1900668638
The latest revision of the labeled policy patches which enable both labeled and unlabeled policy support for NetLabel. This revision takes into account Chris' feedback from the first version and reduces the number of interface calls in each domain down to two at present: one for unlabeled access, one for NetLabel access. The older, transport layer specific interfaces, are still present for use by third-party modules but are not used in the default policy modules. trunk: Use netmsg initial SID for MLS-only Netlabel packets, from Paul Moore. This patch changes the policy to use the netmsg initial SID as the "base" SID/context for NetLabel packets which only have MLS security attributes. Currently we use the unlabeled initial SID which makes it very difficult to distinquish between actual unlabeled packets and those packets which have MLS security attributes.
248 lines
7.4 KiB
Plaintext
248 lines
7.4 KiB
Plaintext
|
|
policy_module(amanda,1.5.1)
|
|
|
|
#######################################
|
|
#
|
|
# Declarations
|
|
#
|
|
|
|
type amanda_t;
|
|
type amanda_inetd_exec_t;
|
|
inetd_service_domain(amanda_t,amanda_inetd_exec_t)
|
|
role system_r types amanda_t;
|
|
|
|
type amanda_exec_t;
|
|
domain_entry_file(amanda_t,amanda_exec_t)
|
|
|
|
type amanda_log_t;
|
|
logging_log_file(amanda_log_t)
|
|
|
|
# type for amanda configurations files
|
|
type amanda_config_t;
|
|
files_type(amanda_config_t)
|
|
|
|
# type for files in /usr/lib/amanda
|
|
type amanda_usr_lib_t;
|
|
files_type(amanda_usr_lib_t)
|
|
|
|
# type for all files in /var/lib/amanda
|
|
type amanda_var_lib_t;
|
|
files_type(amanda_var_lib_t)
|
|
|
|
# type for all files in /var/lib/amanda/gnutar-lists/
|
|
type amanda_gnutarlists_t;
|
|
files_type(amanda_gnutarlists_t)
|
|
|
|
type amanda_tmp_t;
|
|
files_tmp_file(amanda_tmp_t)
|
|
|
|
# type for /etc/amandates
|
|
type amanda_amandates_t;
|
|
files_type(amanda_amandates_t)
|
|
|
|
# type for /etc/dumpdates
|
|
type amanda_dumpdates_t;
|
|
files_type(amanda_dumpdates_t)
|
|
|
|
# type for amanda data
|
|
type amanda_data_t;
|
|
files_type(amanda_data_t)
|
|
|
|
# type for amrecover
|
|
type amanda_recover_t;
|
|
type amanda_recover_exec_t;
|
|
domain_type(amanda_recover_t)
|
|
domain_entry_file(amanda_recover_t,amanda_recover_exec_t)
|
|
role system_r types amanda_recover_t;
|
|
|
|
# type for recover files ( restored data )
|
|
type amanda_recover_dir_t;
|
|
files_type(amanda_recover_dir_t)
|
|
|
|
optional_policy(`
|
|
prelink_object_file(amanda_usr_lib_t)
|
|
')
|
|
|
|
########################################
|
|
#
|
|
# Amanda local policy
|
|
#
|
|
|
|
allow amanda_t self:capability { chown dac_override setuid kill };
|
|
allow amanda_t self:process { setpgid signal };
|
|
allow amanda_t self:fifo_file { getattr read write ioctl lock };
|
|
allow amanda_t self:unix_stream_socket create_stream_socket_perms;
|
|
allow amanda_t self:unix_dgram_socket create_socket_perms;
|
|
allow amanda_t self:tcp_socket create_stream_socket_perms;
|
|
allow amanda_t self:udp_socket create_socket_perms;
|
|
allow amanda_t self:netlink_route_socket r_netlink_socket_perms;
|
|
|
|
