty

@@ -33028,7 +35446,7 @@ services

-Do not audit attempts to get the +Do not audit attempts to get the attributes of the GPM control channel named socket.

@@ -33136,8 +35554,8 @@ system

- Execute hostname in the caller domain. -

+Execute hostname in the caller domain. +

@@ -33806,6 +36224,33 @@ Summary is missing!
+
+Module: +init

+Layer: +system

+

+ +init_dontaudit_unix_connect_script( + + + + + domain + + + )
+
+ +
+

+Dont audit the specified domain connecting to +init scripts with a unix domain stream socket. +

+
+ +
+
Module: init

@@ -34456,6 +36901,60 @@ Send UDP network traffic to init scripts.

+
+Module: +init

+Layer: +system

+

+ +init_unix_connect_script( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to connect to +init scripts with a unix domain stream socket. +

+
+ +
+ +
+Module: +init

+Layer: +system

+

+ +init_unix_connect_script( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to connect to +init scripts with a unix socket. +

+
+ +
+
Module: init

@@ -35364,6 +37863,32 @@ read system state information in proc.

+
+Module: +kernel

+Layer: +kernel

+

+ +kernel_dontaudit_search_kernel_sysctl( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to search generic kernel sysctls. +

+
+ +
+
Module: kernel

@@ -35392,13 +37917,13 @@ state directory.

-Module: +Module: kernel

Layer: kernel

-kernel_dontaudit_search_network_sysctl_dir( +kernel_dontaudit_search_network_sysctl( @@ -35411,20 +37936,20 @@ kernel

-Do not audit attempts by caller to search sysctl network directories. +Do not audit attempts by caller to search network sysctl directories.

-Module: +Module: kernel

Layer: kernel

-kernel_dontaudit_search_sysctl_dir( +kernel_dontaudit_search_sysctl( @@ -35437,7 +37962,8 @@ kernel

-Do not audit attempts by caller to search the sysctl directory. +Do not audit attempts by caller to search +the base directory of sysctls.

@@ -35810,6 +38336,32 @@ Allow caller to read all sysctls.
+
+Module: +kernel

+Layer: +kernel

+

+ +kernel_read_debugfs( + + + + + domain + + + )
+
+ +
+

+Read information from the debugging filesystem. +

+
+ +
+
Module: kernel

@@ -36805,6 +39357,32 @@ specified directory.

+
+Module: +kernel

+Layer: +kernel

+

+ +kernel_search_network_sysctl( + + + + + domain + + + )
+
+ +
+

+Search network sysctl directories. +

+
+ +
+
Module: kernel

@@ -37455,6 +40033,101 @@ by transitioning to the specified domain.

+
+Module: +kernel

+Layer: +kernel

+

+ +kernel_write_proc_file( + + + + + domain + + + )
+
+ +
+

+Write to generic proc entries. +

+
+ +
+ +
+Module: +kudzu

+Layer: +admin

+

+ +kudzu_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute kudzu in the kudzu domain. +

+
+ +
+ +
+Module: +kudzu

+Layer: +admin

+

+ +kudzu_run( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+ +
+

+Execute kudzu in the kudzu domain, and +allow the specified role the kudzu domain. +

+
+ +
+
Module: ldap

@@ -38195,6 +40868,32 @@ Execute all log files in the caller domain.

+
+Module: +logging

+Layer: +system

+

+ +logging_list_logs( + + + + + domain + + + )
+
+ +
+

+List the contents of the generic log directory (/var/log). +

+
+ +
+
Module: logging

@@ -38632,6 +41331,32 @@ allow the specified role the logrotate domain.

+
+Module: +logrotate

+Layer: +admin

+

+ +logrotate_use_fd( + + + + + domain + + + )
+
+ +
+

+Inherit and use logrotate file descriptors. +

+
+ +
+
Module: lvm

@@ -38726,6 +41451,242 @@ Execute lvm programs in the lvm domain.

+
+Module: +mailman

+Layer: +services

+

+ +mailman_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute mailman in the mailman domain. +

+
+ +
+ +
+Module: +mailman

+Layer: +services

+

+ +mailman_domtrans_cgi( + + + + + domain + + + )
+
+ +
+

+Execute mailman CGI scripts in the +mailman CGI domain. +

+
+ +
+ +
+Module: +mailman

+Layer: +services

+

+ +mailman_exec( + + + + + domain + + + )
+
+ +
+

+Execute mailman in the caller domain. +

+
+ +
+ +
+Module: +mailman

+Layer: +services

+

+ +mailman_list_data( + + + + + domain + + + )
+
+ +
+

+List the contents of mailman data directories. +

+
+ +
+ +
+Module: +mailman

+Layer: +services

+

+ +mailman_manage_log( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete +mailman logs. +

+
+ +
+ +
+Module: +mailman

+Layer: +services

+

+ +mailman_read_archive( + + + + + domain + + + )
+
+ +
+

+Allow domain to read mailman archive files. +

+
+ +
+ +
+Module: +mailman

+Layer: +services

+

+ +mailman_read_data_symlinks( + + + + + domain + + + )
+
+ +
+

+Allow read acces to mailman data symbolic links. +

+
+ +
+ +
+Module: +mailman

+Layer: +services

+

+ +mailman_search_data( + + + + + domain + + + )
+
+ +
+

+Allow domain to search data directories. +

+
+ +
+ +
+Module: +mailman

+Layer: +services

+

+ +mailman_signal_cgi( + + + + + domain + + + )
+
+ +
+

+Send generic signals to the mailman cgi domain. +

+
+ +
+
Module: miscfiles

@@ -38830,6 +41791,59 @@ Create, read, write, and delete man pages

+
+Module: +miscfiles

+Layer: +system

+

+ +miscfiles_manage_public_files( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete public files +and directories used for file transfer services. +

+
+ +
+ +
+Module: +miscfiles

+Layer: +system

+

+ +miscfiles_read_certs( + + + + + domain + + + )
+
+ +
+

+Read system SSL certificates. +

+
+ +
+
Module: miscfiles

@@ -38850,7 +41864,33 @@ system

-Read fonts +Read fonts. +

+
+ +
+ +
+Module: +miscfiles

+Layer: +system

+

+ +miscfiles_read_hwdata( + + + + + domain + + + )
+
+ +
+

+Read hardware identification data.

@@ -38908,6 +41948,33 @@ Read man pages
+
+Module: +miscfiles

+Layer: +system

+

+ +miscfiles_read_public_files( + + + + + domain + + + )
+
+ +
+

+Read public files used for file +transfer services. +

+
+ +
+
Module: miscfiles

@@ -38934,6 +42001,278 @@ Read TeX data

+
+Module: +mls

+Layer: +kernel

+

+ +mls_file_downgrade( + + + + + domain + + + )
+
+ +
+

+Make specified domain MLS trusted +for lowering the level of files. +

+
+ +
+ +
+Module: +mls

+Layer: +kernel

+

+ +mls_file_read_up( + + + + + domain + + + )
+
+ +
+

+Make specified domain MLS trusted +for reading from files at higher levels. +

+
+ +
+ +
+Module: +mls

+Layer: +kernel

+

+ +mls_file_upgrade( + + + + + domain + + + )
+
+ +
+

+Make specified domain MLS trusted +for raising the level of files. +

+
+ +
+ +
+Module: +mls

+Layer: +kernel

+

+ +mls_file_write_down( + + + + + domain + + + )
+
+ +
+

+Make specified domain MLS trusted +for writing to files at lower levels. +

+
+ +
+ +
+Module: +mls

+Layer: +kernel

+

+ +mls_process_read_up( + + + + + domain + + + )
+
+ +
+

+Make specified domain MLS trusted +for reading from processes at higher levels. +

+
+ +
+ +
+Module: +mls

+Layer: +kernel

+

+ +mls_process_set_level( + + + + + domain + + + )
+
+ +
+

+Make specified domain MLS trusted +for setting the level of processes +it executes. +

+
+ +
+ +
+Module: +mls

+Layer: +kernel

+

+ +mls_process_write_down( + + + + + domain + + + )
+
+ +
+

+Make specified domain MLS trusted +for writing to processes at lower levels. +

+
+ +
+ +
+Module: +mls

+Layer: +kernel

+

+ +mls_rangetrans_source( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to do a MLS +range transition that changes +the current level. +

+
+ +
+ +
+Module: +mls

+Layer: +kernel

+

+ +mls_rangetrans_target( + + + + + domain + + + )
+
+ +
+

+Make specified domain a target domain +for MLS range transitions that change +the current level. +

+
+ +
+ +
+Module: +mls

+Layer: +kernel

+

+ +mls_trusted_object( + + + + + domain + + + )
+
+ +
+

+Make specified object MLS trusted. +

+
+ +
+
Module: modutils

@@ -39143,6 +42482,33 @@ loading modules.

+
+Module: +modutils

+Layer: +system

+

+ +modutils_rename_module_conf( + + + + + domain + + + )
+
+ +
+

+Rename a file with the configuration options used when +loading modules. +

+
+ +
+
Module: modutils

@@ -39448,6 +42814,33 @@ in the mail spool.

+
+Module: +mta

+Layer: +services

+

+ +mta_dontaudit_rw_delivery_tcp_socket( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to read and write TCP +sockets of mail delivery domains. +

+
+ +
+
Module: mta

@@ -39799,6 +43192,62 @@ sendmail daemon use.

