## Policy for Mozilla and related web browsers. ######################################## ## ## Role access for mozilla. ## ## ## ## Role allowed access. ## ## ## ## ## User domain for the role. ## ## # interface(`mozilla_role',` gen_require(` type mozilla_t, mozilla_exec_t, mozilla_home_t; type mozilla_tmp_t, mozilla_tmpfs_t, mozilla_plugin_tmp_t; type mozilla_plugin_tmpfs_t, mozilla_plugin_home_t; attribute_role mozilla_roles; ') ######################################## # # Declarations # roleattribute $1 mozilla_roles; ######################################## # # Policy # domtrans_pattern($2, mozilla_exec_t, mozilla_t) allow $2 mozilla_t:process { noatsecure siginh rlimitinh ptrace signal_perms }; ps_process_pattern($2, mozilla_t) allow mozilla_t $2:process signull; allow mozilla_t $2:unix_stream_socket connectto; allow $2 mozilla_t:fd use; allow $2 mozilla_t:shm rw_shm_perms; stream_connect_pattern($2, mozilla_tmpfs_t, mozilla_tmpfs_t, mozilla_t) allow $2 { mozilla_home_t mozilla_plugin_home_t }:dir { manage_dir_perms relabel_dir_perms }; allow $2 { mozilla_home_t mozilla_plugin_home_t }:file { manage_file_perms relabel_file_perms }; allow $2 mozilla_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms }; userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".galeon") userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".mozilla") userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".netscape") userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".phoenix") filetrans_pattern($2, mozilla_home_t, mozilla_plugin_home_t, dir, "plugins") allow $2 { mozilla_tmp_t mozilla_plugin_tmp_t }:dir { manage_dir_perms relabel_dir_perms }; allow $2 { mozilla_tmp_t mozilla_plugin_tmp_t }:file { manage_file_perms relabel_file_perms }; allow $2 mozilla_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms }; allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:dir { manage_dir_perms relabel_dir_perms }; allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:file { manage_file_perms relabel_file_perms }; allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms }; allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms }; optional_policy(` mozilla_dbus_chat($2) ') ') ######################################## ## ## Role access for mozilla plugin. ## ## ## ## Role allowed access. ## ## ## ## ## User domain for the role. ## ## # interface(`mozilla_role_plugin',` gen_require(` type mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t; type mozilla_plugin_rw_t, mozilla_plugin_config_t, mozilla_home_t; ') mozilla_run_plugin($2, $1) mozilla_run_plugin_config($2, $1) allow $2 { mozilla_plugin_t mozilla_plugin_config_t }:process { ptrace signal_perms }; ps_process_pattern($2, { mozilla_plugin_t mozilla_plugin_config_t }) allow $2 mozilla_plugin_t:unix_stream_socket rw_socket_perms; allow $2 mozilla_plugin_t:fd use; stream_connect_pattern($2, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t) allow mozilla_plugin_t $2:process signull; allow mozilla_plugin_t $2:unix_stream_socket { connectto rw_socket_perms }; allow mozilla_plugin_t $2:unix_dgram_socket { sendto rw_socket_perms }; allow mozilla_plugin_t $2:shm { rw_shm_perms destroy }; allow mozilla_plugin_t $2:sem create_sem_perms; allow $2 mozilla_home_t:dir { manage_dir_perms relabel_dir_perms }; allow $2 mozilla_home_t:file { manage_file_perms relabel_file_perms }; allow $2 mozilla_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms }; userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".galeon") userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".mozilla") userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".netscape") userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".phoenix") allow $2 mozilla_plugin_tmp_t:dir { manage_dir_perms relabel_dir_perms }; allow $2 mozilla_plugin_tmp_t:file { manage_file_perms relabel_file_perms }; allow $2 mozilla_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms }; allow $2 mozilla_plugin_tmpfs_t:dir { manage_dir_perms relabel_dir_perms }; allow $2 mozilla_plugin_tmpfs_t:file { manage_file_perms relabel_file_perms }; allow $2 mozilla_plugin_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms }; allow $2 mozilla_plugin_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms }; allow $2 mozilla_plugin_rw_t:dir list_dir_perms; allow $2 mozilla_plugin_rw_t:file read_file_perms; allow $2 mozilla_plugin_rw_t:lnk_file read_lnk_file_perms; can_exec($2, mozilla_plugin_rw_t) optional_policy(` mozilla_dbus_chat_plugin($2) ') ') ######################################## ## ## Read mozilla home directory content. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_read_user_home_files',` gen_require(` type mozilla_home_t; ') userdom_search_user_home_dirs($1) allow $1 mozilla_home_t:dir list_dir_perms; allow $1 mozilla_home_t:file read_file_perms; allow $1 mozilla_home_t:lnk_file read_lnk_file_perms; ') ######################################## ## ## Write mozilla home directory files. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_write_user_home_files',` gen_require(` type mozilla_home_t; ') userdom_search_user_home_dirs($1) write_files_pattern($1, mozilla_home_t, mozilla_home_t) ') ######################################## ## ## Do not audit attempts to read and ## write mozilla home directory files. ## ## ## ## Domain to not audit. ## ## # interface(`mozilla_dontaudit_rw_user_home_files',` gen_require(` type mozilla_home_t; ') dontaudit $1 mozilla_home_t:file rw_file_perms; ') ######################################## ## ## Do not audit attempt to Create, ## read, write, and delete mozilla ## home directory content. ## ## ## ## Domain to not audit. ## ## # interface(`mozilla_dontaudit_manage_user_home_files',` gen_require(` type mozilla_home_t; ') dontaudit $1 mozilla_home_t:dir manage_dir_perms; dontaudit $1 mozilla_home_t:file manage_file_perms; dontaudit $1 mozilla_home_t:lnk_file manage_lnk_file_perms; ') ######################################## ## ## Execute mozilla plugin home directory files. