Iptables and modutils patches from Dan Walsh.
This commit is contained in:
parent
d913e793ae
commit
7491a9ed62
|
@ -1,7 +1,13 @@
|
||||||
/sbin/ip6tables.* -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
/etc/rc\.d/init\.d/ip6?tables -- gen_context(system_u:object_r:iptables_initrc_exec_t,s0)
|
||||||
/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
/etc/sysconfig/ip6?tables.* -- gen_context(system_u:object_r:iptables_conf_t,s0)
|
||||||
/sbin/iptables.* -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
/etc/sysconfig/system-config-firewall.* -- gen_context(system_u:object_r:iptables_conf_t,s0)
|
||||||
|
|
||||||
|
/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
||||||
|
/sbin/ip6?tables -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
||||||
|
/sbin/ip6?tables-restore -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
||||||
|
/sbin/ip6?tables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
||||||
|
|
||||||
/usr/sbin/ip6tables.* -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
|
||||||
/usr/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
/usr/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
||||||
/usr/sbin/iptables.* -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
/usr/sbin/iptables -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
||||||
|
/usr/sbin/iptables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
||||||
|
/usr/sbin/iptables-restore -- gen_context(system_u:object_r:iptables_exec_t,s0)
|
||||||
|
|
|
@ -69,3 +69,99 @@ interface(`iptables_exec',`
|
||||||
corecmd_search_bin($1)
|
corecmd_search_bin($1)
|
||||||
can_exec($1, iptables_exec_t)
|
can_exec($1, iptables_exec_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
#####################################
|
||||||
|
## <summary>
|
||||||
|
## Execute iptables in the iptables domain.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## The type of the process performing this action.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`iptables_initrc_domtrans',`
|
||||||
|
gen_require(`
|
||||||
|
type iptables_initrc_exec_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
init_labeled_script_domtrans($1, iptables_initrc_exec_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
#####################################
|
||||||
|
## <summary>
|
||||||
|
## Set the attributes of iptables config files.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`iptables_setattr_config',`
|
||||||
|
gen_require(`
|
||||||
|
type iptables_conf_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_etc($1)
|
||||||
|
allow $1 iptables_conf_t:file setattr;
|
||||||
|
')
|
||||||
|
|
||||||
|
#####################################
|
||||||
|
## <summary>
|
||||||
|
## Read iptables config files.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`iptables_read_config',`
|
||||||
|
gen_require(`
|
||||||
|
type iptables_conf_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_etc($1)
|
||||||
|
allow $1 iptables_conf_t:dir list_dir_perms;
|
||||||
|
read_files_pattern($1, iptables_conf_t, iptables_conf_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
#####################################
|
||||||
|
## <summary>
|
||||||
|
## Create files in /etc with the type used for
|
||||||
|
## the iptables config files.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## The type of the process performing this action.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`iptables_etc_filetrans_config',`
|
||||||
|
gen_require(`
|
||||||
|
type iptables_conf_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_etc_filetrans($1, iptables_conf_t, file)
|
||||||
|
')
|
||||||
|
|
||||||
|
###################################
|
||||||
|
## <summary>
|
||||||
|
## Manage iptables config files.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`iptables_manage_config',`
|
||||||
|
gen_require(`
|
||||||
|
type iptables_conf_t;
|
||||||
|
type etc_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_etc($1)