+
+Module: +mta

+Layer: +services

+

+ +mta_stub( + + + + + [ + + domain + + ] + + + )
+
+ +
+

+MTA stub interface. No access allowed. +

+
+ +
+ +
+Module: +mta

+Layer: +services

+

+ +mta_tcp_connect_all_mailservers( + + + + + domain + + + )
+
+ +
+

+Connect to all mail servers over TCP. +

+
+ +
+
Module: mysql

@@ -39877,6 +43326,33 @@ Read and write to the MySQL database directory.

+
+Module: +mysql

+Layer: +services

+

+ +mysql_rw_db_socket( + + + + + domain + + + )
+
+ +
+

+Read and write to the MySQL database +named socket. +

+
+ +
+
Module: mysql

@@ -40224,6 +43700,49 @@ allow the specified role the ping domain.

+
+Module: +netutils

+Layer: +admin

+

+ +netutils_run_ping_cond( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+ +
+

+Conditionally execute ping in the ping domain, and +allow the specified role the ping domain. +

+
+ +
+
Module: netutils

@@ -40267,6 +43786,49 @@ allow the specified role the traceroute domain.

+
+Module: +netutils

+Layer: +admin

+

+ +netutils_run_traceroute_cond( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+ +
+

+Conditionally execute traceroute in the traceroute domain, and +allow the specified role the traceroute domain. +

+
+ +
+
Module: nis

@@ -40293,6 +43855,32 @@ Send UDP network traffic to NIS clients.

+
+Module: +nis

+Layer: +services

+

+ +nis_signal_ypbind( + + + + + domain + + + )
+
+ +
+

+Send generic signals to ypbind. +

+
+ +
+
Module: nis

@@ -40345,6 +43933,33 @@ Use the ypbind service to access NIS services.

+
+Module: +nis

+Layer: +services

+

+ +nis_use_ypbind_uncond( + + + + + domain + + + )
+
+ +
+

+Use the ypbind service to access NIS services +unconditionally. +

+
+ +
+
Module: nscd

@@ -41012,6 +44627,162 @@ Allow the specified domain to connect to postgresql with a unix socket.

+
+Module: +ppp

+Layer: +services

+

+ +ppp_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute domain in the ppp domain. +

+
+ +
+ +
+Module: +ppp

+Layer: +services

+

+ +ppp_run( + + + + + domain + + + )
+
+ +
+

+Unconditionally execute ppp daemon on behalf of a user or staff type. +

+
+ +
+ +
+Module: +ppp

+Layer: +services

+

+ +ppp_run_cond( + + + + + domain + + + )
+
+ +
+

+Conditionally execute ppp daemon on behalf of a user or staff type. +

+
+ +
+ +
+Module: +ppp

+Layer: +services

+

+ +ppp_sigchld( + + + + + domain + + + )
+
+ +
+

+Allow domain to send sigchld to parent of PPP domain type. +

+
+ +
+ +
+Module: +ppp

+Layer: +services

+

+ +ppp_signal( + + + + + domain + + + )
+
+ +
+

+Allow domain to send a signal to PPP domain type. +

+
+ +
+ +
+Module: +ppp

+Layer: +services

+

+ +ppp_use_fd( + + + + + domain + + + )
+
+ +
+

+Use PPP file discriptors. +

+
+ +
+
Module: quota

@@ -41566,6 +45337,32 @@ Execute smbmount in the smbmount domain.

+
+Module: +samba

+Layer: +services

+

+ +samba_domtrans_winbind_helper( + + + + + domain + + + )
+
+ +
+

+Execute winbind_helper in the winbind_helper domain. +

+
+ +
+
Module: samba

@@ -41671,6 +45468,58 @@ Allow the specified domain to read samba's secrets.

+
+Module: +samba

+Layer: +services

+

+ +samba_read_winbind_pid( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to read the winbind pid files. +

+
+ +
+ +
+Module: +samba

+Layer: +services

+

+ +samba_read_winbind_pid( + + + + + domain + + + )
+
+ +
+

+Allow the specified domain to read the winbind pid files. +

+
+ +
+
Module: samba

@@ -41714,6 +45563,49 @@ allow the specified role the samba_net domain.

+
+Module: +samba

+Layer: +services

+

+ +samba_run_winbind_helper( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+ +
+

+Execute winbind_helper in the winbind_helper domain, and +allow the specified role the winbind_helper domain. +

+
+ +
+
Module: samba

@@ -42056,6 +45948,32 @@ Allow caller to load the policy into the kernel.

+
+Module: +selinux

+Layer: +kernel

+

+ +selinux_search_fs( + + + + + domain + + + )
+
+ +
+

+Search selinuxfs. +

+
+ +
+
Module: selinux

@@ -42226,6 +46144,36 @@ Domain transition to sendmail.

+
+Module: +sendmail

+Layer: +services

+

+ +sendmail_stub( + + + + + [ + + domain + + ] + + + )
+
+ +
+

+Sendmail stub interface. No access allowed. +

+
+ +
+
Module: selinuxutil

@@ -44229,6 +48177,32 @@ a tape device.

+
+Module: +su

+Layer: +admin

+

+ +su_exec( + + + + + domain + + + )
+
+ +
+

+Execute su in the caller domain. +

+
+ +
+
Module: sysnetwork

@@ -44302,6 +48276,32 @@ Create DHCP state data.

+
+Module: +sysnetwork

+Layer: +system

+

+ +sysnet_delete_dhcpc_pid( + + + + + domain + + + )
+
+ +
+

+Delete the dhcp client pid file. +

+
+ +
+
Module: sysnetwork

@@ -44857,6 +48857,32 @@ Connect and use remote port mappers.

+
+Module: +tcpd

+Layer: +services

+

+ +tcpd_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute tcpd in the tcpd domain. +

+
+ +
+
Module: terminal

@@ -45299,6 +49325,32 @@ tty device nodes.

+
+Module: +terminal

+Layer: +kernel

+

+ +term_ioctl_generic_pty( + + + + + domain + + + )
+
+ +
+

+ioctl of generic pty types. +

+
+ +
+
Module: terminal

@@ -45513,6 +49565,32 @@ the unallocated tty type.

+
+Module: +terminal

+Layer: +kernel

+

+ +term_search_ptys( + + + + + domain + + + )
+
+ +
+

+Search the contents of the /dev/pts directory. +

+
+ +
+
Module: terminal

@@ -45807,6 +49885,32 @@ the targeted policy.

+
+Module: +terminal

+Layer: +kernel

+

+ +term_use_ptmx( + + + + + domain + + + )
+
+ +
+

+Read and write the pty multiplexor (/dev/ptmx). +

+
+ +
+
Module: terminal

@@ -46079,6 +50183,32 @@ Allow process to read list of devices.

+
+Module: +udev

+Layer: +system

+

+ +udev_read_state( + + + + + domain + + + )
+
+ +
+

+Allow process to read udev process state. +

+
+ +
+
Module: udev

@@ -46529,6 +50659,32 @@ users home directory.

+
+Module: +userdomain

+Layer: +system

+

+ +userdom_dontaudit_search_user_home_dirs( + + + + + domain + + + )
+
+ +
+

+Don't audit search on the user home subdirectory. +

+
+ +
+
Module: userdomain

@@ -46556,6 +50712,32 @@ descriptors from any user domains.

+
+Module: +userdomain

+Layer: +system

+

+ +userdom_dontaudit_use_sysadm_pty( + + + + + domain + + + )
+
+ +
+

+Dont audit attempts to read and write sysadm ptys. +

+
+ +
+
Module: userdomain

@@ -46662,6 +50844,114 @@ user ttys.

+
+Module: +userdomain

+Layer: +system

+

+ +userdom_getattr_sysadm_home_dir( + + + + + domain + + + )
+
+ +
+

+Get the attributes of the sysadm users +home directory. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_all_user_dirs( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete all directories +in all users home directories. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_all_user_files( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete all files +in all users home directories. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_all_user_symlinks( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete all symlinks +in all users home directories. +

+
+ +
+
Module: userdomain

@@ -46903,6 +51193,33 @@ Read files in the sysadm users home directory.

+
+Module: +userdomain

+Layer: +system

+

+ +userdom_read_unpriv_user_home_files( + + + + + domain + + + )
+
+ +
+

+Read all unprivileged users home directory +files. +

+
+ +
+
Module: userdomain

@@ -47007,6 +51324,32 @@ Search the sysadm users home directory.

+
+Module: +userdomain

+Layer: +system

+

+ +userdom_search_unpriv_user_home_dirs( + + + + + domain + + + )
+
+ +
+

+Search all unprivileged users home directories. +

+
+ +
+
Module: userdomain

@@ -47033,6 +51376,32 @@ Execute a shell in the sysadm domain.

+
+Module: +userdomain

+Layer: +system

+

+ +userdom_sigchld_sysadm( + + + + + domain + + + )
+
+ +
+

+Send a SIGCHLD signal to sysadm users. +

+
+ +
+
Module: userdomain

@@ -47375,6 +51744,33 @@ Write all unprivileged users files in /tmp

+
+Module: +usermanage

+Layer: +admin

+

+ +usermanage_domtrans_admin_passwd( + + + + + domain + + + )
+
+ +
+

+Execute password admin functions in +the admin passwd domain. +

+
+ +
+
Module: usermanage

@@ -47746,6 +52142,75 @@ allow the specified role the vpnc domain.