# access to amanda_amandates_t
|
|
allow amanda_t amanda_amandates_t:file { getattr lock read write };
|
|
|
|
# configuration files -> read only
|
|
allow amanda_t amanda_config_t:file { getattr read };
|
|
|
|
# access to amandas data structure
|
|
allow amanda_t amanda_data_t:dir { read search write };
|
|
allow amanda_t amanda_data_t:file { read write };
|
|
|
|
# access to amanda_dumpdates_t
|
|
allow amanda_t amanda_dumpdates_t:file { getattr lock read write };
|
|
|
|
can_exec(amanda_t,amanda_exec_t)
|
|
|
|
# access to amanda_gnutarlists_t (/var/lib/amanda/gnutar-lists)
|
|
allow amanda_t amanda_gnutarlists_t:dir rw_dir_perms;
|
|
allow amanda_t amanda_gnutarlists_t:file manage_file_perms;
|
|
allow amanda_t amanda_gnutarlists_t:lnk_file manage_file_perms;
|
|
|
|
manage_files_pattern(amanda_t,amanda_log_t,amanda_log_t)
|
|
manage_dirs_pattern(amanda_t,amanda_log_t,amanda_log_t)
|
|
logging_log_filetrans(amanda_t,amanda_log_t,{ file dir })
|
|
|
|
manage_files_pattern(amanda_t,amanda_tmp_t,amanda_tmp_t)
|
|
manage_dirs_pattern(amanda_t,amanda_tmp_t,amanda_tmp_t)
|
|
files_tmp_filetrans(amanda_t, amanda_tmp_t, { file dir })
|
|
|
|
kernel_read_system_state(amanda_t)
|
|
kernel_read_kernel_sysctls(amanda_t)
|
|
kernel_dontaudit_getattr_unlabeled_files(amanda_t)
|
|
kernel_dontaudit_read_proc_symlinks(amanda_t)
|
|
|
|
# Added for targeted policy
|
|
term_use_unallocated_ttys(amanda_t)
|
|
|
|
corenet_all_recvfrom_unlabeled(amanda_t)
|
|
corenet_all_recvfrom_netlabel(amanda_t)
|
|
corenet_tcp_sendrecv_all_if(amanda_t)
|
|
corenet_udp_sendrecv_all_if(amanda_t)
|
|
corenet_raw_sendrecv_all_if(amanda_t)
|
|
corenet_tcp_sendrecv_all_nodes(amanda_t)
|
|
corenet_udp_sendrecv_all_nodes(amanda_t)
|
|
corenet_raw_sendrecv_all_nodes(amanda_t)
|
|
corenet_tcp_sendrecv_all_ports(amanda_t)
|
|
corenet_udp_sendrecv_all_ports(amanda_t)
|
|
corenet_tcp_bind_all_nodes(amanda_t)
|
|
corenet_udp_bind_all_nodes(amanda_t)
|
|
corenet_tcp_bind_all_rpc_ports(amanda_t)
|
|
|
|
dev_getattr_all_blk_files(amanda_t)
|
|
dev_getattr_all_chr_files(amanda_t)
|
|
|
|
fs_getattr_xattr_fs(amanda_t)
|
|
fs_list_all(amanda_t)
|
|
|
|
storage_raw_read_fixed_disk(amanda_t)
|
|
|
|
files_read_etc_files(amanda_t)
|
|
files_read_etc_runtime_files(amanda_t)
|
|
files_list_all(amanda_t)
|
|
files_read_all_files(amanda_t)
|
|
files_read_all_symlinks(amanda_t)
|
|
files_read_all_blk_files(amanda_t)
|
|
files_read_all_chr_files(amanda_t)
|
|
files_getattr_all_pipes(amanda_t)
|
|
files_getattr_all_sockets(amanda_t)
|
|
|
|
corecmd_exec_shell(amanda_t)
|
|
corecmd_exec_bin(amanda_t)
|
|
|
|
libs_use_ld_so(amanda_t)
|
|
libs_use_shared_libs(amanda_t)
|
|
|
|
sysnet_read_config(amanda_t)
|
|
|
|
optional_policy(`
|
|
auth_read_shadow(amanda_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
logging_send_syslog_msg(amanda_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
nis_use_ypbind(amanda_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
nscd_socket_use(amanda_t)
|
|
')
|
|
|
|
########################################
|
|
#
|
|
# Amanda recover local policy
|
|
|
|
allow amanda_recover_t self:capability { fowner fsetid kill setgid setuid chown dac_override };
