policy_module(ucspitcp) ######################################## # # Declarations # type rblsmtpd_t; type rblsmtpd_exec_t; init_system_domain(rblsmtpd_t, rblsmtpd_exec_t) type ucspitcp_t; type ucspitcp_exec_t; init_system_domain(ucspitcp_t, ucspitcp_exec_t) ######################################## # # Smtpd local policy # ucspitcp_service_domain(rblsmtpd_t, rblsmtpd_exec_t) corecmd_search_bin(rblsmtpd_t) corenet_all_recvfrom_netlabel(rblsmtpd_t) corenet_tcp_sendrecv_generic_if(rblsmtpd_t) corenet_udp_sendrecv_generic_if(rblsmtpd_t) corenet_tcp_sendrecv_generic_node(rblsmtpd_t) corenet_udp_sendrecv_generic_node(rblsmtpd_t) corenet_tcp_bind_generic_node(rblsmtpd_t) corenet_udp_bind_generic_port(rblsmtpd_t) files_read_etc_files(rblsmtpd_t) files_search_var(rblsmtpd_t) optional_policy(` daemontools_ipc_domain(rblsmtpd_t) ') ######################################## # # Tcp local policy # allow ucspitcp_t self:capability { setgid setuid }; allow ucspitcp_t self:fifo_file rw_fifo_file_perms; allow ucspitcp_t self:tcp_socket create_stream_socket_perms; allow ucspitcp_t self:udp_socket create_socket_perms; corecmd_search_bin(ucspitcp_t) corenet_all_recvfrom_netlabel(ucspitcp_t) corenet_tcp_sendrecv_generic_if(ucspitcp_t) corenet_udp_sendrecv_generic_if(ucspitcp_t) corenet_tcp_sendrecv_generic_node(ucspitcp_t) corenet_udp_sendrecv_generic_node(ucspitcp_t) corenet_tcp_bind_generic_node(ucspitcp_t) corenet_udp_bind_generic_node(ucspitcp_t) corenet_sendrecv_ftp_server_packets(ucspitcp_t) corenet_tcp_bind_ftp_port(ucspitcp_t) corenet_sendrecv_ftp_data_server_packets(ucspitcp_t) corenet_tcp_bind_ftp_data_port(ucspitcp_t) corenet_sendrecv_http_server_packets(ucspitcp_t) corenet_tcp_bind_http_port(ucspitcp_t) corenet_sendrecv_smtp_server_packets(ucspitcp_t) corenet_tcp_bind_smtp_port(ucspitcp_t) corenet_sendrecv_dns_server_packets(ucspitcp_t) corenet_tcp_bind_dns_port(ucspitcp_t) corenet_udp_bind_dns_port(ucspitcp_t) corenet_sendrecv_generic_server_packets(ucspitcp_t) corenet_udp_bind_generic_port(ucspitcp_t) files_read_etc_files(ucspitcp_t) files_search_var(ucspitcp_t) sysnet_read_config(ucspitcp_t) optional_policy(` daemontools_service_domain(ucspitcp_t, ucspitcp_exec_t) daemontools_read_svc(ucspitcp_t) ')