Tunable and optional policy goes below.
Tunable and optional policy goes below.
This commit is contained in:
parent
b11ba46f38
commit
f6bcb24b48
@ -152,6 +152,8 @@ template(`apache_content_template',`
|
|||||||
allow httpd_$1_script_t httpd_t:fd use;
|
allow httpd_$1_script_t httpd_t:fd use;
|
||||||
allow httpd_$1_script_t httpd_t:process sigchld;
|
allow httpd_$1_script_t httpd_t:process sigchld;
|
||||||
|
|
||||||
|
dontaudit httpd_$1_script_t httpd_t:tcp_socket { read write };
|
||||||
|
|
||||||
kernel_read_system_state(httpd_$1_script_t)
|
kernel_read_system_state(httpd_$1_script_t)
|
||||||
|
|
||||||
dev_read_urand(httpd_$1_script_t)
|
dev_read_urand(httpd_$1_script_t)
|
||||||
@ -180,8 +182,6 @@ template(`apache_content_template',`
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
nscd_socket_use(httpd_$1_script_t)
|
nscd_socket_use(httpd_$1_script_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
dontaudit httpd_$1_script_t httpd_t:tcp_socket { read write };
|
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -557,6 +557,12 @@ tunable_policy(`httpd_can_network_relay',`
|
|||||||
corenet_sendrecv_squid_client_packets(httpd_t)
|
corenet_sendrecv_squid_client_packets(httpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
tunable_policy(`httpd_execmem',`
|
||||||
|
allow httpd_t self:process { execmem execstack };
|
||||||
|
allow httpd_sys_script_t self:process { execmem execstack };
|
||||||
|
allow httpd_suexec_t self:process { execmem execstack };
|
||||||
|
')
|
||||||
|
|
||||||
tunable_policy(`httpd_enable_cgi && httpd_unified',`
|
tunable_policy(`httpd_enable_cgi && httpd_unified',`
|
||||||
allow httpd_sys_script_t httpd_sys_content_t:file entrypoint;
|
allow httpd_sys_script_t httpd_sys_content_t:file entrypoint;
|
||||||
filetrans_pattern(httpd_sys_script_t, httpd_sys_content_t, httpd_sys_rw_content_t, { file dir lnk_file })
|
filetrans_pattern(httpd_sys_script_t, httpd_sys_content_t, httpd_sys_rw_content_t, { file dir lnk_file })
|
||||||
@ -744,12 +750,6 @@ optional_policy(`
|
|||||||
rpc_search_nfs_state_data(httpd_t)
|
rpc_search_nfs_state_data(httpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
tunable_policy(`httpd_execmem',`
|
|
||||||
allow httpd_t self:process { execmem execstack };
|
|
||||||
allow httpd_sys_script_t self:process { execmem execstack };
|
|
||||||
allow httpd_suexec_t self:process { execmem execstack };
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
# Allow httpd to work with postgresql
|
# Allow httpd to work with postgresql
|
||||||
postgresql_stream_connect(httpd_t)
|
postgresql_stream_connect(httpd_t)
|
||||||
@ -887,6 +887,10 @@ files_tmp_filetrans(httpd_suexec_t, httpd_suexec_tmp_t, { file dir })
|
|||||||
|
|
||||||
can_exec(httpd_suexec_t, httpd_sys_script_exec_t)
|
can_exec(httpd_suexec_t, httpd_sys_script_exec_t)
|
||||||
|
|
||||||
|
read_files_pattern(httpd_suexec_t, httpd_user_content_t, httpd_user_content_t)
|
||||||
|
read_files_pattern(httpd_suexec_t, httpd_user_rw_content_t, httpd_user_rw_content_t)
|
||||||
|