|
|
allow amanda_recover_t self:process { sigkill sigstop signal };
|
|
allow amanda_recover_t self:fifo_file { getattr ioctl read write };
|
|
allow amanda_recover_t self:unix_stream_socket { connect create read write };
|
|
allow amanda_recover_t self:tcp_socket create_stream_socket_perms;
|
|
allow amanda_recover_t self:udp_socket create_socket_perms;
|
|
|
|
manage_files_pattern(amanda_recover_t,amanda_log_t,amanda_log_t)
|
|
manage_lnk_files_pattern(amanda_recover_t,amanda_log_t,amanda_log_t)
|
|
|
|
# access to amanda_recover_dir_t
|
|
manage_dirs_pattern(amanda_recover_t,amanda_recover_dir_t,amanda_recover_dir_t)
|
|
manage_files_pattern(amanda_recover_t,amanda_recover_dir_t,amanda_recover_dir_t)
|
|
manage_lnk_files_pattern(amanda_recover_t,amanda_recover_dir_t,amanda_recover_dir_t)
|
|
manage_fifo_files_pattern(amanda_recover_t,amanda_recover_dir_t,amanda_recover_dir_t)
|
|
manage_sock_files_pattern(amanda_recover_t,amanda_recover_dir_t,amanda_recover_dir_t)
|
|
userdom_sysadm_home_dir_filetrans(amanda_recover_t,amanda_recover_dir_t,{ dir file lnk_file sock_file fifo_file })
|
|
|
|
manage_dirs_pattern(amanda_recover_t,amanda_tmp_t,amanda_tmp_t)
|
|
manage_files_pattern(amanda_recover_t,amanda_tmp_t,amanda_tmp_t)
|
|
manage_lnk_files_pattern(amanda_recover_t,amanda_tmp_t,amanda_tmp_t)
|
|
manage_fifo_files_pattern(amanda_recover_t,amanda_tmp_t,amanda_tmp_t)
|
|
manage_sock_files_pattern(amanda_recover_t,amanda_tmp_t,amanda_tmp_t)
|
|
files_tmp_filetrans(amanda_recover_t,amanda_tmp_t,{ dir file lnk_file sock_file fifo_file })
|
|
|
|
kernel_read_system_state(amanda_recover_t)
|
|
kernel_read_kernel_sysctls(amanda_recover_t)
|
|
|
|
corenet_all_recvfrom_unlabeled(amanda_recover_t)
|
|
corenet_all_recvfrom_netlabel(amanda_recover_t)
|
|
corenet_tcp_sendrecv_all_if(amanda_recover_t)
|
|
corenet_udp_sendrecv_all_if(amanda_recover_t)
|
|
corenet_tcp_sendrecv_all_nodes(amanda_recover_t)
|
|
corenet_udp_sendrecv_all_nodes(amanda_recover_t)
|
|
corenet_tcp_sendrecv_all_ports(amanda_recover_t)
|
|
corenet_udp_sendrecv_all_ports(amanda_recover_t)
|
|
corenet_tcp_bind_all_nodes(amanda_recover_t)
|
|
corenet_udp_bind_all_nodes(amanda_recover_t)
|
|
corenet_tcp_bind_reserved_port(amanda_recover_t)
|
|
corenet_tcp_connect_amanda_port(amanda_recover_t)
|
|
corenet_sendrecv_amanda_client_packets(amanda_recover_t)
|
|
|
|
corecmd_exec_shell(amanda_recover_t)
|
|
corecmd_exec_bin(amanda_recover_t)
|
|
|
|
domain_use_interactive_fds(amanda_recover_t)
|
|
|
|
files_read_etc_files(amanda_recover_t)
|
|
files_read_etc_runtime_files(amanda_recover_t)
|
|
files_search_tmp(amanda_recover_t)
|
|
files_search_pids(amanda_recover_t)
|
|
|
|
fstools_domtrans(amanda_t)
|
|
|
|
libs_use_ld_so(amanda_recover_t)
|
|
libs_use_shared_libs(amanda_recover_t)
|
|
|
|
logging_search_logs(amanda_recover_t)
|
|
|
|
miscfiles_read_localization(amanda_recover_t)
|
|
|
|
sysnet_read_config(amanda_recover_t)
|
|
|
|
userdom_search_sysadm_home_content_dirs(amanda_recover_t)
|
|
|
|
optional_policy(`
|
|
nis_use_ypbind(amanda_recover_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
nscd_socket_use(amanda_recover_t)
|
|
')
|