|
||||||
|
manage_files_pattern($1, iptables_conf_t, iptables_conf_t)
|
||||||
|
')
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
|
|
||||||
policy_module(iptables, 1.10.0)
|
policy_module(iptables, 1.10.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -11,6 +11,12 @@ type iptables_exec_t;
|
||||||
init_system_domain(iptables_t, iptables_exec_t)
|
init_system_domain(iptables_t, iptables_exec_t)
|
||||||
role system_r types iptables_t;
|
role system_r types iptables_t;
|
||||||
|
|
||||||
|
type iptables_initrc_exec_t;
|
||||||
|
init_script_file(iptables_initrc_exec_t)
|
||||||
|
|
||||||
|
type iptables_conf_t;
|
||||||
|
files_config_file(iptables_conf_t)
|
||||||
|
|
||||||
type iptables_tmp_t;
|
type iptables_tmp_t;
|
||||||
files_tmp_file(iptables_tmp_t)
|
files_tmp_file(iptables_tmp_t)
|
||||||
|
|
||||||
|
@ -27,6 +33,9 @@ dontaudit iptables_t self:capability sys_tty_config;
|
||||||
allow iptables_t self:process { sigchld sigkill sigstop signull signal };
|
allow iptables_t self:process { sigchld sigkill sigstop signull signal };
|
||||||
allow iptables_t self:rawip_socket create_socket_perms;
|
allow iptables_t self:rawip_socket create_socket_perms;
|
||||||
|
|
||||||
|
manage_files_pattern(iptables_t, iptables_conf_t, iptables_conf_t)
|
||||||
|
files_etc_filetrans(iptables_t, iptables_conf_t, file)
|
||||||
|
|
||||||
manage_files_pattern(iptables_t, iptables_var_run_t, iptables_var_run_t)
|
manage_files_pattern(iptables_t, iptables_var_run_t, iptables_var_run_t)
|
||||||
files_pid_filetrans(iptables_t, iptables_var_run_t, file)
|
files_pid_filetrans(iptables_t, iptables_var_run_t, file)
|
||||||
|
|
||||||
|
@ -36,6 +45,7 @@ allow iptables_t iptables_tmp_t:dir manage_dir_perms;
|
||||||
allow iptables_t iptables_tmp_t:file manage_file_perms;
|
allow iptables_t iptables_tmp_t:file manage_file_perms;
|
||||||
files_tmp_filetrans(iptables_t, iptables_tmp_t, { file dir })
|
files_tmp_filetrans(iptables_t, iptables_tmp_t, { file dir })
|
||||||
|
|
||||||
|
kernel_request_load_module(iptables_t)
|
||||||
kernel_read_system_state(iptables_t)
|
kernel_read_system_state(iptables_t)
|
||||||
kernel_read_network_state(iptables_t)
|
kernel_read_network_state(iptables_t)
|
||||||
kernel_read_kernel_sysctls(iptables_t)
|
kernel_read_kernel_sysctls(iptables_t)
|
||||||
|
@ -99,6 +109,10 @@ optional_policy(`
|
||||||
ppp_dontaudit_use_fds(iptables_t)
|
ppp_dontaudit_use_fds(iptables_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
psad_rw_tmp_files(iptables_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
rhgb_dontaudit_use_ptys(iptables_t)
|
rhgb_dontaudit_use_ptys(iptables_t)
|
||||||
')
|
')
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
|
|
||||||
/etc/modules\.conf.* -- gen_context(system_u:object_r:modules_conf_t,s0)
|
/etc/modules\.conf.* -- gen_context(system_u:object_r:modules_conf_t,s0)
|
||||||
/etc/modprobe\.conf.* -- gen_context(system_u:object_r:modules_conf_t,s0)
|
/etc/modprobe\.conf.* -- gen_context(system_u:object_r:modules_conf_t,s0)
|
||||||
|
/etc/modprobe\.d(/.*)? gen_context(system_u:object_r:modules_conf_t,s0)
|
||||||
|
|
||||||
ifdef(`distro_gentoo',`
|
ifdef(`distro_gentoo',`
|
||||||
# gentoo init scripts still manage this file
|
# gentoo init scripts still manage this file
|
||||||
|
|
|
@ -1,5 +1,23 @@
|
||||||
## <summary>Policy for kernel module utilities</summary>
|
## <summary>Policy for kernel module utilities</summary>
|
||||||
|
|
||||||
|
######################################
|
||||||
|
## <summary>
|
||||||
|
## Getattr the dependencies of kernel modules.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`modutils_getattr_module_deps',`
|
||||||
|
gen_require(`
|
||||||
|
type modules_dep_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
getattr_files_pattern($1, modules_object_t, modules_dep_t)
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read the dependencies of kernel modules.
