## Name service cache daemon. ######################################## ## ## Send generic signals to nscd. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_signal',` gen_require(` type nscd_t; ') allow $1 nscd_t:process signal; ') ######################################## ## ## Send kill signals to nscd. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_kill',` gen_require(` type nscd_t; ') allow $1 nscd_t:process sigkill; ') ######################################## ## ## Send null signals to nscd. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_signull',` gen_require(` type nscd_t; ') allow $1 nscd_t:process signull; ') ######################################## ## ## Execute nscd in the nscd domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`nscd_domtrans',` gen_require(` type nscd_t, nscd_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, nscd_exec_t, nscd_t) ') ######################################## ## ## Execute nscd in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_exec',` gen_require(` type nscd_exec_t; ') corecmd_search_bin($1) can_exec($1, nscd_exec_t) ') ######################################## ## ## Use nscd services by connecting using ## a unix domain stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_socket_use',` gen_require(` type nscd_t, nscd_runtime_t; class nscd { getserv getpwd getgrp gethost shmempwd shmemgrp shmemhost shmemserv }; ') allow $1 self:unix_stream_socket create_socket_perms; allow $1 nscd_t:nscd { getpwd getgrp gethost }; dontaudit $1 nscd_t:fd use; dontaudit $1 nscd_t:nscd { getserv shmempwd shmemgrp shmemhost shmemserv }; files_search_runtime($1) stream_connect_pattern($1, nscd_runtime_t, nscd_runtime_t, nscd_t) dontaudit $1 nscd_runtime_t:file read_file_perms; ps_process_pattern(nscd_t, $1) ') ######################################## ## ## Use nscd services by mapping the ## database from an inherited nscd ## file descriptor. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_shm_use',` gen_require(` type nscd_t, nscd_runtime_t; class nscd { getpwd getgrp gethost shmempwd shmemgrp shmemhost }; ') allow $1 self:unix_stream_socket create_stream_socket_perms; allow $1 nscd_t:nscd { getpwd getgrp gethost shmempwd shmemgrp shmemhost }; allow $1 nscd_t:fd use; files_search_runtime($1) stream_connect_pattern($1, nscd_runtime_t, nscd_runtime_t, nscd_t) dontaudit $1 nscd_runtime_t:file read_file_perms; allow $1 nscd_runtime_t:dir list_dir_perms; allow $1 nscd_runtime_t:sock_file read_sock_file_perms; ') ######################################## ## ## Use nscd services. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_use',` tunable_policy(`nscd_use_shm',` nscd_shm_use($1) ',` nscd_socket_use($1) ') ') ######################################## ## ## Do not audit attempts to search ## nscd runtime directories. ## ## ## ## Domain to not audit. ## ## # interface(`nscd_dontaudit_search_runtime',` gen_require(` type nscd_runtime_t; ') dontaudit $1 nscd_runtime_t:dir search_dir_perms; ') ######################################## ## ## Read nscd runtime files. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_read_runtime_files',` gen_require(` type nscd_runtime_t; ') files_search_runtime($1) read_files_pattern($1, nscd_runtime_t, nscd_runtime_t) ') ######################################## ## ## Unconfined access to nscd services. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_unconfined',` gen_require(` type nscd_t; class nscd all_nscd_perms; ') allow $1 nscd_t:nscd { getpwd getgrp gethost getstat admin shmempwd shmemgrp shmemhost getserv shmemserv }; ') ######################################## ## ## Execute nscd in the nscd domain, and ## allow the specified role the nscd domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## # interface(`nscd_run',` gen_require(` attribute_role nscd_roles; ') nscd_domtrans($1) roleattribute $2 nscd_roles; ') ######################################## ## ## Execute the nscd server init ## script in the initrc domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`nscd_initrc_domtrans',` gen_require(` type nscd_initrc_exec_t; ') init_labeled_script_domtrans($1, nscd_initrc_exec_t) ') ######################################## ## ## All of the rules required to ## administrate an nscd environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`nscd_admin',` gen_require(` type nscd_t, nscd_log_t, nscd_runtime_t; type nscd_initrc_exec_t; ') allow $1 nscd_t:process { ptrace signal_perms }; ps_process_pattern($1, nscd_t) init_startstop_service($1, $2, nscd_t, nscd_initrc_exec_t) logging_list_logs($1) admin_pattern($1, nscd_log_t) files_list_runtime($1) admin_pattern($1, nscd_runtime_t) nscd_run($1, $2) ')