read_files_pattern(httpd_suexec_t, httpd_user_ra_content_t, httpd_user_ra_content_t)
|
||||||
|
|
||||||
kernel_read_kernel_sysctls(httpd_suexec_t)
|
kernel_read_kernel_sysctls(httpd_suexec_t)
|
||||||
kernel_list_proc(httpd_suexec_t)
|
kernel_list_proc(httpd_suexec_t)
|
||||||
kernel_read_proc_symlinks(httpd_suexec_t)
|
kernel_read_proc_symlinks(httpd_suexec_t)
|
||||||
@ -932,11 +936,8 @@ tunable_policy(`httpd_can_network_connect_db',`
|
|||||||
corenet_sendrecv_mssql_client_packets(httpd_suexec_t)
|
corenet_sendrecv_mssql_client_packets(httpd_suexec_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
read_files_pattern(httpd_suexec_t, httpd_user_content_t, httpd_user_content_t)
|
|
||||||
read_files_pattern(httpd_suexec_t, httpd_user_rw_content_t, httpd_user_rw_content_t)
|
|
||||||
read_files_pattern(httpd_suexec_t, httpd_user_ra_content_t, httpd_user_ra_content_t)
|
|
||||||
|
|
||||||
domain_entry_file(httpd_sys_script_t, httpd_sys_content_t)
|
domain_entry_file(httpd_sys_script_t, httpd_sys_content_t)
|
||||||
|
|
||||||
tunable_policy(`httpd_enable_cgi && httpd_unified',`
|
tunable_policy(`httpd_enable_cgi && httpd_unified',`
|
||||||
allow httpd_sys_script_t httpdcontent:file entrypoint;
|
allow httpd_sys_script_t httpdcontent:file entrypoint;
|
||||||
domtrans_pattern(httpd_suexec_t, httpdcontent, httpd_sys_script_t)
|
domtrans_pattern(httpd_suexec_t, httpdcontent, httpd_sys_script_t)
|
||||||
@ -1032,15 +1033,15 @@ optional_policy(`
|
|||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
fs_cifs_entry_type(httpd_sys_script_t)
|
|
||||||
fs_read_iso9660_files(httpd_sys_script_t)
|
|
||||||
fs_nfs_entry_type(httpd_sys_script_t)
|
|
||||||
|
|
||||||
tunable_policy(`httpd_can_network_connect_db',`
|
tunable_policy(`httpd_can_network_connect_db',`
|
||||||
corenet_tcp_connect_mssql_port(httpd_sys_script_t)
|
corenet_tcp_connect_mssql_port(httpd_sys_script_t)
|
||||||
corenet_sendrecv_mssql_client_packets(httpd_sys_script_t)
|
corenet_sendrecv_mssql_client_packets(httpd_sys_script_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
fs_cifs_entry_type(httpd_sys_script_t)
|
||||||
|
fs_read_iso9660_files(httpd_sys_script_t)
|
||||||
|
fs_nfs_entry_type(httpd_sys_script_t)
|
||||||
|
|
||||||
tunable_policy(`httpd_use_nfs',`
|
tunable_policy(`httpd_use_nfs',`
|
||||||
fs_manage_nfs_dirs(httpd_sys_script_t)
|
fs_manage_nfs_dirs(httpd_sys_script_t)
|
||||||
fs_manage_nfs_files(httpd_sys_script_t)
|
fs_manage_nfs_files(httpd_sys_script_t)
|
||||||
@ -1180,6 +1181,6 @@ tunable_policy(`httpd_enable_homedirs',`
|
|||||||
|
|
||||||
tunable_policy(`httpd_read_user_content',`
|
tunable_policy(`httpd_read_user_content',`
|
||||||
userdom_read_user_home_content_files(httpd_t)
|
userdom_read_user_home_content_files(httpd_t)
|
||||||
userdom_read_user_home_content_files(httpd_user_script_t)
|
|
||||||
userdom_read_user_home_content_files(httpd_suexec_t)
|
userdom_read_user_home_content_files(httpd_suexec_t)
|
||||||
|
userdom_read_user_home_content_files(httpd_user_script_t)
|
||||||
')
|
')
|
||||||
|
Loading…
Reference in New Issue
Block a user