## SMB and CIFS client/server programs. ######################################## ## ## Execute nmbd in the nmbd domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`samba_domtrans_nmbd',` gen_require(` type nmbd_t, nmbd_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, nmbd_exec_t, nmbd_t) ') ####################################### ## ## Send generic signals to nmbd. ## ## ## ## Domain allowed access. ## ## # interface(`samba_signal_nmbd',` gen_require(` type nmbd_t; ') allow $1 nmbd_t:process signal; ') ######################################## ## ## Connect to nmbd with a unix domain ## stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`samba_stream_connect_nmbd',` gen_require(` type samba_var_t, nmbd_t, samba_runtime_t; ') files_search_runtime($1) stream_connect_pattern($1, { samba_runtime_t samba_var_t }, samba_runtime_t, nmbd_t) ') ######################################## ## ## Execute samba init scripts in ## the init script domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`samba_initrc_domtrans',` gen_require(` type samba_initrc_exec_t; ') init_labeled_script_domtrans($1, samba_initrc_exec_t) ') ######################################## ## ## Execute samba net in the samba net domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`samba_domtrans_net',` gen_require(` type samba_net_t, samba_net_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, samba_net_exec_t, samba_net_t) ') ######################################## ## ## Execute samba net in the samba net ## domain, and allow the specified ## role the samba net domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## ## # interface(`samba_run_net',` gen_require(` attribute_role samba_net_roles; ') samba_domtrans_net($1) roleattribute $2 samba_net_roles; ') ######################################## ## ## Execute smbmount in the smbmount domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`samba_domtrans_smbmount',` gen_require(` type smbmount_t, smbmount_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, smbmount_exec_t, smbmount_t) ') ######################################## ## ## Execute smbmount in the smbmount ## domain, and allow the specified ## role the smbmount domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## ## # interface(`samba_run_smbmount',` gen_require(` attribute_role smbmount_roles; ') samba_domtrans_smbmount($1) roleattribute $2 smbmount_roles; ') ######################################## ## ## Read samba configuration files. ## ## ## ## Domain allowed access. ## ## ## # interface(`samba_read_config',` gen_require(` type samba_etc_t; ') files_search_etc($1) read_files_pattern($1, samba_etc_t, samba_etc_t) ') ######################################## ## ## Read and write samba configuration files. ## ## ## ## Domain allowed access. ## ## ## # interface(`samba_rw_config',` gen_require(` type samba_etc_t; ') files_search_etc($1) rw_files_pattern($1, samba_etc_t, samba_etc_t) ') ######################################## ## ## Create, read, write, and delete ## samba configuration files. ## ## ## ## Domain allowed access. ## ## ## # interface(`samba_manage_config',` gen_require(` type samba_etc_t; ') files_search_etc($1) manage_dirs_pattern($1, samba_etc_t, samba_etc_t) manage_files_pattern($1, samba_etc_t, samba_etc_t) ') ######################################## ## ## Read samba log files. ## ## ## ## Domain allowed access. ## ## ## # interface(`samba_read_log',` gen_require(` type samba_log_t; ') logging_search_logs($1) allow $1 samba_log_t:dir list_dir_perms; read_files_pattern($1, samba_log_t, samba_log_t) ') ######################################## ## ## Append to samba log files. ## ## ## ## Domain allowed access. ## ## ## # interface(`samba_append_log',` gen_require(` type samba_log_t; ') logging_search_logs($1) allow $1 samba_log_t:dir list_dir_perms; allow $1 samba_log_t:file append_file_perms; ') ######################################## ## ## Execute samba log files in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`samba_exec_log',` gen_require(` type samba_log_t; ') logging_search_logs($1) can_exec($1, samba_log_t) ') ######################################## ## ## Read samba secret files. ## ## ## ## Domain allowed access. ## ## # interface(`samba_read_secrets',` gen_require(` type samba_secrets_t; ') files_search_etc($1) allow $1 samba_secrets_t:file read_file_perms; ') ######################################## ## ## Read samba share files. ## ## ## ## Domain allowed access. ## ## # interface(`samba_read_share_files',` gen_require(` type samba_share_t; ') allow $1 samba_share_t:filesystem getattr; read_files_pattern($1, samba_share_t, samba_share_t) ') ######################################## ## ## start samba daemon ## ## ## ## Domain allowed access. ## ## # interface(`samba_start',` gen_require(` type samba_unit_t; class service start; ') allow $1 samba_unit_t:file getattr; allow $1 samba_unit_t:service start; ') ######################################## ## ## stop samba daemon ## ## ## ## Domain allowed access. ## ## # interface(`samba_stop',` gen_require(` type samba_unit_t; class service stop; ') allow $1 samba_unit_t:file getattr; allow $1 samba_unit_t:service stop; ') ######################################## ## ## get status of samba daemon ## ## ## ## Domain allowed access. ## ## # interface(`samba_status',` gen_require(` type samba_unit_t; class service status; ') allow $1 samba_unit_t:file getattr; allow $1 samba_unit_t:service status; ') ######################################## ## ## reload samba daemon ## ## ## ## Domain allowed access. ## ## # interface(`samba_reload',` gen_require(` type samba_unit_t; class service reload; ') allow $1 samba_unit_t:file getattr; allow $1 samba_unit_t:service reload; ') ######################################## ## ## Search samba var directories. ## ## ## ## Domain allowed access. ## ## # interface(`samba_search_var',` gen_require(` type samba_var_t; ') files_search_var_lib($1) allow $1 samba_var_t:dir