78276fc43b
Semodule stopped using this many years ago. The policy_module() macro will continue to support an optional second parameter as version. If it is not specified, a default value of 1 is set. Signed-off-by: Chris PeBenito <pebenito@ieee.org>
422 lines
11 KiB
Plaintext
422 lines
11 KiB
Plaintext
policy_module(mta)
|
|
|
|
########################################
|
|
#
|
|
# Declarations
|
|
#
|
|
|
|
attribute mailcontent_type;
|
|
attribute mta_exec_type;
|
|
attribute mta_user_agent;
|
|
attribute mailserver_delivery;
|
|
attribute mailserver_domain;
|
|
attribute mailserver_sender;
|
|
|
|
attribute user_mail_domain;
|
|
|
|
attribute_role user_mail_roles;
|
|
|
|
type etc_aliases_t;
|
|
files_type(etc_aliases_t)
|
|
|
|
type etc_mail_t;
|
|
files_config_file(etc_mail_t)
|
|
|
|
type mail_home_t;
|
|
userdom_user_home_content(mail_home_t)
|
|
|
|
type mail_home_rw_t;
|
|
userdom_user_home_content(mail_home_rw_t)
|
|
|
|
type mqueue_spool_t;
|
|
files_mountpoint(mqueue_spool_t)
|
|
|
|
type mail_spool_t;
|
|
files_mountpoint(mail_spool_t)
|
|
|
|
type sendmail_exec_t;
|
|
mta_agent_executable(sendmail_exec_t)
|
|
|
|
mta_base_mail_template(system)
|
|
role system_r types system_mail_t;
|
|
|
|
mta_base_mail_template(user)
|
|
userdom_user_application_type(user_mail_t)
|
|
role user_mail_roles types user_mail_t;
|
|
|
|
userdom_user_tmp_file(user_mail_tmp_t)
|
|
|
|
########################################
|
|
#
|
|
# Common base mail policy
|
|
#
|
|
|
|
allow user_mail_domain self:capability { chown setgid setuid };
|
|
allow user_mail_domain self:process { signal_perms setrlimit };
|
|
allow user_mail_domain self:fifo_file rw_fifo_file_perms;
|
|
|
|
allow user_mail_domain mta_exec_type:file entrypoint;
|
|
|
|
allow user_mail_domain mail_home_t:file { append_file_perms read_file_perms };
|
|
|
|
manage_dirs_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
|
|
manage_files_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
|
|
manage_lnk_files_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
|
|
userdom_user_home_dir_filetrans(user_mail_domain, mail_home_rw_t, dir, "Maildir")
|
|
userdom_user_home_dir_filetrans(user_mail_domain, mail_home_rw_t, dir, ".maildir")
|
|
|
|
read_files_pattern(user_mail_domain, { etc_mail_t etc_aliases_t }, { etc_mail_t etc_aliases_t })
|
|
|
|
manage_files_pattern(user_mail_domain, { mqueue_spool_t mail_spool_t }, { mqueue_spool_t mail_spool_t })
|
|
read_lnk_files_pattern(user_mail_domain, { mqueue_spool_t mail_spool_t }, { mqueue_spool_t mail_spool_t })
|
|
|
|
allow user_mail_domain sendmail_exec_t:lnk_file read_lnk_file_perms;
|
|
|
|
can_exec(user_mail_domain, { mta_exec_type sendmail_exec_t })
|
|
|
|
kernel_read_crypto_sysctls(user_mail_domain)
|
|
kernel_read_system_state(user_mail_domain)
|
|
kernel_read_kernel_sysctls(user_mail_domain)
|
|
kernel_read_network_state(user_mail_domain)
|
|
kernel_request_load_module(user_mail_domain)
|
|
|
|
corenet_all_recvfrom_netlabel(user_mail_domain)
|
|
corenet_tcp_sendrecv_generic_if(user_mail_domain)
|
|
corenet_tcp_sendrecv_generic_node(user_mail_domain)
|
|
|
|
corenet_sendrecv_all_client_packets(user_mail_domain)
|
|
corenet_tcp_connect_all_ports(user_mail_domain)
|
|
|
|
corecmd_exec_bin(user_mail_domain)
|
|
|
|
