selinux-policy/strict/domains/program/unused/clamav.te
2005-09-12 21:40:56 +00:00

148 lines
3.6 KiB
Plaintext

#DESC CLAM - Anti-virus program
#
# Author: Brian May <bam@snoopy.apana.org.au>
# X-Debian-Packages: clamav
#
#################################
#
# Rules for the clamscan_t domain.
#
# Virus database
type clamav_var_lib_t, file_type, sysadmfile;
# clamscan_t is the domain of the clamscan virus scanner
type clamscan_exec_t, file_type, sysadmfile, exec_type;
##########
##########
#
# Freshclam
#
daemon_base_domain(freshclam, `, web_client_domain')
read_locale(freshclam_t)
# not sure why it needs this
read_sysctl(freshclam_t)
can_network_client_tcp(freshclam_t, http_port_t);
allow freshclam_t http_port_t:tcp_socket name_connect;
can_resolve(freshclam_t)
can_ypbind(freshclam_t)
# Access virus signatures
allow freshclam_t { var_t var_lib_t }:dir search;
rw_dir_create_file(freshclam_t, clamav_var_lib_t)
allow freshclam_t devtty_t:chr_file { read write };
allow freshclam_t devpts_t:dir search;
allow freshclam_t etc_t:file { getattr read };
allow freshclam_t proc_t:file { getattr read };
allow freshclam_t urandom_device_t:chr_file { getattr read };
dontaudit freshclam_t urandom_device_t:chr_file ioctl;
# for nscd
dontaudit freshclam_t var_run_t:dir search;
# setuid/getuid used (although maybe not required...)
allow freshclam_t self:capability { setgid setuid };
allow freshclam_t sbin_t:dir search;
# Allow notification to daemon that virus database has changed
can_clamd_connect(freshclam)
allow freshclam_t etc_runtime_t:file { read getattr };
allow freshclam_t self:unix_stream_socket create_stream_socket_perms;
allow freshclam_t self:unix_dgram_socket create_socket_perms;
allow freshclam_t self:fifo_file rw_file_perms;
# Log files for freshclam executable
logdir_domain(freshclam)
allow initrc_t freshclam_log_t:file append;
# Pid files for freshclam
allow initrc_t clamd_var_run_t:file { create setattr };
system_crond_entry(freshclam_exec_t, freshclam_t)
domain_auto_trans(logrotate_t, freshclam_exec_t, freshclam_t)
domain_auto_trans(sysadm_t, freshclam_exec_t, freshclam_t)
role sysadm_r types freshclam_t;
create_dir_file(freshclam_t, clamd_var_run_t)
##########
##########
#
# Clamscan
#
# macros/program/clamav_macros.te.
user_clamscan_domain(sysadm)
##########
##########
#
# Clamd
#
type clamd_sock_t, file_type, sysadmfile;
# clamd executable
daemon_domain(clamd)
tmp_domain(clamd)
# The dir containing the clamd log files is labelled freshclam_t
logdir_domain(clamd)
allow clamd_t freshclam_log_t:dir search;
allow clamd_t self:capability { kill setgid setuid dac_override };
# Give the clamd local communications socket a unique type
ifdef(`distro_debian', `
file_type_auto_trans(clamd_t, var_run_t, clamd_sock_t, sock_file)
')
ifdef(`distro_redhat', `
file_type_auto_trans(clamd_t, clamd_var_run_t, clamd_sock_t, sock_file)
')
# Clamd can be configured to listen on a TCP port.
can_network_server_tcp(clamd_t, clamd_port_t)
allow clamd_t clamd_port_t:tcp_socket name_bind;
can_resolve(clamd_t);
allow clamd_t var_lib_t:dir search;
r_dir_file(clamd_t, clamav_var_lib_t)
r_dir_file(clamd_t, etc_t)
# allow access /proc/sys/kernel/version
read_sysctl(clamd_t)
allow clamd_t self:unix_stream_socket create_stream_socket_perms;
allow clamd_t self:unix_dgram_socket create_stream_socket_perms;
allow clamd_t self:fifo_file rw_file_perms;
allow clamd_t { random_device_t urandom_device_t }:chr_file { getattr read };
dontaudit clamd_t { random_device_t urandom_device_t }:chr_file ioctl;
##########
##########
#
# Interaction with external programs
#
ifdef(`amavis.te',`
allow amavisd_t clamd_var_run_t:dir search;
allow amavisd_t clamd_t:unix_stream_socket connectto;
allow amavisd_t clamd_sock_t:sock_file write;
')