192 lines
5.0 KiB
Plaintext
192 lines
5.0 KiB
Plaintext
|
|
policy_module(mta,1.1.3)
|
|
|
|
########################################
|
|
#
|
|
# Declarations
|
|
#
|
|
|
|
attribute mta_user_agent;
|
|
attribute mailserver_delivery;
|
|
attribute mailserver_domain;
|
|
attribute mailserver_sender;
|
|
|
|
attribute user_mail_domain;
|
|
|
|
type etc_aliases_t;
|
|
files_type(etc_aliases_t)
|
|
|
|
type etc_mail_t;
|
|
files_config_file(etc_mail_t)
|
|
|
|
type mqueue_spool_t;
|
|
files_type(mqueue_spool_t)
|
|
|
|
type mail_spool_t;
|
|
files_type(mail_spool_t)
|
|
|
|
type sendmail_exec_t;
|
|
files_type(sendmail_exec_t)
|
|
|
|
mta_base_mail_template(system)
|
|
role system_r types system_mail_t;
|
|
|
|
# cjp: need to resolve this, but require{}
|
|
# does not work in the else part of the optional
|
|
#ifdef(`strict_policy',`
|
|
# optional_policy(`sendmail',`',`
|
|
# init_system_domain(system_mail_t,sendmail_exec_t)
|
|
# ')
|
|
#')
|
|
|
|
########################################
|
|
#
|
|
# System mail local policy
|
|
#
|
|
|
|
allow system_mail_t etc_mail_t:dir { getattr search };
|
|
allow system_mail_t etc_mail_t:file r_file_perms;
|
|
|
|
kernel_read_system_state(system_mail_t)
|
|
kernel_read_network_state(system_mail_t)
|
|
|
|
dev_read_rand(system_mail_t)
|
|
dev_read_urand(system_mail_t)
|
|
|
|
init_use_script_pty(system_mail_t)
|
|
|
|
userdom_use_sysadm_terms(system_mail_t)
|
|
|
|
ifdef(`targeted_policy',`
|
|
typealias system_mail_t alias sysadm_mail_t;
|
|
|
|
allow system_mail_t mail_spool_t:dir create_dir_perms;
|
|
allow system_mail_t mail_spool_t:file create_file_perms;
|
|
allow system_mail_t mail_spool_t:lnk_file create_lnk_perms;
|
|
allow system_mail_t mail_spool_t:fifo_file rw_file_perms;
|
|
|
|
allow system_mail_t mqueue_spool_t:dir create_dir_perms;
|
|
allow system_mail_t mqueue_spool_t:file create_file_perms;
|
|
allow system_mail_t mqueue_spool_t:lnk_file create_lnk_perms;
|
|
|
|
# for reading .forward - maybe we need a new type for it?
|
|
# also for delivering mail to maildir
|
|
# cjp: fix this to generic_user interfaces
|
|
userdom_manage_user_home_subdirs(user,mailserver_delivery)
|
|
userdom_manage_user_home_subdir_files(user,mailserver_delivery)
|
|
userdom_manage_user_home_subdir_symlinks(user,mailserver_delivery)
|
|
userdom_manage_user_home_subdir_pipes(user,mailserver_delivery)
|
|
userdom_manage_user_home_subdir_sockets(user,mailserver_delivery)
|
|
userdom_create_user_home(user,mailserver_delivery,{ dir file lnk_file fifo_file sock_file })
|
|
|
|
# cjp: another require-in-else to resolve
|
|
# optional_policy(`postfix',`',`
|
|
corecmd_exec_bin(system_mail_t)
|
|
corecmd_exec_sbin(system_mail_t)
|
|
|
|
domain_exec_all_entry_files(system_mail_t)
|
|
|
|
files_exec_etc_files(system_mail_t)
|
|
|
|
libs_exec_ld_so(system_mail_t)
|
|
libs_exec_lib_files(system_mail_t)
|
|
# ')
|
|
')
|
|
|
|
optional_policy(`apache',`
|
|
apache_read_squirrelmail_data(system_mail_t)
|
|
apache_append_squirrelmail_data(system_mail_t)
|
|
|
|
# apache should set close-on-exec
|
|
apache_dontaudit_append_log(system_mail_t)
|
|
apache_dontaudit_rw_stream_socket(system_mail_t)
|
|
apache_dontaudit_rw_tcp_socket(system_mail_t)
|
|
apache_dontaudit_rw_sys_script_stream_socket(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`arpwatch',`
|
|
arpwatch_manage_tmp_files(system_mail_t)
|
|
|
|
ifdef(`hide_broken_symptoms', `
|
|
arpwatch_dontaudit_rw_packet_socket(system_mail_t)
|
|
')
|
|
')
|
|
|
|
optional_policy(`cron',`
|
|
cron_read_system_job_tmp_files(system_mail_t)
|
|
cron_dontaudit_write_pipe(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`cvs',`
|
|
cvs_read_data(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`logrotate',`
|
|
logrotate_read_tmp_files(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`logwatch',`
|
|
logwatch_read_tmp_files(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`sendmail',`
|
|
files_filetrans_etc(sendmail_t,etc_aliases_t, file)
|
|
')
|
|
|
|
optional_policy(`postfix',`
|
|
allow system_mail_t etc_aliases_t:dir create_dir_perms;
|
|
allow system_mail_t etc_aliases_t:file create_file_perms;
|
|
allow system_mail_t etc_aliases_t:lnk_file create_lnk_perms;
|
|
allow system_mail_t etc_aliases_t:sock_file create_file_perms;
|
|
allow system_mail_t etc_aliases_t:fifo_file create_file_perms;
|
|
files_filetrans_etc(system_mail_t,etc_aliases_t,{ file lnk_file sock_file fifo_file })
|
|
|
|
domain_use_wide_inherit_fd(system_mail_t)
|
|
|
|
# postfix needs this for newaliases
|
|
files_getattr_tmp_dir(system_mail_t)
|
|
|
|
postfix_exec_master(system_mail_t)
|
|
|
|
ifdef(`distro_redhat',`
|
|
# compatability for old default main.cf
|
|
postfix_filetrans_config(system_mail_t,etc_aliases_t,{ dir file lnk_file sock_file fifo_file })
|
|
')
|
|
|
|
optional_policy(`cron',`
|
|
cron_crw_tcp_socket(system_mail_t)
|
|
')
|
|
')
|
|
|
|
optional_policy(`sendmail',`
|
|
userdom_dontaudit_use_unpriv_user_pty(system_mail_t)
|
|
|
|
optional_policy(`cron',`
|
|
cron_dontaudit_append_system_job_tmp_files(system_mail_t)
|
|
')
|
|
')
|
|
|
|
optional_policy(`smartmon',`
|
|
smartmon_read_tmp(system_mail_t)
|
|
')
|
|
|
|
# should break this up among sections:
|
|
|
|
optional_policy(`arpwatch',`
|
|
# why is mail delivered to a directory of type arpwatch_data_t?
|
|
arpwatch_search_data(mailserver_delivery)
|
|
arpwatch_manage_tmp_files(mta_user_agent)
|
|
ifdef(`hide_broken_symptoms', `
|
|
arpwatch_dontaudit_rw_packet_socket(mta_user_agent)
|
|
')
|
|
optional_policy(`cron',`
|
|
cron_read_system_job_tmp_files(mta_user_agent)
|
|
')
|
|
')
|
|
|
|
ifdef(`TODO',`
|
|
# for the start script to run make -C /etc/mail
|
|
allow initrc_t etc_mail_t:dir rw_dir_perms;
|
|
allow initrc_t etc_mail_t:file create_file_perms;
|
|
')
|