+
+Module: +webalizer

+Layer: +apps

+

+ +webalizer_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute webalizer in the webalizer domain. +

+
+ +
+ +
+Module: +webalizer

+Layer: +apps

+

+ +webalizer_run( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+ +
+

+Execute webalizer in the webalizer domain, and +allow the specified role the webalizer domain. +

+
+ +
+
Module: zebra

diff --git a/www/api-docs/kernel.html b/www/api-docs/kernel.html index 6ede3e3f..05604c72 100644 --- a/www/api-docs/kernel.html +++ b/www/api-docs/kernel.html @@ -40,6 +40,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -123,6 +126,11 @@ Device nodes and interfaces for many basic system devices. Policy for kernel threads, proc filesystem,and unlabeled processes and objects.

+ + + mls +

Multilevel security policy

+ selinux diff --git a/www/api-docs/kernel_bootloader.html b/www/api-docs/kernel_bootloader.html index ec96c97f..34cd583b 100644 --- a/www/api-docs/kernel_bootloader.html +++ b/www/api-docs/kernel_bootloader.html @@ -40,6 +40,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -954,6 +957,48 @@ Search the /boot directory.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +bootloader_search_kernel_modules( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search the contents of the kernel module directories. +

+ +
Parameters
diff --git a/www/api-docs/kernel_corenetwork.html b/www/api-docs/kernel_corenetwork.html index a451f9d3..b535756c 100644 --- a/www/api-docs/kernel_corenetwork.html +++ b/www/api-docs/kernel_corenetwork.html @@ -40,6 +40,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -4190,6 +4193,90 @@ Bind TCP sockets to the openvpn port.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_tcp_bind_pegasus_http_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Bind TCP sockets to the pegasus_http port. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_tcp_bind_pegasus_https_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Bind TCP sockets to the pegasus_https port. +

+ +
Parameters
@@ -5828,6 +5915,48 @@ Connect TCP sockets to all ports.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_tcp_connect_all_reserved_ports( + + + + + domain + + + )
+
+
+ +
Summary
+

+Connect TCP sockets to reserved ports. +

+ +
Parameters
@@ -7676,6 +7805,90 @@ Make a TCP connection to the openvpn port.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_tcp_connect_pegasus_http_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make a TCP connection to the pegasus_http port. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_tcp_connect_pegasus_https_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make a TCP connection to the pegasus_https port. +

+ +
Parameters
@@ -11540,6 +11753,90 @@ Send and receive TCP traffic on the openvpn port.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_tcp_sendrecv_pegasus_http_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send and receive TCP traffic on the pegasus_http port. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_tcp_sendrecv_pegasus_https_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send and receive TCP traffic on the pegasus_https port. +

+ +
Parameters
@@ -15404,6 +15701,90 @@ Bind UDP sockets to the openvpn port.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_udp_bind_pegasus_http_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Bind UDP sockets to the pegasus_http port. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_udp_bind_pegasus_https_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Bind UDP sockets to the pegasus_https port. +

+ +
Parameters
@@ -19352,6 +19733,90 @@ Receive UDP traffic on the openvpn port.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_udp_receive_pegasus_http_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Receive UDP traffic on the pegasus_http port. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_udp_receive_pegasus_https_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Receive UDP traffic on the pegasus_https port. +

+ +
Parameters
@@ -23300,6 +23765,90 @@ Send UDP traffic on the openvpn port.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_udp_send_pegasus_http_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send UDP traffic on the pegasus_http port. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_udp_send_pegasus_https_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send UDP traffic on the pegasus_https port. +

+ +
Parameters
@@ -27248,6 +27797,90 @@ Send and receive UDP traffic on the openvpn port.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_udp_sendrecv_pegasus_http_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send and receive UDP traffic on the pegasus_http port. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +corenet_udp_sendrecv_pegasus_https_port( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send and receive UDP traffic on the pegasus_https port. +

+ +
Parameters
@@ -28676,6 +29309,48 @@ Unconfined access to network objects.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +corenet_use_ppp_device( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read and write the point-to-point device. +

+ +
Parameters
diff --git a/www/api-docs/kernel_devices.html b/www/api-docs/kernel_devices.html index b5263467..1e7104f6 100644 --- a/www/api-docs/kernel_devices.html +++ b/www/api-docs/kernel_devices.html @@ -40,6 +40,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -97,10 +100,10 @@ are used to label device nodes should use the dev_node macro.

Additionally, this module controls access to three things:

    -

  • the device directories containing device nodes

  • -

  • device nodes as a group

  • -

  • individual access to specific device nodes covered by - this module.

  • +

  • the device directories containing device nodes

  • +

  • device nodes as a group

  • +

  • individual access to specific device nodes covered by +this module.

@@ -3550,6 +3553,48 @@ is required to load CPU microcode.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +dev_rw_crypto( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read and write the the hardware SSL accelerator. +

+ +
Parameters
@@ -3676,6 +3721,48 @@ Read and write the lvm control device.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +dev_rw_mouse( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read and write to mouse devices. +

+ +
Parameters
diff --git a/www/api-docs/kernel_filesystem.html b/www/api-docs/kernel_filesystem.html index 877f98e1..05db9d7c 100644 --- a/www/api-docs/kernel_filesystem.html +++ b/www/api-docs/kernel_filesystem.html @@ -40,6 +40,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -348,6 +351,49 @@ No + +
+ + +
+ +fs_dontaudit_getattr_all_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of all files with a filesystem type. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -391,6 +437,135 @@ No
+ +
+ + +
+ +fs_dontaudit_getattr_all_pipes( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of all named pipes with a filesystem type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +fs_dontaudit_getattr_all_sockets( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of all named sockets with a filesystem type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +fs_dontaudit_getattr_all_symlinks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of all symbolic links with a filesystem type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -1127,6 +1302,50 @@ No
+ +
+ + +
+ +fs_get_xattr_fs_quotas( + + + + + domain + + + )
+
+
+ +
Summary
+

+Get the quotas of a persistent +filesystem which has extended +attributes, such as ext3, JFS, or XFS. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the domain getting quotas. + + +No +
+
+
+
@@ -1138,7 +1357,7 @@ No - ? + domain )
@@ -1147,7 +1366,8 @@ No
Summary

-Summary is missing! +Get the attributes of all files with +a filesystem type.

@@ -1156,10 +1376,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain allowed access. No @@ -1213,6 +1433,135 @@ No
+ +
+ + +
+ +fs_getattr_all_pipes( + + + + + domain + + + )
+
+
+ +
Summary
+

+Get the attributes of all named pipes with +a filesystem type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +fs_getattr_all_sockets( + + + + + domain + + + )
+
+
+ +
Summary
+

+Get the attributes of all named sockets with +a filesystem type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +fs_getattr_all_symlinks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Get the attributes of all symbolic links with +a filesystem type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -4349,6 +4698,48 @@ No
+ +
+ + +
+ +fs_search_ramfs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search directories on a ramfs +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -5194,6 +5585,48 @@ No
+ +
+ + +
+ +fs_write_ramfs_socket( + + + + + domain + + + )
+
+
+ +
Summary
+

+Write to named socket on a ramfs filesystem. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ Return diff --git a/www/api-docs/kernel_kernel.html b/www/api-docs/kernel_kernel.html index 75667601..333c2846 100644 --- a/www/api-docs/kernel_kernel.html +++ b/www/api-docs/kernel_kernel.html @@ -40,6 +40,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -391,6 +394,48 @@ No + +
+ + +
+ +kernel_dontaudit_search_kernel_sysctl( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to search generic kernel sysctls. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+
@@ -434,13 +479,13 @@ No
- +
-kernel_dontaudit_search_network_sysctl_dir( +kernel_dontaudit_search_network_sysctl( @@ -454,7 +499,7 @@ No
Summary

-Do not audit attempts by caller to search sysctl network directories. +Do not audit attempts by caller to search network sysctl directories.

@@ -476,13 +521,13 @@ No
- +
-kernel_dontaudit_search_sysctl_dir( +kernel_dontaudit_search_sysctl( @@ -496,7 +541,8 @@ No
Summary

-Do not audit attempts by caller to search the sysctl directory. +Do not audit attempts by caller to search +the base directory of sysctls.

@@ -1109,6 +1155,48 @@ No
+ +
+ + +
+ +kernel_read_debugfs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read information from the debugging filesystem. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -2712,6 +2800,48 @@ No
+ +
+ + +
+ +kernel_search_network_sysctl( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search network sysctl directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -3780,6 +3910,48 @@ No
+ +
+ + +
+ +kernel_write_proc_file( + + + + + domain + + + )
+
+
+ +
Summary
+

+Write to generic proc entries. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ Return diff --git a/www/api-docs/kernel_mls.html b/www/api-docs/kernel_mls.html new file mode 100644 index 00000000..efc603d1 --- /dev/null +++ b/www/api-docs/kernel_mls.html @@ -0,0 +1,557 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: kernel

+

Module: mls

+ +

Description:

+ +

+

+This module contains interfaces for handling multilevel +security. The interfaces allow the specified subjects +and objects to be allowed certain privileges in the +MLS rules. +

+

+ + +

This module is required to be included in all policies.