search_dir_perms; ') ######################################## ## ## Read samba var files. ## ## ## ## Domain allowed access. ## ## # interface(`samba_read_var_files',` gen_require(` type samba_var_t; ') files_search_var_lib($1) read_files_pattern($1, samba_var_t, samba_var_t) ') ######################################## ## ## Do not audit attempts to write ## samba var files. ## ## ## ## Domain to not audit. ## ## # interface(`samba_dontaudit_write_var_files',` gen_require(` type samba_var_t; ') dontaudit $1 samba_var_t:file write; ') ######################################## ## ## Read and write samba var files. ## ## ## ## Domain allowed access. ## ## # interface(`samba_rw_var_files',` gen_require(` type samba_var_t; ') files_search_var_lib($1) rw_files_pattern($1, samba_var_t, samba_var_t) ') ######################################## ## ## Create, read, write, and delete ## samba var files. ## ## ## ## Domain allowed access. ## ## # interface(`samba_manage_var_files',` gen_require(` type samba_var_t; ') files_search_var_lib($1) manage_files_pattern($1, samba_var_t, samba_var_t) ') ######################################## ## ## Execute smbcontrol in the smbcontrol domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`samba_domtrans_smbcontrol',` gen_require(` type smbcontrol_t, smbcontrol_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, smbcontrol_exec_t, smbcontrol_t) ') ######################################## ## ## Execute smbcontrol in the smbcontrol ## domain, and allow the specified ## role the smbcontrol domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## # interface(`samba_run_smbcontrol',` gen_require(` attribute_role smbcontrol_roles; ') samba_domtrans_smbcontrol($1) roleattribute $2 smbcontrol_roles; ') ######################################## ## ## Execute smbd in the smbd domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`samba_domtrans_smbd',` gen_require(` type smbd_t, smbd_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, smbd_exec_t, smbd_t) ') ###################################### ## ## Send generic signals to smbd. ## ## ## ## Domain allowed access. ## ## # interface(`samba_signal_smbd',` gen_require(` type smbd_t; ') allow $1 smbd_t:process signal; ') ######################################## ## ## Do not audit attempts to inherit ## and use smbd file descriptors. ## ## ## ## Domain to not audit. ## ## # interface(`samba_dontaudit_use_fds',` gen_require(` type smbd_t; ') dontaudit $1 smbd_t:fd use; ') ######################################## ## ## Write smbmount tcp sockets. ## ## ## ## Domain allowed access. ## ## # interface(`samba_write_smbmount_tcp_sockets',` gen_require(` type smbmount_t; ') allow $1 smbmount_t:tcp_socket write; ') ######################################## ## ## Read and write smbmount tcp sockets. ## ## ## ## Domain allowed access. ## ## # interface(`samba_rw_smbmount_tcp_sockets',` gen_require(` type smbmount_t; ') allow $1 smbmount_t:tcp_socket { read write }; ') ######################################## ## ## Execute winbind helper in the ## winbind helper domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`samba_domtrans_winbind_helper',` gen_require(` type winbind_helper_t, winbind_helper_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, winbind_helper_exec_t, winbind_helper_t) ') ####################################### ## ## Get attributes of winbind executable files. ## ## ## ## Domain allowed access. ## ## # interface(`samba_getattr_winbind_exec',` gen_require(` type winbind_exec_t; ') allow $1 winbind_exec_t:file getattr_file_perms; ') ######################################## ## ## Execute winbind helper in the winbind ## helper domain, and allow the specified ## role the winbind helper domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## ## # interface(`samba_run_winbind_helper',` gen_require(` attribute_role winbind_helper_roles; ') samba_domtrans_winbind_helper($1) roleattribute $2 winbind_helper_roles; ') ######################################## ## ## Read winbind pid files. (Deprecated) ## ## ## ## Domain allowed access. ## ## # interface(`samba_read_winbind_pid',` refpolicywarn(`$0($*) has been deprecated, please use samba_read_winbind_runtime_files() instead.') samba_read_winbind_runtime_files($1) ') ######################################## ## ## Read winbind runtime files. ## ## ## ## Domain allowed access. ## ## # interface(`samba_read_winbind_runtime_files',` gen_require(` type winbind_runtime_t, samba_runtime_t; ') files_search_runtime($1) read_files_pattern($1, { samba_runtime_t winbind_runtime_t }, winbind_runtime_t) ') ######################################## ## ## Connect to winbind with a unix ## domain stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`samba_stream_connect_winbind',` gen_require(` type samba_var_t, winbind_t, winbind_runtime_t, samba_runtime_t; ') files_search_runtime($1) stream_connect_pattern($1, { samba_runtime_t samba_var_t winbind_runtime_t }, winbind_runtime_t, winbind_t) ') ######################################## ## ## All of the rules required to ## administrate an samba environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`samba_admin',` gen_require(` type nmbd_t, samba_runtime_t; type smbd_t, smbd_tmp_t; type samba_log_t, samba_var_t, samba_secrets_t; type samba_etc_t, samba_share_t, samba_initrc_exec_t; type swat_runtime_t, swat_tmp_t, winbind_log_t; type winbind_runtime_t, winbind_tmp_t; type smbd_keytab_t; ') allow $1 { nmbd_t smbd_t }:process { ptrace signal_perms }; ps_process_pattern($1, { nmbd_t smbd_t }) init_startstop_service($1, $2, samba_t, samba_initrc_exec_t) files_list_etc($1) admin_pattern($1, { samba_etc_t smbd_keytab_t }) logging_list_logs($1) admin_pattern($1, { samba_log_t winbind_log_t }) files_list_var($1) admin_pattern($1, { samba_share_t samba_var_t samba_secrets_t }) files_list_spool($1) files_list_runtime($1) admin_pattern($1, { winbind_runtime_t samba_runtime_t swat_runtime_t }) files_list_tmp($1) admin_pattern($1, { swat_tmp_t smbd_tmp_t winbind_tmp_t }) ')