selinux-refpolicy/policy/modules/services/ucspitcp.te

88 lines
2.2 KiB
Plaintext

policy_module(ucspitcp)
########################################
#
# Declarations
#
type rblsmtpd_t;
type rblsmtpd_exec_t;
init_system_domain(rblsmtpd_t, rblsmtpd_exec_t)
type ucspitcp_t;
type ucspitcp_exec_t;
init_system_domain(ucspitcp_t, ucspitcp_exec_t)
########################################
#
# Smtpd local policy
#
ucspitcp_service_domain(rblsmtpd_t, rblsmtpd_exec_t)
corecmd_search_bin(rblsmtpd_t)
corenet_all_recvfrom_netlabel(rblsmtpd_t)
corenet_tcp_sendrecv_generic_if(rblsmtpd_t)
corenet_udp_sendrecv_generic_if(rblsmtpd_t)
corenet_tcp_sendrecv_generic_node(rblsmtpd_t)
corenet_udp_sendrecv_generic_node(rblsmtpd_t)
corenet_tcp_bind_generic_node(rblsmtpd_t)
corenet_udp_bind_generic_port(rblsmtpd_t)
files_read_etc_files(rblsmtpd_t)
files_search_var(rblsmtpd_t)
optional_policy(`
daemontools_ipc_domain(rblsmtpd_t)
')
########################################
#
# Tcp local policy
#
allow ucspitcp_t self:capability { setgid setuid };
allow ucspitcp_t self:fifo_file rw_fifo_file_perms;
allow ucspitcp_t self:tcp_socket create_stream_socket_perms;
allow ucspitcp_t self:udp_socket create_socket_perms;
corecmd_search_bin(ucspitcp_t)
corenet_all_recvfrom_netlabel(ucspitcp_t)
corenet_tcp_sendrecv_generic_if(ucspitcp_t)
corenet_udp_sendrecv_generic_if(ucspitcp_t)
corenet_tcp_sendrecv_generic_node(ucspitcp_t)
corenet_udp_sendrecv_generic_node(ucspitcp_t)
corenet_tcp_bind_generic_node(ucspitcp_t)
corenet_udp_bind_generic_node(ucspitcp_t)
corenet_sendrecv_ftp_server_packets(ucspitcp_t)
corenet_tcp_bind_ftp_port(ucspitcp_t)
corenet_sendrecv_ftp_data_server_packets(ucspitcp_t)
corenet_tcp_bind_ftp_data_port(ucspitcp_t)
corenet_sendrecv_http_server_packets(ucspitcp_t)
corenet_tcp_bind_http_port(ucspitcp_t)
corenet_sendrecv_smtp_server_packets(ucspitcp_t)
corenet_tcp_bind_smtp_port(ucspitcp_t)
corenet_sendrecv_dns_server_packets(ucspitcp_t)
corenet_tcp_bind_dns_port(ucspitcp_t)
corenet_udp_bind_dns_port(ucspitcp_t)
corenet_sendrecv_generic_server_packets(ucspitcp_t)
corenet_udp_bind_generic_port(ucspitcp_t)
files_read_etc_files(ucspitcp_t)
files_search_var(ucspitcp_t)
sysnet_read_config(ucspitcp_t)
optional_policy(`
daemontools_service_domain(ucspitcp_t, ucspitcp_exec_t)
daemontools_read_svc(ucspitcp_t)
')