+ + + +

Interfaces:

+ + +
+ + +
+ +mls_file_downgrade( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make specified domain MLS trusted +for lowering the level of files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +mls_file_read_up( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make specified domain MLS trusted +for reading from files at higher levels. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +mls_file_upgrade( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make specified domain MLS trusted +for raising the level of files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +mls_file_write_down( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make specified domain MLS trusted +for writing to files at lower levels. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +mls_process_read_up( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make specified domain MLS trusted +for reading from processes at higher levels. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +mls_process_set_level( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make specified domain MLS trusted +for setting the level of processes +it executes. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +mls_process_write_down( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make specified domain MLS trusted +for writing to processes at lower levels. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +mls_rangetrans_source( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to do a MLS +range transition that changes +the current level. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +mls_rangetrans_target( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make specified domain a target domain +for MLS range transitions that change +the current level. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +mls_trusted_object( + + + + + domain + + + )
+
+
+ +
Summary
+

+Make specified object MLS trusted. +

+ + +
Description
+

+

+Make specified object MLS trusted. This +allows all levels to read and write the +object. +

+

+This currently only applies to filesystem +objects, for example, files and directories. +

+

+ +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the object. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/kernel_selinux.html b/www/api-docs/kernel_selinux.html index a3afe1dd..bfaec7c4 100644 --- a/www/api-docs/kernel_selinux.html +++ b/www/api-docs/kernel_selinux.html @@ -40,6 +40,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -527,6 +530,48 @@ No + +
+ + +
+ +selinux_search_fs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search selinuxfs. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/kernel_storage.html b/www/api-docs/kernel_storage.html index 6b0ac106..06855d54 100644 --- a/www/api-docs/kernel_storage.html +++ b/www/api-docs/kernel_storage.html @@ -40,6 +40,9 @@    -  kernel
+    -  + mls
+    -  selinux
diff --git a/www/api-docs/kernel_terminal.html b/www/api-docs/kernel_terminal.html index 5c8ad61a..8cdb17d7 100644 --- a/www/api-docs/kernel_terminal.html +++ b/www/api-docs/kernel_terminal.html @@ -40,6 +40,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -781,6 +784,48 @@ tty device nodes.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+ + + +
+ + +
+ +term_ioctl_generic_pty( + + + + + domain + + + )
+
+
+ +
Summary
+

+ioctl of generic pty types. +

+ +
Parameters
@@ -1123,6 +1168,48 @@ the unallocated tty type.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +term_search_ptys( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search the contents of the /dev/pts directory. +

+ +
Parameters
@@ -1611,6 +1698,48 @@ No + +
+ + +
+ +term_use_ptmx( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read and write the pty multiplexor (/dev/ptmx). +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process to allow access. + + +No +
+
+
+
diff --git a/www/api-docs/services.html b/www/api-docs/services.html index 394ae952..dc4fdea7 100644 --- a/www/api-docs/services.html +++ b/www/api-docs/services.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -191,11 +221,31 @@ + + + apache +

Apache web server

+ + + + apm +

Advanced power management daemon

+ + + + arpwatch +

Ethernet activity monitor.

+ bind

Berkeley internet name domain DNS server.

+ + + bluetooth +

Bluetooth tools and system services.

+ comsat @@ -231,6 +281,16 @@ dictd

Dictionary daemon

+ + + finger +

Finger user information service.

+ + + + ftp +

File transfer protocol service

+ gpm @@ -271,6 +331,11 @@ ldap

OpenLDAP directory server

+ + + mailman +

Mailman is for managing electronic mail discussion and e-newsletter lists

+ mta @@ -306,11 +371,21 @@ postgresql

PostgreSQL relational database

+ + + ppp +

Point to Point Protocol daemon creates links in ppp networks

+ privoxy

Privacy enhancing web proxy.

+ + + radvd +

IPv6 router advertisement daemon

+ remotelogin @@ -334,7 +409,16 @@ samba -

SMB and CIFS client/server programs for UNIX

+

+SMB and CIFS client/server programs for UNIX and +name Service Switch daemon for resolving names +from Windows NT servers. +

+ + + + sasl +

SASL authentication server

diff --git a/www/api-docs/services_apache.html b/www/api-docs/services_apache.html new file mode 100644 index 00000000..5e06d09f --- /dev/null +++ b/www/api-docs/services_apache.html @@ -0,0 +1,1237 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: apache

+ +Interfaces +Templates + +

Description:

+ +

Apache web server

+ + + + +

Interfaces:

+ + +
+ + +
+ +apache_append_squirrelmail_data( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to append +apache squirrelmail data. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Transition to apache. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_domtrans_all_scripts( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute all user scripts in the user +script domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_domtrans_helper( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute the Apache helper program with +a domain transition. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_domtrans_sys_script( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute all web scripts in the system +script domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_dontaudit_append_log( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to append to the +Apache logs. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +apache_dontaudit_rw_stream_socket( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to read and write Apache +unix domain stream sockets. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_dontaudit_rw_sys_script_stream_socket( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to read and write Apache +system script unix domain stream sockets. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_dontaudit_rw_tcp_socket( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to read and write Apache +TCP sockets. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_list_modules( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to list +the contents of the apache modules +directory. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_manage_sys_content( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to manage +apache system content files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_read_config( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to read +apache configuration files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_read_log( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to read +apache log files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_read_squirrelmail_data( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to read +apache squirrelmail data. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_run_all_scripts( + + + + + domain + + + + , + + + + role + + + )
+
+
+ +
Summary
+

+Execute all user scripts in the user +script domain. Add user script domains +to the specified role. +

+ + +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+role + + +The role to be allowed the script domains. + + +No +
+
+
+ + +
+ + +
+ +apache_run_helper( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+
+ +
Summary
+

+Execute the Apache helper program with +a domain transition, and allow the +specified role the dmidecode domain. +

+ + +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+role + + +The role to be allowed the dmidecode domain. + + +No +
+terminal + + +The type of the terminal allow the dmidecode domain to use. + + +No +
+
+
+ + +
+ + +
+ +apache_sigchld( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send a SIGCHLD signal to apache. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_signull( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send a null signal to apache. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apache_use_fd( + + + + + domain + + + )
+
+
+ +
Summary
+

+Inherit and use file descriptors from Apache. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + +

Templates:

+ + +
+ + +
+ +apache_content_template( + + + + + prefix + + + )
+
+
+ +
Summary
+

+Create a set of derived types for apache +web content. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+prefix + + +The prefix to be used for deriving type names. + + +No +
+
+
+ + +
+ + +
+ +apache_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+
+ +
Summary
+

+The per user domain template for the apache module. +

+ + +
Description
+

+

+This template creates types used for web pages +and web cgi to be used from the user home directory. +

+

+This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +

+

+ +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+user_domain + + +The type of the user domain. + + +No +
+user_role + + +The role associated with the user domain. + + +No +
+
+
+ + +Return + + + +
+ + diff --git a/www/api-docs/services_apm.html b/www/api-docs/services_apm.html new file mode 100644 index 00000000..2bd681f7 --- /dev/null +++ b/www/api-docs/services_apm.html @@ -0,0 +1,433 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: apm

+ +

Description:

+ +

Advanced power management daemon

+ + + + +

Interfaces:

+ + +
+ + +
+ +apm_append_log( + + + + + domain + + + )
+
+
+ +
Summary
+

+Append to apm's log file. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apm_domtrans_client( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute APM in the apm domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apm_rw_stream_socket( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read and write to an apm unix stream socket. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +apm_use_fd( + + + + + domain + + + )
+
+
+ +
Summary
+

+Use file descriptors for apmd. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +apm_write_pipe( + + + + + domain + + + )
+
+
+ +
Summary
+

+Write to apmd unnamed pipes. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_arpwatch.html b/www/api-docs/services_arpwatch.html new file mode 100644 index 00000000..6958f7ca --- /dev/null +++ b/www/api-docs/services_arpwatch.html @@ -0,0 +1,392 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: arpwatch

+ +

Description:

+ +

Ethernet activity monitor.

+ + + + +

Interfaces:

+ + +
+ + +
+ +arpwatch_dontaudit_rw_packet_socket( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to read and write +arpwatch packet sockets. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +arpwatch_manage_data_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create arpwatch data files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +arpwatch_rw_tmp_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read and write arpwatch temporary files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +arpwatch_search_data( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search arpwatch's data file directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_bind.html b/www/api-docs/services_bind.html index df056703..1459d3c8 100644 --- a/www/api-docs/services_bind.html +++ b/www/api-docs/services_bind.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -182,6 +212,48 @@

Interfaces:

+ +
+ + +
+ +bind_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute bind in the named domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -214,7 +286,7 @@ Execute ndc in the ndc domain. domain -The type of the process performing this action. +Domain allowed access. No @@ -400,7 +472,7 @@ allow the specified role the ndc domain. domain -The type of the process performing this action. +Domain allowed access. No diff --git a/www/api-docs/services_bluetooth.html b/www/api-docs/services_bluetooth.html new file mode 100644 index 00000000..6b003f04 --- /dev/null +++ b/www/api-docs/services_bluetooth.html @@ -0,0 +1,219 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: bluetooth

+ +

Description:

+ +

Bluetooth tools and system services.

+ + + + + +

No interfaces or templates.

