various: several dontaudits

Signed-off-by: Kenton Groombridge <me@concord.sh>
This commit is contained in:
Kenton Groombridge 2021-03-12 20:31:12 -05:00
parent 95dc0f0de3
commit 69b2259c7d
7 changed files with 36 additions and 0 deletions

View File

@ -66,6 +66,7 @@ template(`sudo_role_template',`
allow $1_sudo_t self:unix_dgram_socket sendto;
allow $1_sudo_t self:unix_stream_socket connectto;
allow $1_sudo_t self:key manage_key_perms;
dontaudit $1_sudo_t self:capability { dac_read_search sys_ptrace };
allow $1_sudo_t $3:key search;
@ -85,6 +86,7 @@ template(`sudo_role_template',`
kernel_read_kernel_sysctls($1_sudo_t)
kernel_read_system_state($1_sudo_t)
kernel_link_key($1_sudo_t)
kernel_dontaudit_getattr_proc($1_sudo_t)
corecmd_exec_all_executables($1_sudo_t)
@ -142,6 +144,7 @@ template(`sudo_role_template',`
userdom_manage_user_tmp_symlinks($1_sudo_t)
userdom_setattr_user_ptys($1_sudo_t)
userdom_use_user_terminals($1_sudo_t)
userdom_dontaudit_rw_user_tmp_pipes($1_sudo_t)
# for some PAM modules and for cwd
userdom_dontaudit_search_user_home_content($1_sudo_t)
userdom_dontaudit_search_user_home_dirs($1_sudo_t)

View File

@ -334,6 +334,7 @@ allow ssh_keygen_t sshd_key_t:file manage_file_perms;
files_etc_filetrans(ssh_keygen_t, sshd_key_t, file)
kernel_read_kernel_sysctls(ssh_keygen_t)
kernel_dontaudit_getattr_proc(ssh_keygen_t)
fs_search_auto_mountpoints(ssh_keygen_t)

View File

@ -408,6 +408,7 @@ ifdef(`init_systemd',`
# If /etc/localtime is missing, a watch on /etc is added.
files_watch_etc_dirs(init_t)
files_watch_etc_symlinks(init_t)
files_dontaudit_write_var_dirs(init_t)
fs_relabel_cgroup_dirs(init_t)
fs_list_auto_mountpoints(init_t)

View File

@ -114,6 +114,7 @@ files_getattr_all_dirs(auditctl_t)
files_getattr_all_files(auditctl_t)
files_read_etc_files(auditctl_t)
kernel_dontaudit_getattr_proc(auditctl_t)
kernel_read_kernel_sysctls(auditctl_t)
kernel_read_proc_symlinks(auditctl_t)
kernel_setsched(auditctl_t)

View File

@ -336,6 +336,8 @@ systemd_log_parse_environment(systemd_backlight_t)
# Allow systemd-backlight to write to /sys/class/backlight/*/brightness
dev_rw_sysfs(systemd_backlight_t)
kernel_dontaudit_search_kernel_sysctl(systemd_backlight_t)
# for udev.conf
files_read_etc_files(systemd_backlight_t)
@ -501,6 +503,7 @@ optional_policy(`
allow systemd_hostnamed_t self:capability sys_admin;
kernel_read_kernel_sysctls(systemd_hostnamed_t)
kernel_dontaudit_getattr_proc(systemd_hostnamed_t)
dev_read_sysfs(systemd_hostnamed_t)
@ -617,6 +620,7 @@ allow systemd_logind_t systemd_sessions_runtime_t:dir manage_dir_perms;
allow systemd_logind_t systemd_sessions_runtime_t:file manage_file_perms;
allow systemd_logind_t systemd_sessions_runtime_t:fifo_file manage_fifo_file_perms;
kernel_dontaudit_getattr_proc(systemd_logind_t)
kernel_read_kernel_sysctls(systemd_logind_t)
dev_getattr_dri_dev(systemd_logind_t)
@ -822,6 +826,7 @@ optional_policy(`
kernel_load_module(systemd_modules_load_t)
kernel_read_kernel_sysctls(systemd_modules_load_t)
kernel_request_load_module(systemd_modules_load_t)
kernel_dontaudit_getattr_proc(systemd_modules_load_t)
dev_read_sysfs(systemd_modules_load_t)
@ -858,6 +863,7 @@ kernel_read_kernel_sysctls(systemd_networkd_t)
kernel_read_network_state(systemd_networkd_t)
kernel_request_load_module(systemd_networkd_t)
kernel_rw_net_sysctls(systemd_networkd_t)
kernel_dontaudit_getattr_proc(systemd_networkd_t)
corecmd_bin_entry_type(systemd_networkd_t)
corecmd_exec_bin(systemd_networkd_t)
@ -1196,6 +1202,7 @@ dev_read_sysfs(systemd_resolved_t)
kernel_read_crypto_sysctls(systemd_resolved_t)
kernel_read_kernel_sysctls(systemd_resolved_t)
kernel_read_net_sysctls(systemd_resolved_t)
kernel_dontaudit_getattr_proc(systemd_resolved_t)
corenet_tcp_bind_generic_node(systemd_resolved_t)
corenet_tcp_bind_dns_port(systemd_resolved_t)
@ -1263,6 +1270,7 @@ allow systemd_sessions_t systemd_sessions_runtime_t:file manage_file_perms;
files_runtime_filetrans(systemd_sessions_t, systemd_sessions_runtime_t, file)
kernel_read_kernel_sysctls(systemd_sessions_t)
kernel_dontaudit_getattr_proc(systemd_sessions_t)
selinux_get_fs_mount(systemd_sessions_t)
selinux_use_status_page(systemd_sessions_t)
@ -1581,6 +1589,7 @@ fs_unmount_tmpfs(systemd_user_runtime_dir_t)
fs_relabelfrom_tmpfs_dirs(systemd_user_runtime_dir_t)
kernel_read_kernel_sysctls(systemd_user_runtime_dir_t)
kernel_dontaudit_getattr_proc(systemd_user_runtime_dir_t)
selinux_use_status_page(systemd_user_runtime_dir_t)

View File

@ -131,6 +131,7 @@ files_exec_etc_files(udev_t)
files_getattr_generic_locks(udev_t)
files_search_mnt(udev_t)
files_dontaudit_getattr_default_files(udev_t)
files_dontaudit_getattr_home_dir(udev_t)
files_dontaudit_getattr_lost_found_dirs(udev_t)
files_dontaudit_getattr_tmp_dirs(udev_t)
@ -199,6 +200,7 @@ sysnet_signal_dhcpc(udev_t)
sysnet_manage_config(udev_t)
sysnet_etc_filetrans_config(udev_t)
userdom_dontaudit_getattr_user_home_dirs(udev_t)
userdom_dontaudit_search_user_home_content(udev_t)
ifdef(`distro_debian',`

View File

@ -3105,6 +3105,25 @@ interface(`userdom_manage_user_tmp_pipes',`
userdom_search_user_runtime($1)
')
########################################
## <summary>
## Do not audit attempts to read and write
## temporary pipes.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`userdom_dontaudit_rw_user_tmp_pipes',`
gen_require(`
type user_tmp_t;
')
dontaudit $1 user_tmp_t:fifo_file rw_fifo_file_perms;
')
########################################
## <summary>
## Create, read, write, and delete user