dev_read_urand(user_mail_domain)
|
|
|
|
domain_use_interactive_fds(user_mail_domain)
|
|
|
|
files_read_etc_runtime_files(user_mail_domain)
|
|
files_read_usr_files(user_mail_domain)
|
|
files_search_spool(user_mail_domain)
|
|
files_dontaudit_search_runtime(user_mail_domain)
|
|
|
|
fs_getattr_all_fs(user_mail_domain)
|
|
|
|
init_dontaudit_rw_utmp(user_mail_domain)
|
|
|
|
logging_send_syslog_msg(user_mail_domain)
|
|
|
|
miscfiles_read_all_certs(user_mail_domain)
|
|
miscfiles_read_localization(user_mail_domain)
|
|
|
|
tunable_policy(`use_samba_home_dirs',`
|
|
fs_manage_cifs_dirs(user_mail_domain)
|
|
fs_manage_cifs_files(user_mail_domain)
|
|
fs_read_cifs_symlinks(user_mail_domain)
|
|
')
|
|
|
|
tunable_policy(`use_nfs_home_dirs',`
|
|
fs_manage_nfs_dirs(user_mail_domain)
|
|
fs_manage_nfs_files(user_mail_domain)
|
|
fs_read_nfs_symlinks(user_mail_domain)
|
|
')
|
|
|
|
optional_policy(`
|
|
courier_manage_spool_dirs(user_mail_domain)
|
|
courier_manage_spool_files(user_mail_domain)
|
|
courier_rw_spool_pipes(user_mail_domain)
|
|
')
|
|
|
|
optional_policy(`
|
|
exim_domtrans(user_mail_domain)
|
|
exim_manage_log(user_mail_domain)
|
|
exim_manage_spool_files(user_mail_domain)
|
|
exim_read_var_lib_files(user_mail_domain)
|
|
')
|
|
|
|
optional_policy(`
|
|
files_getattr_tmp_dirs(user_mail_domain)
|
|
|
|
postfix_exec_master(user_mail_domain)
|
|
postfix_read_config(user_mail_domain)
|
|
postfix_search_spool(user_mail_domain)
|
|
postfix_rw_inherited_master_pipes(user_mail_domain)
|
|
|
|
ifdef(`distro_redhat',`
|
|
postfix_config_filetrans(user_mail_domain, etc_aliases_t, { dir file lnk_file sock_file fifo_file })
|
|
')
|
|
')
|
|
|
|
optional_policy(`
|
|
procmail_exec(user_mail_domain)
|
|
')
|
|
|
|
optional_policy(`
|
|
qmail_domtrans_inject(user_mail_domain)
|
|
')
|
|
|
|
optional_policy(`
|
|
sendmail_manage_log(user_mail_domain)
|
|
sendmail_log_filetrans_sendmail_log(user_mail_domain, file)
|
|
')
|
|
|
|
optional_policy(`
|
|
uucp_manage_spool(user_mail_domain)
|
|
')
|
|
|
|
########################################
|
|
#
|
|
# System local policy
|
|
#
|
|
|
|
allow system_mail_t self:capability { dac_override fowner };
|
|
|
|
read_files_pattern(system_mail_t, etc_mail_t, etc_mail_t)
|
|
|
|
read_files_pattern(system_mail_t, mailcontent_type, mailcontent_type)
|
|
|
|
allow system_mail_t mail_home_t:file manage_file_perms;
|
|
userdom_user_home_dir_filetrans(system_mail_t, mail_home_t, file, ".esmtp_queue")
|
|
userdom_user_home_dir_filetrans(system_mail_t, mail_home_t, file, ".forward")
|
|
userdom_user_home_dir_filetrans(system_mail_t, mail_home_t, file, ".mailrc")
|
|
userdom_user_home_dir_filetrans(system_mail_t, mail_home_t, file, "dead.letter")
|
|
|
|
allow system_mail_t user_mail_domain:dir list_dir_perms;
|
|
allow system_mail_t user_mail_domain:file read_file_perms;
|
|
allow system_mail_t user_mail_domain:lnk_file read_lnk_file_perms;
|
|
|
|
corecmd_exec_shell(system_mail_t)
|
|
|
|
dev_read_rand(system_mail_t)
|
|
dev_read_sysfs(system_mail_t)
|
|
|
|
fs_rw_anon_inodefs_files(system_mail_t)
|
|
|
|
selinux_getattr_fs(system_mail_t)
|
|
|
|
term_dontaudit_use_unallocated_ttys(system_mail_t)
|
|
|
|
init_use_script_ptys(system_mail_t)
|
|
init_use_fds(system_mail_t)
|
|
init_rw_stream_sockets(system_mail_t)