+ + +
+ + diff --git a/www/api-docs/services_comsat.html b/www/api-docs/services_comsat.html index 1c5c9532..40c2848f 100644 --- a/www/api-docs/services_comsat.html +++ b/www/api-docs/services_comsat.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_cpucontrol.html b/www/api-docs/services_cpucontrol.html index 6a8360d9..7dbd1ab1 100644 --- a/www/api-docs/services_cpucontrol.html +++ b/www/api-docs/services_cpucontrol.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_cron.html b/www/api-docs/services_cron.html index 70de6d04..a8447e45 100644 --- a/www/api-docs/services_cron.html +++ b/www/api-docs/services_cron.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_cvs.html b/www/api-docs/services_cvs.html index aadd9445..a5a28d96 100644 --- a/www/api-docs/services_cvs.html +++ b/www/api-docs/services_cvs.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_dbus.html b/www/api-docs/services_dbus.html index ff311734..55874d95 100644 --- a/www/api-docs/services_dbus.html +++ b/www/api-docs/services_dbus.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_dhcp.html b/www/api-docs/services_dhcp.html index 0e2d8842..2f9a4fce 100644 --- a/www/api-docs/services_dhcp.html +++ b/www/api-docs/services_dhcp.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_dictd.html b/www/api-docs/services_dictd.html index f384c155..1ca1e06d 100644 --- a/www/api-docs/services_dictd.html +++ b/www/api-docs/services_dictd.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_finger.html b/www/api-docs/services_finger.html new file mode 100644 index 00000000..2fbae3d7 --- /dev/null +++ b/www/api-docs/services_finger.html @@ -0,0 +1,307 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: finger

+ +

Description:

+ +

Finger user information service.

+ + + + +

Interfaces:

+ + +
+ + +
+ +finger_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute fingerd in the fingerd domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +finger_tcp_connect( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to connect to fingerd with a tcp socket. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_ftp.html b/www/api-docs/services_ftp.html new file mode 100644 index 00000000..d6f83962 --- /dev/null +++ b/www/api-docs/services_ftp.html @@ -0,0 +1,391 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: ftp

+ +

Description:

+ +

File transfer protocol service

+ + + + +

Interfaces:

+ + +
+ + +
+ +ftp_check_exec( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute FTP daemon entry point programs. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +ftp_read_config( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read ftpd etc files +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +ftp_read_log( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read FTP transfer logs +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +ftp_tcp_connect( + + + + + domain + + + )
+
+
+ +
Summary
+

+Use ftp by connecting over TCP. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_gpm.html b/www/api-docs/services_gpm.html index bd02bc73..31570fb8 100644 --- a/www/api-docs/services_gpm.html +++ b/www/api-docs/services_gpm.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -202,7 +232,7 @@
Summary

-Do not audit attempts to get the +Do not audit attempts to get the attributes of the GPM control channel named socket.

diff --git a/www/api-docs/services_hal.html b/www/api-docs/services_hal.html index d37fbc53..06979a04 100644 --- a/www/api-docs/services_hal.html +++ b/www/api-docs/services_hal.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_howl.html b/www/api-docs/services_howl.html index 62be7e38..9e679abd 100644 --- a/www/api-docs/services_howl.html +++ b/www/api-docs/services_howl.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_inetd.html b/www/api-docs/services_inetd.html index 38f97f7d..a0392db8 100644 --- a/www/api-docs/services_inetd.html +++ b/www/api-docs/services_inetd.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_inn.html b/www/api-docs/services_inn.html index 0678109f..acfa596c 100644 --- a/www/api-docs/services_inn.html +++ b/www/api-docs/services_inn.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_kerberos.html b/www/api-docs/services_kerberos.html index 2f4b0e2d..bf1a47ba 100644 --- a/www/api-docs/services_kerberos.html +++ b/www/api-docs/services_kerberos.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -182,17 +212,17 @@ This policy supports:

Servers:

    -

  • kadmind

  • -

  • krb5kdc

  • +

  • kadmind

  • +

  • krb5kdc

Clients:

    -

  • kinit

  • -

  • kdestroy

  • -

  • klist

  • -

  • ksu (incomplete)

  • +

  • kinit

  • +

  • kdestroy

  • +

  • klist

  • +

  • ksu (incomplete)

diff --git a/www/api-docs/services_ktalk.html b/www/api-docs/services_ktalk.html index d99f2a62..f88e605e 100644 --- a/www/api-docs/services_ktalk.html +++ b/www/api-docs/services_ktalk.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_ldap.html b/www/api-docs/services_ldap.html index a22ab976..32090364 100644 --- a/www/api-docs/services_ldap.html +++ b/www/api-docs/services_ldap.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_mailman.html b/www/api-docs/services_mailman.html new file mode 100644 index 00000000..f9b6256c --- /dev/null +++ b/www/api-docs/services_mailman.html @@ -0,0 +1,662 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: mailman

+ +Interfaces +Templates + +

Description:

+ +

Mailman is for managing electronic mail discussion and e-newsletter lists

+ + + + +

Interfaces:

+ + +
+ + +
+ +mailman_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute mailman in the mailman domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +mailman_domtrans_cgi( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute mailman CGI scripts in the +mailman CGI domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +mailman_exec( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute mailman in the caller domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowd access. + + +No +
+
+
+ + +
+ + +
+ +mailman_list_data( + + + + + domain + + + )
+
+
+ +
Summary
+

+List the contents of mailman data directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +mailman_manage_log( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete +mailman logs. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +mailman_read_archive( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow domain to read mailman archive files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +mailman_read_data_symlinks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow read acces to mailman data symbolic links. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +mailman_search_data( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow domain to search data directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +mailman_signal_cgi( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send generic signals to the mailman cgi domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + +

Templates:

+ + +
+ + +
+ +mailman_domain_template( + + + + + userdomain_prefix + + + )
+
+
+ +
Summary
+

+The template to define a mailmain domain. +

+ + +
Description
+

+

+This template creates a domain to be used for +a new mailman daemon. +

+

+ +
Parameters
+ + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The type of daemon to be used eg, cgi would give mailman_cgi_ + + +No +
+
+
+ + +Return + + + +
+ + diff --git a/www/api-docs/services_mta.html b/www/api-docs/services_mta.html index e5c420ac..3417eef7 100644 --- a/www/api-docs/services_mta.html +++ b/www/api-docs/services_mta.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -270,6 +300,49 @@ No
+ +
+ + +
+ +mta_dontaudit_rw_delivery_tcp_socket( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to read and write TCP +sockets of mail delivery domains. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Mail server domain. + + +No +
+
+
+
@@ -855,6 +928,94 @@ No
+ +
+ + +
+ +mta_stub( + + + + + [ + + domain + + ] + + + )
+
+
+ +
Summary
+

+MTA stub interface. No access allowed. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +N/A + + +yes +
+
+
+ + +
+ + +
+ +mta_tcp_connect_all_mailservers( + + + + + domain + + + )
+
+
+ +
Summary
+

+Connect to all mail servers over TCP. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Mail server domain. + + +No +
+
+
+ Return diff --git a/www/api-docs/services_mysql.html b/www/api-docs/services_mysql.html index ce795e5c..bb9f9f98 100644 --- a/www/api-docs/services_mysql.html +++ b/www/api-docs/services_mysql.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -290,6 +320,49 @@ Read and write to the MySQL database directory.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +mysql_rw_db_socket( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read and write to the MySQL database +named socket. +

+ +
Parameters
diff --git a/www/api-docs/services_nis.html b/www/api-docs/services_nis.html index ab78661f..cf599a47 100644 --- a/www/api-docs/services_nis.html +++ b/www/api-docs/services_nis.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -206,6 +236,48 @@ Send UDP network traffic to NIS clients.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +nis_signal_ypbind( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send generic signals to ypbind. +

+ +
Parameters
@@ -290,6 +362,63 @@ Use the ypbind service to access NIS services.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +nis_use_ypbind_uncond( + + + + + domain + + + )
+
+
+ +
Summary
+

+Use the ypbind service to access NIS services +unconditionally. +

+ + +
Description
+

+

+Use the ypbind service to access NIS services +unconditionally. +

+

+This interface was added because of apache and +spamassassin, to fix a nested conditionals problem. +When that support is added, this should be removed, +and the regular interface should be used. +

+

+
Parameters
diff --git a/www/api-docs/services_nscd.html b/www/api-docs/services_nscd.html index 5d3b7e67..be6ae3f1 100644 --- a/www/api-docs/services_nscd.html +++ b/www/api-docs/services_nscd.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_ntp.html b/www/api-docs/services_ntp.html index 5b8d96c4..e335128e 100644 --- a/www/api-docs/services_ntp.html +++ b/www/api-docs/services_ntp.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_portmap.html b/www/api-docs/services_portmap.html index 5bc40fcb..545536ce 100644 --- a/www/api-docs/services_portmap.html +++ b/www/api-docs/services_portmap.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_postgresql.html b/www/api-docs/services_postgresql.html index 622102f9..adfeb36f 100644 --- a/www/api-docs/services_postgresql.html +++ b/www/api-docs/services_postgresql.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_ppp.html b/www/api-docs/services_ppp.html new file mode 100644 index 00000000..0ff83348 --- /dev/null +++ b/www/api-docs/services_ppp.html @@ -0,0 +1,475 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: ppp

+ +

Description:

+ +

Point to Point Protocol daemon creates links in ppp networks

+ + + + +

Interfaces:

+ + +
+ + +
+ +ppp_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute domain in the ppp domain. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +ppp_run( + + + + + domain + + + )
+
+
+ +
Summary
+

+Unconditionally execute ppp daemon on behalf of a user or staff type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +ppp_run_cond( + + + + + domain + + + )
+
+
+ +
Summary
+

+Conditionally execute ppp daemon on behalf of a user or staff type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +ppp_sigchld( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow domain to send sigchld to parent of PPP domain type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +ppp_signal( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow domain to send a signal to PPP domain type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +ppp_use_fd( + + + + + domain + + + )
+
+
+ +
Summary
+

+Use PPP file discriptors. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_privoxy.html b/www/api-docs/services_privoxy.html index 5126089e..39d6e344 100644 --- a/www/api-docs/services_privoxy.html +++ b/www/api-docs/services_privoxy.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_radvd.html b/www/api-docs/services_radvd.html new file mode 100644 index 00000000..ccdb1039 --- /dev/null +++ b/www/api-docs/services_radvd.html @@ -0,0 +1,219 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: radvd

+ +

Description:

+ +

IPv6 router advertisement daemon

+ + + + + +

No interfaces or templates.