|
## Read the dependencies of kernel modules.
|
||||||
|
@ -41,8 +59,8 @@ interface(`modutils_read_module_config',`
|
||||||
files_search_etc($1)
|
files_search_etc($1)
|
||||||
files_search_boot($1)
|
files_search_boot($1)
|
||||||
|
|
||||||
allow $1 modules_conf_t:file read_file_perms;
|
read_files_pattern($1, modules_conf_t, modules_conf_t)
|
||||||
allow $1 modules_conf_t:lnk_file read_lnk_file_perms;
|
read_lnk_files_pattern($1, modules_conf_t, modules_conf_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -61,7 +79,7 @@ interface(`modutils_rename_module_config',`
|
||||||
type modules_conf_t;
|
type modules_conf_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
allow $1 modules_conf_t:file rename_file_perms;
|
rename_files_pattern($1, modules_conf_t, modules_conf_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -80,7 +98,26 @@ interface(`modutils_delete_module_config',`
|
||||||
type modules_conf_t;
|
type modules_conf_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
allow $1 modules_conf_t:file unlink;
|
delete_files_pattern($1, modules_conf_t, modules_conf_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Manage files with the configuration options used when
|
||||||
|
## loading modules.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`modutils_manage_module_config',`
|
||||||
|
gen_require(`
|
||||||
|
type modules_conf_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
manage_files_pattern($1, modules_conf_t, modules_conf_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
|
|
||||||
policy_module(modutils, 1.9.0)
|
policy_module(modutils, 1.9.1)
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
bool secure_mode_insmod;
|
bool secure_mode_insmod;
|
||||||
|
@ -45,7 +45,7 @@ files_tmp_file(update_modules_tmp_t)
|
||||||
can_exec(depmod_t, depmod_exec_t)
|
can_exec(depmod_t, depmod_exec_t)
|
||||||
|
|
||||||
# Read conf.modules.
|
# Read conf.modules.
|
||||||
allow depmod_t modules_conf_t:file read_file_perms;
|
read_files_pattern(depmod_t, modules_conf_t, modules_conf_t)
|
||||||
|
|
||||||
allow depmod_t modules_dep_t:file manage_file_perms;
|
allow depmod_t modules_dep_t:file manage_file_perms;
|
||||||
files_kernel_modules_filetrans(depmod_t, modules_dep_t, file)
|
files_kernel_modules_filetrans(depmod_t, modules_dep_t, file)
|
||||||
|
@ -82,8 +82,22 @@ ifdef(`distro_ubuntu',`
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
|
tunable_policy(`use_nfs_home_dirs',`
|
||||||
|
fs_read_nfs_files(depmod_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
tunable_policy(`use_samba_home_dirs',`
|
||||||
|
fs_read_cifs_files(depmod_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
rpm_rw_pipes(depmod_t)
|
rpm_rw_pipes(depmod_t)
|
||||||
|
rpm_manage_script_tmp_files(depmod_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
# Read System.map from home directories.
|
||||||
|
unconfined_domain(depmod_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -91,19 +105,23 @@ optional_policy(`
|
||||||
# insmod local policy
|
# insmod local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
allow insmod_t self:capability { dac_override net_raw sys_tty_config };
|
allow insmod_t self:capability { dac_override net_raw sys_nice sys_tty_config };
|
||||||
allow insmod_t self:process { execmem sigchld sigkill sigstop signull signal };
|
allow insmod_t self:process { execmem sigchld sigkill sigstop signull signal };
|
||||||
|
|
||||||
allow insmod_t self:udp_socket create_socket_perms;
|
allow insmod_t self:udp_socket create_socket_perms;
|
||||||
allow insmod_t self:rawip_socket create_socket_perms;
|
allow insmod_t self:rawip_socket create_socket_perms;
|
||||||
|
|
||||||
# Read module config and dependency information
|
# Read module config and dependency information
|
||||||