|
|
|
|
userdom_use_user_terminals(system_mail_t)
|
|
|
|
optional_policy(`
|
|
apt_use_fds(system_mail_t)
|
|
apt_use_ptys(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
apache_read_squirrelmail_data(system_mail_t)
|
|
apache_append_squirrelmail_data(system_mail_t)
|
|
apache_dontaudit_append_log(system_mail_t)
|
|
apache_dontaudit_rw_stream_sockets(system_mail_t)
|
|
apache_dontaudit_rw_tcp_sockets(system_mail_t)
|
|
apache_dontaudit_rw_sys_script_stream_sockets(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
arpwatch_manage_tmp_files(system_mail_t)
|
|
|
|
ifdef(`hide_broken_symptoms',`
|
|
arpwatch_dontaudit_rw_packet_sockets(system_mail_t)
|
|
')
|
|
')
|
|
|
|
optional_policy(`
|
|
bugzilla_search_content(system_mail_t)
|
|
bugzilla_dontaudit_rw_stream_sockets(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
clamav_scannable_files(mqueue_spool_t)
|
|
clamav_stream_connect(system_mail_t)
|
|
clamav_append_log(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
cron_read_system_job_tmp_files(system_mail_t)
|
|
cron_dontaudit_write_pipes(system_mail_t)
|
|
cron_rw_system_job_stream_sockets(system_mail_t)
|
|
cron_rw_tmp_files(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
courier_stream_connect_authdaemon(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
cvs_read_data(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
fail2ban_dontaudit_rw_stream_sockets(system_mail_t)
|
|
fail2ban_append_log(system_mail_t)
|
|
fail2ban_rw_inherited_tmp_files(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
logrotate_read_tmp_files(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
logwatch_read_tmp_files(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
milter_getattr_all_sockets(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
nagios_read_tmp_files(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
manage_dirs_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
|
|
manage_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
|
|
manage_lnk_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
|
|
manage_fifo_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
|
|
manage_sock_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
|
|
files_etc_filetrans(system_mail_t, etc_aliases_t, { file lnk_file sock_file fifo_file })
|
|
')
|
|
|
|
optional_policy(`
|
|
sxid_read_log(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
userdom_dontaudit_use_user_ptys(system_mail_t)
|
|
|
|
optional_policy(`
|
|
cron_dontaudit_append_system_job_tmp_files(system_mail_t)
|
|
')
|
|
')
|
|
|
|
optional_policy(`
|
|
spamassassin_stream_connect_spamd(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
smartmon_read_tmp_files(system_mail_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
unconfined_use_fds(system_mail_t)
|
|
')
|
|
|
|
########################################
|
|
#
|
|
# MTA user agent local policy
|
|
#
|
|
|
|
userdom_use_user_terminals(mta_user_agent)
|
|
|
|
optional_policy(`
|
|
apache_append_log(mta_user_agent)
|
|
')
|
|
|
|
optional_policy(`
|
|
arpwatch_manage_tmp_files(mta_user_agent)
|
|
|
|
ifdef(`hide_broken_symptoms',`
|
|
arpwatch_dontaudit_rw_packet_sockets(mta_user_agent)
|
|
')
|
|
|
|
optional_policy(`
|
|
cron_read_system_job_tmp_files(mta_user_agent)
|
|
')
|