+ + +
+ + diff --git a/www/api-docs/services_remotelogin.html b/www/api-docs/services_remotelogin.html index 0ea1ca8f..6281f281 100644 --- a/www/api-docs/services_remotelogin.html +++ b/www/api-docs/services_remotelogin.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_rlogin.html b/www/api-docs/services_rlogin.html index 4eaaf202..c65af2de 100644 --- a/www/api-docs/services_rlogin.html +++ b/www/api-docs/services_rlogin.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_rshd.html b/www/api-docs/services_rshd.html index fe29334b..8bb06e7a 100644 --- a/www/api-docs/services_rshd.html +++ b/www/api-docs/services_rshd.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_rsync.html b/www/api-docs/services_rsync.html index 564fe652..1f688558 100644 --- a/www/api-docs/services_rsync.html +++ b/www/api-docs/services_rsync.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_samba.html b/www/api-docs/services_samba.html index 26650337..f2e7a4f5 100644 --- a/www/api-docs/services_samba.html +++ b/www/api-docs/services_samba.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -178,7 +208,11 @@

Description:

-

SMB and CIFS client/server programs for UNIX

+

+SMB and CIFS client/server programs for UNIX and +name Service Switch daemon for resolving names +from Windows NT servers. +

@@ -251,6 +285,48 @@ Execute smbmount in the smbmount domain.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +samba_domtrans_winbind_helper( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute winbind_helper in the winbind_helper domain. +

+ +
Parameters
@@ -420,6 +496,90 @@ Allow the specified domain to read samba's secrets.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +samba_read_winbind_pid( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to read the winbind pid files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +samba_read_winbind_pid( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to read the winbind pid files. +

+ +
Parameters
@@ -517,6 +677,85 @@ No + +
+ + +
+ +samba_run_winbind_helper( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+
+ +
Summary
+

+Execute winbind_helper in the winbind_helper domain, and +allow the specified role the winbind_helper domain. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+role + + +The role to be allowed the winbind_helper domain. + + +No +
+terminal + + +The type of the terminal allow the winbind_helper domain to use. + + +No +
+
+
+
@@ -665,22 +904,6 @@ No userdomain_prefix - - , - - - - user_domain - - - - , - - - - user_role - - )
@@ -720,26 +943,6 @@ is the prefix for user_t). No - -user_domain - - -The type of the user domain. - - -No - - - -user_role - - -The role associated with the user domain. - - -No - -
diff --git a/www/api-docs/services_sasl.html b/www/api-docs/services_sasl.html new file mode 100644 index 00000000..9e7df340 --- /dev/null +++ b/www/api-docs/services_sasl.html @@ -0,0 +1,219 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: sasl

+ +

Description:

+ +

SASL authentication server

+ + + + + +

No interfaces or templates.

+ + +
+ + diff --git a/www/api-docs/services_sendmail.html b/www/api-docs/services_sendmail.html index a0418592..ff9ef8c4 100644 --- a/www/api-docs/services_sendmail.html +++ b/www/api-docs/services_sendmail.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -224,6 +254,52 @@ No
+ +
+ + +
+ +sendmail_stub( + + + + + [ + + domain + + ] + + + )
+
+
+ +
Summary
+

+Sendmail stub interface. No access allowed. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +N/A + + +yes +
+
+
+ Return diff --git a/www/api-docs/services_snmp.html b/www/api-docs/services_snmp.html index 90713831..025ce656 100644 --- a/www/api-docs/services_snmp.html +++ b/www/api-docs/services_snmp.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_squid.html b/www/api-docs/services_squid.html index 5d88a00d..1d48ff7e 100644 --- a/www/api-docs/services_squid.html +++ b/www/api-docs/services_squid.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_ssh.html b/www/api-docs/services_ssh.html index 53f9947e..d665fc08 100644 --- a/www/api-docs/services_ssh.html +++ b/www/api-docs/services_ssh.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_stunnel.html b/www/api-docs/services_stunnel.html index ba1eefe7..10e796cd 100644 --- a/www/api-docs/services_stunnel.html +++ b/www/api-docs/services_stunnel.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_tcpd.html b/www/api-docs/services_tcpd.html index 5184f99b..f3b1852e 100644 --- a/www/api-docs/services_tcpd.html +++ b/www/api-docs/services_tcpd.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -179,9 +209,55 @@ + +

Interfaces:

+ + +
+ + +
+ +tcpd_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute tcpd in the tcpd domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +Return -

No interfaces or templates.

diff --git a/www/api-docs/services_telnet.html b/www/api-docs/services_telnet.html index 503c5497..060ba450 100644 --- a/www/api-docs/services_telnet.html +++ b/www/api-docs/services_telnet.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_tftp.html b/www/api-docs/services_tftp.html index a3da7d47..3afbbcaf 100644 --- a/www/api-docs/services_tftp.html +++ b/www/api-docs/services_tftp.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_uucp.html b/www/api-docs/services_uucp.html index dc9e959b..cde0bf48 100644 --- a/www/api-docs/services_uucp.html +++ b/www/api-docs/services_uucp.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/services_zebra.html b/www/api-docs/services_zebra.html index 753dd77b..66bf7b72 100644 --- a/www/api-docs/services_zebra.html +++ b/www/api-docs/services_zebra.html @@ -31,9 +31,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -55,6 +67,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -79,6 +97,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -100,9 +121,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -118,6 +145,9 @@    -  samba
+    -  + sasl
+    -  sendmail
diff --git a/www/api-docs/system_authlogin.html b/www/api-docs/system_authlogin.html index becc4027..5f55eaab 100644 --- a/www/api-docs/system_authlogin.html +++ b/www/api-docs/system_authlogin.html @@ -170,6 +170,90 @@ Append to the login failure log.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +auth_append_lastlog( + + + + + domain + + + )
+
+
+ +
Summary
+

+Append only to the last logins log. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +auth_append_login_records( + + + + + domain + + + )
+
+
+ +
Summary
+

+Append to login records (wtmp). +

+ +
Parameters
@@ -1030,6 +1114,48 @@ No + +
+ + +
+ +auth_read_lastlog( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read the last logins log. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -1515,7 +1641,7 @@ No - ? + domain )
@@ -1524,7 +1650,7 @@ No
Summary

-Summary is missing! +Read and write to the last logins log.

@@ -1533,10 +1659,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain allowed access. No @@ -1666,6 +1792,90 @@ be passed. No access is granted yet.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +auth_use_nsswitch( + + + + + domain + + + )
+
+
+ +
Summary
+

+Use nsswitch to look up uid-username mappings. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +auth_write_login_records( + + + + + domain + + + )
+
+
+ +
Summary
+

+Write to login records (wtmp). +

+ +
Parameters
diff --git a/www/api-docs/system_clock.html b/www/api-docs/system_clock.html index 27e46048..71d74005 100644 --- a/www/api-docs/system_clock.html +++ b/www/api-docs/system_clock.html @@ -205,8 +205,8 @@ No
Summary

- Execute hwclock in the caller domain. -

+Execute hwclock in the caller domain. +

Parameters
@@ -217,8 +217,8 @@ No domain @@ -326,8 +326,8 @@ No
Summary

- Allow executing domain to modify clock drift -

+Allow executing domain to modify clock drift +

Parameters
@@ -338,8 +338,8 @@ No domain diff --git a/www/api-docs/system_domain.html b/www/api-docs/system_domain.html index 99e978f1..c4ab57dd 100644 --- a/www/api-docs/system_domain.html +++ b/www/api-docs/system_domain.html @@ -324,6 +324,49 @@ No + +
+ + +
+ +domain_dontaudit_getattr_all_key_sockets( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get attribues of +all domains IPSEC key management sockets. +

+ + +
Parameters
+
Parameter:Description:Optional:
- The type of the process performing this action. - +The type of the process performing this action. + No
- The type of the process performing this action. - +The type of the process performing this action. + No
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
@@ -1371,6 +1414,48 @@ No
+ +
+ + +
+ +domain_ptrace_all_domains( + + + + + domain + + + )
+
+
+ +
Summary
+

+Ptrace all domains. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/system_files.html b/www/api-docs/system_files.html index 6778e7e1..75d1af16 100644 --- a/www/api-docs/system_files.html +++ b/www/api-docs/system_files.html @@ -1301,6 +1301,308 @@ files with the default file type.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +files_dontaudit_getattr_home_dir( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the +attributes of the home directories root +(/home). +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +files_dontaudit_getattr_non_security_blk_dev( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of non security block devices. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +files_dontaudit_getattr_non_security_chr_dev( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of non security character devices. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +files_dontaudit_getattr_non_security_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of non security files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +files_dontaudit_getattr_non_security_pipes( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of non security named pipes. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +files_dontaudit_getattr_non_security_sockets( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of non security named sockets. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +files_dontaudit_getattr_non_security_symlinks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of non security symbolic links. +

+ +
Parameters
@@ -1472,6 +1774,49 @@ directories with the default file type.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +files_dontaudit_list_non_security( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to list all +non security directories. +

+ +
Parameters
@@ -1885,6 +2230,49 @@ No + domain + + + )
+ +
+ +
Summary
+

+Do not audit attempts to search +the /var/run directory. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +files_dontaudit_search_src( + + + + ? @@ -1927,7 +2315,7 @@ No - ? + domain )
@@ -1936,7 +2324,8 @@ No
Summary

-Summary is missing! +Do not audit attempts to search +the contents of /var.

