policy_module(telepathy, 1.0.0) ######################################## # # Declarations. # ## ##

## Allow the Telepathy connection managers ## to connect to any generic TCP port. ##

##
gen_tunable(telepathy_tcp_connect_generic_network_ports, false) attribute telepathy_domain; attribute telepathy_executable; telepathy_domain_template(gabble) type telepathy_gabble_cache_home_t; userdom_user_home_content(telepathy_gabble_cache_home_t) telepathy_domain_template(idle) telepathy_domain_template(mission_control) type telepathy_mission_control_home_t; userdom_user_home_content(telepathy_mission_control_home_t) type telepathy_mission_control_cache_home_t; userdom_user_home_content(telepathy_mission_control_cache_home_t) telepathy_domain_template(msn) telepathy_domain_template(salut) telepathy_domain_template(sofiasip) telepathy_domain_template(stream_engine) telepathy_domain_template(sunshine) ####################################### # # Telepathy Butterfly and Haze local policy. # allow telepathy_msn_t self:process setsched; allow telepathy_msn_t self:netlink_route_socket create_netlink_socket_perms; allow telepathy_msn_t self:unix_dgram_socket { write create connect }; manage_dirs_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t) manage_files_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t) manage_sock_files_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t) exec_files_pattern(telepathy_msn_t, telepathy_msn_tmp_t, telepathy_msn_tmp_t) files_tmp_filetrans(telepathy_msn_t, telepathy_msn_tmp_t, { dir file sock_file }) userdom_user_tmp_filetrans(telepathy_msn_t, telepathy_msn_tmp_t, { dir file sock_file }) userdom_dontaudit_setattr_user_tmp(telepathy_msn_t) can_exec(telepathy_msn_t, telepathy_msn_tmp_t) corenet_sendrecv_http_client_packets(telepathy_msn_t) corenet_sendrecv_msnp_client_packets(telepathy_msn_t) corenet_tcp_connect_http_port(telepathy_msn_t) corenet_tcp_connect_msnp_port(telepathy_msn_t) corenet_tcp_connect_sametime_port(telepathy_msn_t) corecmd_exec_bin(telepathy_msn_t) corecmd_exec_shell(telepathy_msn_t) corecmd_read_bin_symlinks(telepathy_msn_t) dev_read_urand(telepathy_msn_t) files_read_etc_files(telepathy_msn_t) files_read_usr_files(telepathy_msn_t) kernel_read_system_state(telepathy_msn_t) auth_use_nsswitch(telepathy_msn_t) libs_exec_ldconfig(telepathy_msn_t) logging_send_syslog_msg(telepathy_msn_t) miscfiles_read_certs(telepathy_msn_t) sysnet_read_config(telepathy_msn_t) optional_policy(` dbus_system_bus_client(telepathy_msn_t) optional_policy(` networkmanager_dbus_chat(telepathy_msn_t) ') ') optional_policy(` gnome_read_gconf_home_files(telepathy_msn_t) ') ####################################### # # Telepathy Gabble local policy. # allow telepathy_gabble_t self:netlink_route_socket create_netlink_socket_perms; allow telepathy_gabble_t self:tcp_socket { listen accept }; allow telepathy_gabble_t self:unix_dgram_socket { write read create getattr sendto }; manage_dirs_pattern(telepathy_gabble_t, telepathy_gabble_tmp_t, telepathy_gabble_tmp_t) manage_sock_files_pattern(telepathy_gabble_t, telepathy_gabble_tmp_t, telepathy_gabble_tmp_t) files_tmp_filetrans(telepathy_gabble_t, telepathy_gabble_tmp_t, { dir sock_file }) # ~/.cache/gabble/caps-cache.db-journal optional_policy(` manage_dirs_pattern(telepathy_gabble_t, telepathy_gabble_cache_home_t, telepathy_gabble_cache_home_t) manage_files_pattern(telepathy_gabble_t, telepathy_gabble_cache_home_t, telepathy_gabble_cache_home_t) gnome_cache_filetrans(telepathy_gabble_t, telepathy_gabble_cache_home_t, { dir file }) ') corenet_sendrecv_commplex_client_packets(telepathy_gabble_t) corenet_sendrecv_http_client_packets(telepathy_gabble_t) corenet_sendrecv_jabber_client_client_packets(telepathy_gabble_t) corenet_sendrecv_vnc_client_packets(telepathy_gabble_t) corenet_tcp_connect_commplex_port(telepathy_gabble_t) corenet_tcp_connect_http_port(telepathy_gabble_t) corenet_tcp_connect_jabber_client_port(telepathy_gabble_t) corenet_tcp_connect_vnc_port(telepathy_gabble_t) dev_read_rand(telepathy_gabble_t) dev_read_urand(telepathy_gabble_t) files_read_config_files(telepathy_gabble_t) files_read_usr_files(telepathy_gabble_t) miscfiles_read_certs(telepathy_gabble_t) sysnet_read_config(telepathy_gabble_t) optional_policy(` dbus_system_bus_client(telepathy_gabble_t) ') tunable_policy(`use_nfs_home_dirs', ` fs_manage_nfs_dirs(telepathy_gabble_t) fs_manage_nfs_files(telepathy_gabble_t) ') tunable_policy(`use_samba_home_dirs', ` fs_manage_cifs_dirs(telepathy_gabble_t) fs_manage_cifs_files(telepathy_gabble_t) ') ####################################### # # Telepathy Idle local policy. # allow telepathy_idle_t self:netlink_route_socket create_netlink_socket_perms; corenet_sendrecv_ircd_client_packets(telepathy_idle_t) corenet_tcp_connect_ircd_port(telepathy_idle_t) files_read_etc_files(telepathy_idle_t) sysnet_read_config(telepathy_idle_t) ####################################### # # Telepathy