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_exec_user_plugin_home_files',` gen_require(` type mozilla_home_t, mozilla_plugin_home_t; ') userdom_search_user_home_dirs($1) exec_files_pattern($1, { mozilla_home_t mozilla_plugin_home_t }, mozilla_plugin_home_t) ') ######################################## ## ## Mozilla plugin home directory file ## text relocation. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_execmod_user_plugin_home_files',` gen_require(` type mozilla_plugin_home_t; ') allow $1 mozilla_plugin_home_t:file execmod; ') ####################################### ## ## Read temporary mozilla files. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_read_tmp_files',` gen_require(` type mozilla_tmp_t; ') read_files_pattern($1, mozilla_tmp_t, mozilla_tmp_t) ') ######################################## ## ## Run mozilla in the mozilla domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`mozilla_domtrans',` gen_require(` type mozilla_t, mozilla_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, mozilla_exec_t, mozilla_t) ') ######################################## ## ## Execute a domain transition to ## run mozilla plugin. ## ## ## ## Domain allowed to transition. ## ## # interface(`mozilla_domtrans_plugin',` gen_require(` type mozilla_plugin_t, mozilla_plugin_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, mozilla_plugin_exec_t, mozilla_plugin_t) ') ######################################## ## ## Execute mozilla plugin in the ## mozilla plugin domain, and allow ## the specified role the mozilla ## plugin domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## # interface(`mozilla_run_plugin',` gen_require(` attribute_role mozilla_plugin_roles; ') mozilla_domtrans_plugin($1) roleattribute $2 mozilla_plugin_roles; ') ######################################## ## ## Execute a domain transition to ## run mozilla plugin config. ## ## ## ## Domain allowed to transition. ## ## # interface(`mozilla_domtrans_plugin_config',` gen_require(` type mozilla_plugin_config_t, mozilla_plugin_config_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, mozilla_plugin_config_exec_t, mozilla_plugin_config_t) ') ######################################## ## ## Execute mozilla plugin config in ## the mozilla plugin config domain, ## and allow the specified role the ## mozilla plugin config domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## # interface(`mozilla_run_plugin_config',` gen_require(` attribute_role mozilla_plugin_config_roles; ') mozilla_domtrans_plugin_config($1) roleattribute $2 mozilla_plugin_config_roles; ') ######################################## ## ## Send and receive messages from ## mozilla over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_dbus_chat',` gen_require(` type mozilla_t; class dbus send_msg; ') allow $1 mozilla_t:dbus send_msg; allow mozilla_t $1:dbus send_msg; ') ######################################## ## ## Send and receive messages from ## mozilla plugin over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_dbus_chat_plugin',` gen_require(` type mozilla_plugin_t; class dbus send_msg; ') allow $1 mozilla_plugin_t:dbus send_msg; allow mozilla_plugin_t $1:dbus send_msg; ') ######################################## ## ## Read and write mozilla TCP sockets. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_rw_tcp_sockets',` gen_require(` type mozilla_t; ') allow $1 mozilla_t:tcp_socket rw_socket_perms; ') ######################################## ## ## Create, read, write, and delete ## mozilla plugin rw files. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_manage_plugin_rw_files',` gen_require(` type mozilla_plugin_rw_t; ') libs_search_lib($1) manage_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t) ') ######################################## ## ## Read mozilla_plugin tmpfs files. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_plugin_read_tmpfs_files',` gen_require(` type mozilla_plugin_tmpfs_t; ') fs_search_tmpfs($1) allow $1 mozilla_plugin_tmpfs_t:file read_file_perms; ') ######################################## ## ## Delete mozilla_plugin tmpfs files. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_plugin_delete_tmpfs_files',` gen_require(` type mozilla_plugin_tmpfs_t; ') fs_search_tmpfs($1) allow $1 mozilla_plugin_tmpfs_t:file delete_file_perms; ') ######################################## ## ## Create, read, write, and delete ## generic mozilla plugin home content. ## ## ## ## Domain allowed access. ## ## # interface(`mozilla_manage_generic_plugin_home_content',` gen_require(` type mozilla_plugin_home_t; ') userdom_search_user_home_dirs($1) allow $1 mozilla_plugin_home_t:dir manage_dir_perms; allow $1 mozilla_plugin_home_t:file manage_file_perms; allow $1 mozilla_plugin_home_t:fifo_file manage_fifo_file_perms; allow $1 mozilla_plugin_home_t:lnk_file manage_lnk_file_perms; allow $1 mozilla_plugin_home_t:sock_file manage_sock_file_perms; ') ######################################## ## ## Create objects in user home ## directories with the generic mozilla ## plugin home type. ## ## ## ## Domain allowed access. ## ## ## ## ## Class of the object being created. ## ## ## ## ## The name of the object being created. ## ## # interface(`mozilla_home_filetrans_plugin_home',` gen_require(` type mozilla_plugin_home_t; ') userdom_user_home_dir_filetrans($1, mozilla_plugin_home_t, $2, $3) ')