@@ -1945,10 +2334,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain to not audit. No @@ -2053,6 +2442,48 @@ No + domain + + + )
+
+
+ +
Summary
+

+Execute generic programs in /usr in the caller domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +files_exec_usr_src_files( + + + + domain @@ -2356,8 +2787,7 @@ No
Summary

-Do not audit attempts to get the -attributes of the home directories root +Get the attributes of the home directories root (/home).

@@ -2910,6 +3340,48 @@ directories in /usr.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +files_list_var( + + + + + domain + + + )
+
+
+ +
Summary
+

+List the contents of /var. +

+ +
Parameters
@@ -4201,7 +4673,7 @@ No
Summary

-Make the specified type a +Make the specified type a polyinstantiated directory.

@@ -5070,7 +5542,49 @@ No
Summary

-Read generic files in /var/lib +Read generic files in /var/lib. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +files_read_var_lib_symlinks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read generic symbolic links in /var/lib

@@ -5599,7 +6113,7 @@ No
Summary

-Read and write block device nodes on new filesystems +Read and write block device nodes on new filesystems that have not yet been labeled.

@@ -5665,6 +6179,91 @@ No
+ +
+ + +
+ +files_rw_locks_dir( + + + + + domain + + + )
+
+
+ +
Summary
+

+Add and remove entries in the /var/lock +directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +files_search_all( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search all directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -6096,7 +6695,7 @@ No - ? + domain )
@@ -6105,7 +6704,7 @@ No
Summary

-Summary is missing! +Search the contents of /var.

@@ -6114,10 +6713,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain allowed access. No @@ -6169,6 +6768,51 @@ No
+ +
+ + +
+ +files_security_file( + + + + + file_type + + + )
+
+
+ +
Summary
+

+Make the specified type a file that +should not be dontaudited from +browsing from user domains. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+file_type + + +Type of the file to be used as a +member directory. + + +No +
+
+
+
@@ -6351,7 +6995,7 @@ No - ? + type )
@@ -6360,7 +7004,8 @@ No
Summary

-Summary is missing! +Make the specified type usable for files +in a filesystem.

@@ -6369,10 +7014,10 @@ Summary is missing! Parameter:Description:Optional: -? +type -Parameter descriptions are missing! +Type to be used for files. No diff --git a/www/api-docs/system_hostname.html b/www/api-docs/system_hostname.html index e08d8aef..254a9547 100644 --- a/www/api-docs/system_hostname.html +++ b/www/api-docs/system_hostname.html @@ -205,8 +205,8 @@ No
Summary

- Execute hostname in the caller domain. -

+Execute hostname in the caller domain. +

Parameters
@@ -217,8 +217,8 @@ No domain - The type of the process performing this action. - +The type of the process performing this action. + No diff --git a/www/api-docs/system_init.html b/www/api-docs/system_init.html index 4c0c6259..e2753aa2 100644 --- a/www/api-docs/system_init.html +++ b/www/api-docs/system_init.html @@ -432,6 +432,49 @@ No
+ +
+ + +
+ +init_dontaudit_unix_connect_script( + + + + + domain + + + )
+
+
+ +
Summary
+

+Dont audit the specified domain connecting to +init scripts with a unix domain stream socket. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -1505,6 +1548,92 @@ No
+ +
+ + +
+ +init_unix_connect_script( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to connect to +init scripts with a unix domain stream socket. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +init_unix_connect_script( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow the specified domain to connect to +init scripts with a unix socket. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/system_logging.html b/www/api-docs/system_logging.html index 0398aca9..77f1e5c6 100644 --- a/www/api-docs/system_logging.html +++ b/www/api-docs/system_logging.html @@ -353,6 +353,48 @@ No
+ +
+ + +
+ +logging_list_logs( + + + + + domain + + + )
+
+
+ +
Summary
+

+List the contents of the generic log directory (/var/log). +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/system_miscfiles.html b/www/api-docs/system_miscfiles.html index 34c16028..17e6d2ec 100644 --- a/www/api-docs/system_miscfiles.html +++ b/www/api-docs/system_miscfiles.html @@ -217,7 +217,7 @@ Execute TeX data programs in the caller domain. domain -Type type of the process performing this action. +Domain allowed access. No @@ -259,7 +259,7 @@ Allow process to read legacy time localization info domain -Type type of the process performing this action. +Domain allowed access. No @@ -293,6 +293,91 @@ Create, read, write, and delete man pages

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +miscfiles_manage_public_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete public files +and directories used for file transfer services. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +miscfiles_read_certs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read system SSL certificates. +

+ +
Parameters
@@ -331,7 +416,7 @@ No
Summary

-Read fonts +Read fonts.

@@ -343,7 +428,49 @@ Read fonts domain + +
Parameter:Description:Optional:
-Type type of the process performing this action. +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +miscfiles_read_hwdata( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read hardware identification data. +

+ + +
Parameters
+ + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. No @@ -385,7 +512,7 @@ Allow process to read localization info domain -Type type of the process performing this action. +Domain allowed access. No @@ -419,6 +546,49 @@ Read man pages

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+ + + + +
+ + +
+ +miscfiles_read_public_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read public files used for file +transfer services. +

+ +
Parameters
@@ -469,7 +639,7 @@ Read TeX data domain + Loadable modules can be built with a compler + that has the require-in-conditionals, + delcare-then-require, and stack-overflow patches + applied. @@ -201,16 +204,6 @@ converted: - - - - - - - - - - @@ -351,11 +344,6 @@ converted: - - - - - @@ -421,11 +409,6 @@ converted: - - - - - @@ -469,7 +452,7 @@ converted: - + @@ -546,16 +529,6 @@ converted: - - - - - - - - - - @@ -579,18 +552,13 @@ converted: - + - - - - - @@ -711,11 +679,6 @@ converted: - - - - -
Parameter:Description:Optional:
-Type type of the process performing this action. +Domain allowed access. No diff --git a/www/api-docs/system_modutils.html b/www/api-docs/system_modutils.html index 549a2eb8..44d0e72a 100644 --- a/www/api-docs/system_modutils.html +++ b/www/api-docs/system_modutils.html @@ -462,6 +462,49 @@ loading modules.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+ + + + +
+ + +
+ +modutils_rename_module_conf( + + + + + domain + + + )
+
+
+ +
Summary
+

+Rename a file with the configuration options used when +loading modules. +

+ +
Parameters
diff --git a/www/api-docs/system_sysnetwork.html b/www/api-docs/system_sysnetwork.html index cb4ac861..36727abf 100644 --- a/www/api-docs/system_sysnetwork.html +++ b/www/api-docs/system_sysnetwork.html @@ -280,6 +280,48 @@ yes + +
+ + +
+ +sysnet_delete_dhcpc_pid( + + + + + domain + + + )
+
+
+ +
Summary
+

+Delete the dhcp client pid file. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
@@ -354,7 +396,7 @@ Execute dhcp client in dhcpc domain. domain
- The type of the process performing this action. +The type of the process performing this action. No diff --git a/www/api-docs/system_udev.html b/www/api-docs/system_udev.html index 4b549632..58b3003a 100644 --- a/www/api-docs/system_udev.html +++ b/www/api-docs/system_udev.html @@ -313,6 +313,48 @@ No + +
+ + +
+ +udev_read_state( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow process to read udev process state. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/system_userdomain.html b/www/api-docs/system_userdomain.html index 026247f3..3ec650f0 100644 --- a/www/api-docs/system_userdomain.html +++ b/www/api-docs/system_userdomain.html @@ -426,6 +426,48 @@ No
+ +
+ + +
+ +userdom_dontaudit_search_user_home_dirs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Don't audit search on the user home subdirectory. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -451,6 +493,48 @@ descriptors from any user domains.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+ + + +
+ + +
+ +userdom_dontaudit_use_sysadm_pty( + + + + + domain + + + )
+
+
+ +
Summary
+

+Dont audit attempts to read and write sysadm ptys. +

+ +
Parameters
@@ -621,6 +705,178 @@ user ttys.

+
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +userdom_getattr_sysadm_home_dir( + + + + + domain + + + )
+
+
+ +
Summary
+

+Get the attributes of the sysadm users +home directory. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_all_user_dirs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete all directories +in all users home directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_all_user_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete all files +in all users home directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_all_user_symlinks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete all symlinks +in all users home directories. +

+ +
Parameters
@@ -1024,6 +1280,49 @@ No + +
+ + +
+ +userdom_read_unpriv_user_home_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read all unprivileged users home directory +files. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -1192,6 +1491,48 @@ No
+ +
+ + +
+ +userdom_search_unpriv_user_home_dirs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search all unprivileged users home directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -1216,6 +1557,48 @@ Execute a shell in the sysadm domain.

+
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+ + + +
+ + +
+ +userdom_sigchld_sysadm( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send a SIGCHLD signal to sysadm users. +

+ +
Parameters
@@ -1825,15 +2208,15 @@ tmp, and tmpfs files.