Mission-Control local policy. # manage_dirs_pattern(telepathy_mission_control_t, telepathy_mission_control_home_t, telepathy_mission_control_home_t) manage_files_pattern(telepathy_mission_control_t, telepathy_mission_control_home_t, telepathy_mission_control_home_t) userdom_user_home_dir_filetrans(telepathy_mission_control_t, telepathy_mission_control_home_t, { dir file }) userdom_search_user_home_dirs(telepathy_mission_control_t) dev_read_rand(telepathy_mission_control_t) files_read_etc_files(telepathy_mission_control_t) files_read_usr_files(telepathy_mission_control_t) tunable_policy(`use_nfs_home_dirs', ` fs_manage_nfs_dirs(telepathy_mission_control_t) fs_manage_nfs_files(telepathy_mission_control_t) ') tunable_policy(`use_samba_home_dirs', ` fs_manage_cifs_dirs(telepathy_mission_control_t) fs_manage_cifs_files(telepathy_mission_control_t) ') auth_use_nsswitch(telepathy_mission_control_t) # ~/.cache/.mc_connections. optional_policy(` manage_files_pattern(telepathy_mission_control_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_cache_home_t) gnome_cache_filetrans(telepathy_mission_control_t, telepathy_mission_control_cache_home_t, file) ') optional_policy(` gnome_read_gconf_home_files(telepathy_mission_control_t) gnome_setattr_cache_home_dir(telepathy_mission_control_t) gnome_read_generic_cache_files(telepathy_mission_control_t) ') ####################################### # # Telepathy Salut local policy. # allow telepathy_salut_t self:netlink_route_socket create_netlink_socket_perms; allow telepathy_salut_t self:tcp_socket { accept listen }; manage_sock_files_pattern(telepathy_salut_t, telepathy_salut_tmp_t, telepathy_salut_tmp_t) files_tmp_filetrans(telepathy_salut_t, telepathy_salut_tmp_t, sock_file) corenet_sendrecv_presence_server_packets(telepathy_salut_t) corenet_tcp_bind_presence_port(telepathy_salut_t) corenet_tcp_connect_presence_port(telepathy_salut_t) dev_read_urand(telepathy_salut_t) files_read_etc_files(telepathy_salut_t) sysnet_read_config(telepathy_salut_t) optional_policy(` dbus_system_bus_client(telepathy_salut_t) optional_policy(` avahi_dbus_chat(telepathy_salut_t) ') ') ####################################### # # Telepathy Sofiasip local policy. # allow telepathy_sofiasip_t self:netlink_route_socket create_netlink_socket_perms; allow telepathy_sofiasip_t self:rawip_socket { create_socket_perms listen }; allow telepathy_sofiasip_t self:tcp_socket { listen }; corenet_sendrecv_sip_client_packets(telepathy_sofiasip_t) corenet_tcp_connect_sip_port(telepathy_sofiasip_t) dev_read_urand(telepathy_sofiasip_t) kernel_request_load_module(telepathy_sofiasip_t) sysnet_read_config(telepathy_sofiasip_t) ####################################### # # Telepathy Sunshine local policy. # manage_files_pattern(telepathy_sunshine_t, telepathy_sunshine_tmp_t, telepathy_sunshine_tmp_t) exec_files_pattern(telepathy_sunshine_t, telepathy_sunshine_tmp_t, telepathy_sunshine_tmp_t) files_tmp_filetrans(telepathy_sunshine_t, telepathy_sunshine_tmp_t, file) corecmd_list_bin(telepathy_sunshine_t) dev_read_urand(telepathy_sunshine_t) files_read_etc_files(telepathy_sunshine_t) files_read_usr_files(telepathy_sunshine_t) kernel_read_system_state(telepathy_sunshine_t) optional_policy(` xserver_read_xdm_pid(telepathy_sunshine_t) xserver_stream_connect(telepathy_sunshine_t) ') ####################################### # # telepathy domains common policy # allow telepathy_domain self:process { getsched signal sigkill }; allow telepathy_domain self:fifo_file rw_fifo_file_perms; allow telepathy_domain self:tcp_socket create_socket_perms; allow telepathy_domain self:udp_socket create_socket_perms; corenet_all_recvfrom_netlabel(telepathy_domain) corenet_all_recvfrom_unlabeled(telepathy_domain) corenet_raw_bind_generic_node(telepathy_domain) corenet_raw_sendrecv_generic_if(telepathy_domain) corenet_raw_sendrecv_generic_node(telepathy_domain) corenet_tcp_bind_generic_node(telepathy_domain) corenet_tcp_sendrecv_generic_if(telepathy_domain) corenet_tcp_sendrecv_generic_node(telepathy_domain) corenet_udp_bind_generic_node(telepathy_domain) fs_search_auto_mountpoints(telepathy_domain) miscfiles_read_localization(telepathy_domain) # This interface does not facilitate files_search_tmp which appears to be a bug. userdom_stream_connect(telepathy_domain) userdom_use_user_terminals(telepathy_domain) tunable_policy(`telepathy_tcp_connect_generic_network_ports', ` corenet_tcp_connect_generic_port(telepathy_domain) corenet_sendrecv_generic_client_packets(telepathy_domain) ') optional_policy(` automount_dontaudit_getattr_tmp_dirs(telepathy_domain) ') optional_policy(` nis_use_ypbind(telepathy_domain) ') optional_policy(` telepathy_dbus_chat(telepathy_domain) ') optional_policy(` xserver_rw_xdm_pipes(telepathy_domain) ')