|
')
|
|
|
|
optional_policy(`
|
|
mon_dontaudit_use_fds(mta_user_agent)
|
|
')
|
|
|
|
########################################
|
|
#
|
|
# Mailserver delivery local policy
|
|
#
|
|
|
|
allow mailserver_delivery self:fifo_file rw_fifo_file_perms;
|
|
|
|
allow mailserver_delivery mail_spool_t:dir list_dir_perms;
|
|
create_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
|
|
read_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
|
|
append_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
|
|
create_lnk_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
|
|
read_lnk_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
|
|
|
|
manage_dirs_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
|
|
manage_files_pattern(mailserver_delivery, { mail_home_t mail_home_rw_t }, { mail_home_t mail_home_rw_t })
|
|
manage_lnk_files_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
|
|
userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_t, file, ".esmtp_queue")
|
|
userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_t, file, ".forward")
|
|
userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_t, file, ".mailrc")
|
|
userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_t, file, "dead.letter")
|
|
userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_rw_t, dir, "Maildir")
|
|
userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_rw_t, dir, ".maildir")
|
|
|
|
read_files_pattern(mailserver_delivery, system_mail_tmp_t, system_mail_tmp_t)
|
|
|
|
tunable_policy(`use_samba_home_dirs',`
|
|
fs_manage_cifs_dirs(mailserver_delivery)
|
|
fs_manage_cifs_files(mailserver_delivery)
|
|
fs_read_cifs_symlinks(mailserver_delivery)
|
|
')
|
|
|
|
tunable_policy(`use_nfs_home_dirs',`
|
|
fs_manage_nfs_dirs(mailserver_delivery)
|
|
fs_manage_nfs_files(mailserver_delivery)
|
|
fs_read_nfs_symlinks(mailserver_delivery)
|
|
')
|
|
|
|
optional_policy(`
|
|
arpwatch_search_data(mailserver_delivery)
|
|
')
|
|
|
|
optional_policy(`
|
|
dovecot_manage_spool(mailserver_delivery)
|
|
dovecot_domtrans_deliver(mailserver_delivery)
|
|
')
|
|
|
|
optional_policy(`
|
|
files_search_var_lib(mailserver_delivery)
|
|
|
|
mailman_domtrans(mailserver_delivery)
|
|
mailman_read_data_symlinks(mailserver_delivery)
|
|
')
|
|
|
|
optional_policy(`
|
|
mon_dontaudit_search_var_lib(mailserver_delivery)
|
|
')
|
|
|
|
optional_policy(`
|
|
postfix_rw_inherited_master_pipes(mailserver_delivery)
|
|
')
|
|
|
|
optional_policy(`
|
|
uucp_domtrans_uux(mailserver_delivery)
|
|
')
|
|
|
|
########################################
|
|
#
|
|
# User local policy
|
|
#
|
|
|
|
manage_files_pattern(user_mail_t, mail_home_t, mail_home_t)
|
|
userdom_user_home_dir_filetrans(user_mail_t, mail_home_t, file, ".esmtp_queue")
|
|
userdom_user_home_dir_filetrans(user_mail_t, mail_home_t, file, ".forward")
|
|
userdom_user_home_dir_filetrans(user_mail_t, mail_home_t, file, ".mailrc")
|
|
userdom_user_home_dir_filetrans(user_mail_t, mail_home_t, file, "dead.letter")
|
|
|
|
dev_read_sysfs(user_mail_t)
|
|
|
|
userdom_use_user_terminals(user_mail_t)
|
|
|
|
optional_policy(`
|
|
allow user_mail_t self:capability dac_override;
|
|
|
|
userdom_rw_user_tmp_files(user_mail_t)
|
|
|
|
postfix_read_config(user_mail_t)
|
|
postfix_list_spool(user_mail_t)
|
|
')
|