policy_module(piranha,1.0.0) ######################################## # # Declarations # ## ##

## Allow piranha-lvs domain to connect to the network using TCP. ##

##
gen_tunable(piranha_lvs_can_network_connect, false) attribute piranha_domain; piranha_domain_template(fos) piranha_domain_template(lvs) piranha_domain_template(pulse) type piranha_pulse_initrc_exec_t; init_script_file(piranha_pulse_initrc_exec_t) piranha_domain_template(web) type piranha_web_tmpfs_t; files_tmpfs_file(piranha_web_tmpfs_t) type piranha_web_conf_t; files_type(piranha_web_conf_t) type piranha_web_data_t; files_type(piranha_web_data_t) type piranha_web_tmp_t; files_tmp_file(piranha_web_tmp_t) type piranha_etc_rw_t; files_type(piranha_etc_rw_t) type piranha_log_t; logging_log_file(piranha_log_t) ####################################### # # piranha-fos local policy # kernel_read_kernel_sysctls(piranha_fos_t) domain_read_all_domains_state(piranha_fos_t) consoletype_exec(piranha_fos_t) # start and stop services init_domtrans_script(piranha_fos_t) ######################################## # # piranha-gui local policy # allow piranha_web_t self:capability { setuid sys_nice kill setgid }; allow piranha_web_t self:process { getsched setsched signal signull ptrace }; allow piranha_web_t self:rawip_socket create_socket_perms; allow piranha_web_t self:netlink_route_socket r_netlink_socket_perms; allow piranha_web_t self:sem create_sem_perms; allow piranha_web_t self:shm create_shm_perms; manage_files_pattern(piranha_web_t, piranha_web_data_t, piranha_web_data_t) manage_dirs_pattern(piranha_web_t, piranha_web_data_t, piranha_web_data_t) files_var_lib_filetrans(piranha_web_t, piranha_web_data_t, file) read_files_pattern(piranha_web_t, piranha_web_conf_t, piranha_web_conf_t) rw_files_pattern(piranha_web_t, piranha_etc_rw_t, piranha_etc_rw_t) manage_dirs_pattern(piranha_web_t, piranha_log_t, piranha_log_t) manage_files_pattern(piranha_web_t, piranha_log_t, piranha_log_t) logging_log_filetrans(piranha_web_t, piranha_log_t, { dir file } ) can_exec(piranha_web_t, piranha_web_tmp_t) manage_dirs_pattern(piranha_web_t, piranha_web_tmp_t, piranha_web_tmp_t) manage_files_pattern(piranha_web_t, piranha_web_tmp_t, piranha_web_tmp_t) files_tmp_filetrans(piranha_web_t, piranha_web_tmp_t, { file dir }) manage_dirs_pattern(piranha_web_t, piranha_web_tmpfs_t, piranha_web_tmpfs_t) manage_files_pattern(piranha_web_t, piranha_web_tmpfs_t, piranha_web_tmpfs_t) fs_tmpfs_filetrans(piranha_web_t, piranha_web_tmpfs_t, { dir file }) piranha_pulse_initrc_domtrans(piranha_web_t) kernel_read_kernel_sysctls(piranha_web_t) corenet_tcp_bind_http_cache_port(piranha_web_t) corenet_tcp_bind_luci_port(piranha_web_t) corenet_tcp_bind_piranha_port(piranha_web_t) corenet_tcp_connect_ricci_port(piranha_web_t) dev_read_urand(piranha_web_t) domain_read_all_domains_state(piranha_web_t) files_read_usr_files(piranha_web_t) consoletype_exec(piranha_web_t) optional_policy(` apache_read_config(piranha_web_t) apache_exec_modules(piranha_web_t) apache_exec(piranha_web_t) ') optional_policy(` gnome_dontaudit_search_config(piranha_web_t) ') optional_policy(` sasl_connect(piranha_web_t) ') ###################################### # # piranha-lvs local policy # # neede by nanny allow piranha_lvs_t self:capability { net_raw sys_nice }; allow piranha_lvs_t self:process signal; allow piranha_lvs_t self:unix_dgram_socket create_socket_perms; allow piranha_lvs_t self:rawip_socket create_socket_perms; kernel_read_kernel_sysctls(piranha_lvs_t) # needed by nanny corenet_tcp_connect_ftp_port(piranha_lvs_t) corenet_tcp_connect_http_port(piranha_lvs_t) sysnet_dns_name_resolve(piranha_lvs_t) # needed by nanny tunable_policy(`piranha_lvs_can_network_connect',` corenet_tcp_connect_all_ports(piranha_lvs_t) ') # needed by ipvsadm optional_policy(` iptables_domtrans(piranha_lvs_t) ') ####################################### # # piranha-pulse local policy # allow piranha_pulse_t self:packet_socket create_socket_perms; # pulse starts fos and lvs daemon domtrans_pattern(piranha_fos_t, piranha_fos_exec_t, piranha_fos_t) allow piranha_pulse_t piranha_fos_t:process signal; domtrans_pattern(piranha_pulse_t, piranha_lvs_exec_t, piranha_lvs_t) allow piranha_pulse_t piranha_lvs_t:process signal; corenet_udp_bind_apertus_ldp_port(piranha_pulse_t) sysnet_dns_name_resolve(piranha_pulse_t) optional_policy(` netutils_domtrans_ping(piranha_pulse_t) ') optional_policy(` sysnet_domtrans_ifconfig(piranha_pulse_t) ') #################################### # # piranha domains common policy # allow piranha_domain self:fifo_file rw_fifo_file_perms; allow piranha_domain self:tcp_socket create_stream_socket_perms; allow piranha_domain self:udp_socket create_socket_perms; allow piranha_domain self:unix_stream_socket create_stream_socket_perms; read_files_pattern(piranha_domain, piranha_etc_rw_t, piranha_etc_rw_t) kernel_read_system_state(piranha_domain) kernel_read_network_state(piranha_domain) corenet_all_recvfrom_unlabeled(piranha_domain) corenet_all_recvfrom_netlabel(piranha_domain) corenet_tcp_sendrecv_generic_if(piranha_domain) corenet_udp_sendrecv_generic_if(piranha_domain) corenet_tcp_sendrecv_generic_node(piranha_domain) corenet_udp_sendrecv_generic_node(piranha_domain) corenet_tcp_sendrecv_all_ports(piranha_domain) corenet_udp_sendrecv_all_ports(piranha_domain) corenet_tcp_bind_generic_node(piranha_domain) corenet_udp_bind_generic_node(piranha_domain) files_read_etc_files(piranha_domain) corecmd_exec_bin(piranha_domain) corecmd_exec_shell(piranha_domain) libs_use_ld_so(piranha_domain) libs_use_shared_libs(piranha_domain) logging_send_syslog_msg(piranha_domain) miscfiles_read_localization(piranha_domain) sysnet_read_config(piranha_domain)