The privileges given to administrative users are:

    -

  • Raw disk access

  • -

  • Set all sysctls

  • -

  • All kernel ring buffer controls

  • -

  • Set SELinux enforcement mode (enforcing/permissive)

  • -

  • Set SELinux booleans

  • -

  • Relabel all files but shadow

  • -

  • Create, read, write, and delete all files but shadow

  • -

  • Manage source and binary format SELinux policy

  • -

  • Run insmod

  • +

  • Raw disk access

  • +

  • Set all sysctls

  • +

  • All kernel ring buffer controls

  • +

  • Set SELinux enforcement mode (enforcing/permissive)

  • +

  • Set SELinux booleans

  • +

  • Relabel all files but shadow

  • +

  • Create, read, write, and delete all files but shadow

  • +

  • Manage source and binary format SELinux policy

  • +

  • Run insmod

@@ -2873,6 +3256,78 @@ No + +
+ + +
+ +userdom_search_user_home( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Search user home directories. +

+ + +
Description
+

+

+Search user home directories. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+
Parameter:Description:Optional:
+ + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +The type of the process performing this action. + + +No +
+
+
+
diff --git a/www/api-docs/templates.html b/www/api-docs/templates.html index 9b717e28..4a5a5144 100644 --- a/www/api-docs/templates.html +++ b/www/api-docs/templates.html @@ -16,15 +16,24 @@    -  acct
+    -  + anaconda
+    -  consoletype
   -  dmesg
+    -  + dmidecode
+    -  firstboot
+    -  + kudzu
+    -  logrotate
@@ -67,6 +76,9 @@    -  loadkeys
+    -  + webalizer
+
+  @@ -88,6 +100,9 @@    -  kernel
+    -  + mls
+    -  selinux
@@ -103,9 +118,21 @@ services
+    -  + apache
+ +    -  + apm
+ +    -  + arpwatch
+    -  bind
+    -  + bluetooth
+    -  comsat
@@ -127,6 +154,12 @@    -  dictd
+    -  + finger
+ +    -  + ftp
+    -  gpm
@@ -151,6 +184,9 @@    -  ldap
+    -  + mailman
+    -  mta
@@ -172,9 +208,15 @@    -  postgresql
+    -  + ppp
+    -  privoxy
+    -  + radvd
+    -  remotelogin
@@ -190,6 +232,9 @@    -  samba
+    -  + sasl
+    -  sendmail
@@ -348,6 +393,75 @@ The template for creating an administrative user.
+
+Module: +apache

+Layer: +services

+

+ +apache_content_template( + + + + + prefix + + + )
+
+ +
+

+Create a set of derived types for apache +web content. +

+
+ +
+ +
+Module: +apache

+Layer: +services

+

+ +apache_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+ +
+

+The per user domain template for the apache module. +

+
+ +
+
Module: authlogin

@@ -691,6 +805,32 @@ The per user domain template for the gpg module.

+
+Module: +mailman

+Layer: +services

+

+ +mailman_domain_template( + + + + + userdomain_prefix + + + )
+
+ +
+

+The template to define a mailmain domain. +

+
+ +
+
Module: mta

@@ -748,22 +888,6 @@ services

userdomain_prefix - - , - - - - user_domain - - - - , - - - - user_role - - )

@@ -1408,6 +1532,40 @@ Read user home files. +
+Module: +userdomain

+Layer: +system

+

+ +userdom_search_user_home( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Search user home directories. +

+
+ +
+
Module: userdomain

diff --git a/www/html/Changelog.txt b/www/html/Changelog.txt new file mode 100644 index 00000000..9c1d91f8 --- /dev/null +++ b/www/html/Changelog.txt @@ -0,0 +1,150 @@ +* Wed Oct 19 2005 Chris PeBenito - 20051019 +- Many fixes to make loadable modules build. +- Add targets for sechecker. +- Updated to sedoctool to read bool files and tunable + files separately. +- Changed the xml tag of to to be consistent + with gen_bool(). +- Modified the implementation of segenxml to use regular + expressions. +- Rename context_template() to gen_context() to clarify + that its not a Reference Policy template, but a support + macro. +- Add disable_*_trans bool support for targeted policy. +- Add MLS module to handle MLS constraint exceptions, + such as reading up and writing down. +- Fix errors uncovered by sediff. +- Added policies: + anaconda + apache + apm + arpwatch + bluetooth + dmidecode + finger + ftp + kudzu + mailman + ppp + radvd + radius + sasl + webalizer + +* Thu Sep 22 2005 Chris PeBenito - 20050922 +- Make logrotate, sendmail, sshd, and rpm policies + unconfined in the targeted policy so no special + modules.conf is required. +- Add experimental MCS support. +- Add appconfig for MLS. +- Add equivalents for old can_resolve(), can_ldap(), and + can_portmap() to sysnetwork. +- Fix base module compile issues. +- Added policies: + cpucontrol + cvs + ktalk + portmap + postgresql + rlogin + samba + snmp + stunnel + telnet + tftp + uucp + vpn + zebra + +* Wed Sep 07 2005 Chris PeBenito - 20050907 +- Fix errors uncovered by sediff. +- Doc tool will explicitly say a module does not have interfaces + or templates on the module page. +- Added policies: + comsat + dbus + dhcp + dictd + hal + inn + ntp + squid + +* Fri Aug 26 2005 Chris PeBenito - 20050826 +- Add Makefile support for building loadable modules. +- Add genclassperms.py tool to add require blocks + for loadable modules. +- Change sedoctool to make required modules part of base + by default, otherwise make as modules, in modules.conf. +- Fix segenxml to handle modules with no interfaces. +- Rename ipsec connect interface for consistency. +- Add missing parts of unix stream socket connect interface + of ipsec. +- Rename inetd connect interface for consistency. +- Rename interface for purging contents of tmp, for clarity, + since it allows deletion of classes other than file. +- Misc. cleanups. +- Added policies: + acct + bind + firstboot + gpm + howl + ldap + loadkeys + mysql + privoxy + quota + rshd + rsync + su + sudo + tcpd + tmpreaper + updfstab + +* Tue Aug 2 2005 Chris PeBenito - 20050802 +- Fix comparison bug in fc_sort. +- Fix handling of ordered and unordered HTML lists. +- Corenetwork now supports multiple network interfaces having the + same type. +- Doc tool now creates pages for global Booleans and global tunables. +- Doc tool now links directly to the interface/template in the + module page when it is selected in the interface/template index. +- Added support for layer summaries. +- Added policies: + ipsec + nscd + pcmcia + raid + +* Thu Jul 7 2005 Chris PeBenito - 20050707 +- Changed xml to have modules encapsulated by layer tags, rather + than putting layer="foo" in the module tags. Also in the future + we can put a summary and description for each layer. +- Added tool to infer interface, module, and layer tags. This will + now list all interfaces, even if they are missing xml docs. +- Shortened xml tag names. +- Added macros to declare interfaces and templates. +- Added interface call trace. +- Updated all xml documentation for shorter and inferred tags. +- Doc tool now displays templates in the web pages. +- Doc tool retains the user's settings in modules.conf and + tunables.conf if the files already exist. +- Modules.conf behavior has been changed to be a list of all + available modules, and the user can specify if the module is + built as a loadable module, included in the monolithic policy, + or excluded. +- Added policies: + fstools (fsck, mkfs, swapon, etc. tools) + logrotate + inetd + kerberos + nis (ypbind and ypserv) + ssh (server, client, and agent) + unconfined +- Added infrastructure for targeted policy support, only missing + transition boolean support. + +* Wed Jun 15 2005 Chris PeBenito - 20050615 + - Initial release diff --git a/www/html/status.html b/www/html/status.html index d23916ef..eb3f3897 100644 --- a/www/html/status.html +++ b/www/html/status.html @@ -1,5 +1,5 @@

Status

-Current Version: 20050922 +Current Version: 20051019

See download for download information. Details of this release are part of the changelog. @@ -7,7 +7,9 @@ the NSA example policy in sourceforge CVS. Currently both strict and targeted policies can be built. MLS policies can be built, but the policy has not been tested on running systems. MCS support has also - been added, but it is still experimental. + been added, but it is still experimental. Loadable modules can + now be built with a compiler that has the require-in-conditionals, + delcare-then-require, and stack-overflow patches applied.

 

Status and Tasks

@@ -34,9 +36,10 @@
Major improvements Infrastructure is in place to support both source policy and loadable policy modules. Makefile support completed. - Almost all policy modules can be compiled; however, - there are compiler issues which prevent all modules - from compiling.
Documentation Infrastructureamavis.te amavis.fc
apache *+apache.te apache.fc apache_macros.teTresys
arpwatch *+arpwatch.te arpwatch.fcTresys
asterisk asterisk.te asterisk.fcfetchmail.te fetchmail.fc
finger *+fingerd.te fingerd.fc fingerd_macros.te
fontconfig + fontconfig.te fontconfig.fcjava.te java.fc java_macros.te
kudzu *+kudzu.te kudzu.fcTresys
lcd lcd.te lcd.fc
networkmanager *+ NetworkManager.te NetworkManager.fcTresys
nsdpyzor.te pyzor.fc pyzor_macros.te
radius *+radius.te radius.fcTresys
radvd *+radvd.te radvd.fcTresys
razor razor.te razor.fc razor_macros.te
rpc *+ rpcd.te rpcd.fcTresys
rssh rssh.te rssh.fc rssh_macros.te
sasl *+saslauthd.te saslauthd.fcTresys
scannerdaemon scannerdaemon.te scannerdaemon.fcwatchdog.te watchdog.fc
webalizer *+webalizer.te webalizer.fcTresys
xdm *+ xdm.te xdm.fc xdm_macros.te