## Layer 2 Tunneling Protocol. ######################################## ## ## Send to l2tpd with a unix ## domain dgram socket. ## ## ## ## Domain allowed access. ## ## # interface(`l2tpd_dgram_send',` gen_require(` type l2tpd_t, l2tpd_tmp_t, l2tpd_runtime_t; ') files_search_runtime($1) files_search_tmp($1) dgram_send_pattern($1, { l2tpd_tmp_t l2tpd_runtime_t }, { l2tpd_tmp_t l2tpd_runtime_t }, l2tpd_t) ') ######################################## ## ## Read and write l2tpd sockets. ## ## ## ## Domain allowed access. ## ## # interface(`l2tpd_rw_socket',` gen_require(` type l2tpd_t; ') allow $1 l2tpd_t:socket rw_socket_perms; ') ##################################### ## ## Connect to l2tpd with a unix ## domain stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`l2tpd_stream_connect',` gen_require(` type l2tpd_t, l2tpd_runtime_t, l2tpd_tmp_t; ') files_search_runtime($1) files_search_tmp($1) stream_connect_pattern($1, { l2tpd_tmp_t l2tpd_runtime_t }, { l2tpd_tmp_t l2tpd_runtime_t }, l2tpd_t) ') ######################################## ## ## All of the rules required to ## administrate an l2tp environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`l2tp_admin',` gen_require(` type l2tpd_t, l2tpd_initrc_exec_t, l2tpd_runtime_t; type l2tp_conf_t, l2tpd_tmp_t; ') allow $1 l2tpd_t:process { ptrace signal_perms }; ps_process_pattern($1, l2tpd_t) init_startstop_service($1, $2, l2tpd_t, l2tpd_initrc_exec_t) files_search_etc($1) admin_pattern($1, l2tp_conf_t) files_search_runtime($1) admin_pattern($1, l2tpd_runtime_t) files_search_tmp($1) admin_pattern($1, l2tpd_tmp_t) ')