#DESC saslauthd - Authentication daemon for SASL # # Author: Colin Walters # daemon_domain(saslauthd, `, auth_chkpwd, auth_bool') allow saslauthd_t self:fifo_file { read write }; allow saslauthd_t self:unix_dgram_socket create_socket_perms; allow saslauthd_t self:unix_stream_socket create_stream_socket_perms; allow saslauthd_t saslauthd_var_run_t:sock_file create_file_perms; allow saslauthd_t var_lib_t:dir search; allow saslauthd_t etc_t:dir { getattr search }; allow saslauthd_t etc_t:file r_file_perms; allow saslauthd_t net_conf_t:file r_file_perms; allow saslauthd_t self:file r_file_perms; allow saslauthd_t proc_t:file { getattr read }; allow saslauthd_t urandom_device_t:chr_file { getattr read }; # Needs investigation dontaudit saslauthd_t home_root_t:dir getattr; can_network_client_tcp(saslauthd_t) allow saslauthd_t pop_port_t:tcp_socket name_connect; bool allow_saslauthd_read_shadow false; if (allow_saslauthd_read_shadow) { allow saslauthd_t shadow_t:file r_file_perms; } dontaudit saslauthd_t selinux_config_t:dir search; dontaudit saslauthd_t selinux_config_t:file { getattr read }; dontaudit saslauthd_t initrc_t:unix_stream_socket connectto; ifdef(`mysqld.te', ` allow saslauthd_t mysqld_db_t:dir search; allow saslauthd_t mysqld_var_run_t:sock_file rw_file_perms; ') dontaudit saslauthd_t self:capability setuid;