allow insmod_t { modules_conf_t modules_dep_t }:file read_file_perms;
|
list_dirs_pattern(insmod_t, modules_conf_t, modules_conf_t)
|
||||||
|
read_files_pattern(insmod_t, modules_conf_t, modules_conf_t)
|
||||||
|
list_dirs_pattern(insmod_t, modules_dep_t, modules_dep_t)
|
||||||
|
read_files_pattern(insmod_t, modules_dep_t, modules_dep_t)
|
||||||
|
|
||||||
can_exec(insmod_t, insmod_exec_t)
|
can_exec(insmod_t, insmod_exec_t)
|
||||||
|
|
||||||
kernel_load_module(insmod_t)
|
kernel_load_module(insmod_t)
|
||||||
kernel_read_system_state(insmod_t)
|
kernel_read_system_state(insmod_t)
|
||||||
|
kernel_read_network_state(insmod_t)
|
||||||
kernel_write_proc_files(insmod_t)
|
kernel_write_proc_files(insmod_t)
|
||||||
kernel_mount_debugfs(insmod_t)
|
kernel_mount_debugfs(insmod_t)
|
||||||
kernel_mount_kvmfs(insmod_t)
|
kernel_mount_kvmfs(insmod_t)
|
||||||
|
@ -112,6 +130,7 @@ kernel_read_debugfs(insmod_t)
|
||||||
kernel_read_kernel_sysctls(insmod_t)
|
kernel_read_kernel_sysctls(insmod_t)
|
||||||
kernel_rw_kernel_sysctl(insmod_t)
|
kernel_rw_kernel_sysctl(insmod_t)
|
||||||
kernel_read_hotplug_sysctls(insmod_t)
|
kernel_read_hotplug_sysctls(insmod_t)
|
||||||
|
kernel_setsched(insmod_t)
|
||||||
|
|
||||||
corecmd_exec_bin(insmod_t)
|
corecmd_exec_bin(insmod_t)
|
||||||
corecmd_exec_shell(insmod_t)
|
corecmd_exec_shell(insmod_t)
|
||||||
|
@ -124,9 +143,6 @@ dev_rw_agp(insmod_t)
|
||||||
dev_read_sound(insmod_t)
|
dev_read_sound(insmod_t)
|
||||||
dev_write_sound(insmod_t)
|
dev_write_sound(insmod_t)
|
||||||
dev_rw_apm_bios(insmod_t)
|
dev_rw_apm_bios(insmod_t)
|
||||||
# cjp: why is this needed? insmod cannot mounton any dir
|
|
||||||
# and it also transitions to mount
|
|
||||||
dev_mount_usbfs(insmod_t)
|
|
||||||
|
|
||||||
domain_signal_all_domains(insmod_t)
|
domain_signal_all_domains(insmod_t)
|
||||||
domain_use_interactive_fds(insmod_t)
|
domain_use_interactive_fds(insmod_t)
|
||||||
|
@ -159,16 +175,25 @@ seutil_read_file_contexts(insmod_t)
|
||||||
|
|
||||||
userdom_use_user_terminals(insmod_t)
|
userdom_use_user_terminals(insmod_t)
|
||||||
|
|
||||||
ifdef(`distro_ubuntu',`
|
userdom_dontaudit_search_user_home_dirs(insmod_t)
|
||||||
optional_policy(`
|
|
||||||
unconfined_domain(insmod_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
|
||||||
if( ! secure_mode_insmod ) {
|
if( ! secure_mode_insmod ) {
|
||||||
kernel_domtrans_to(insmod_t, insmod_exec_t)
|
kernel_domtrans_to(insmod_t, insmod_exec_t)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
alsa_domtrans(insmod_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
firstboot_dontaudit_rw_pipes(insmod_t)
|
||||||
|
firstboot_dontaudit_rw_stream_sockets(insmod_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
hal_write_log(insmod_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
hotplug_search_config(insmod_t)
|
hotplug_search_config(insmod_t)
|
||||||
')
|
')
|
||||||
|
@ -205,7 +230,7 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
unconfined_dontaudit_rw_pipes(insmod_t)
|
unconfined_domain(insmod_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
@ -228,7 +253,7 @@ can_exec(update_modules_t, insmod_exec_t)
|
||||||
can_exec(update_modules_t, update_modules_exec_t)
|
can_exec(update_modules_t, update_modules_exec_t)
|
||||||
|
|
||||||
# manage module loading configuration
|
# manage module loading configuration
|
||||||
allow update_modules_t modules_conf_t:file manage_file_perms;
|
manage_files_pattern(update_modules_t, modules_conf_t, modules_conf_t)
|
||||||
files_kernel_modules_filetrans(update_modules_t, modules_conf_t, file)
|
files_kernel_modules_filetrans(update_modules_t, modules_conf_t, file)
|
||||||
files_etc_filetrans(update_modules_t, modules_conf_t, file)
|
files_etc_filetrans(update_modules_t, modules_conf_t, file)
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue