2d371fcee2
Signed-off-by: Chris PeBenito <pebenito@ieee.org>
115 lines
3.1 KiB
Plaintext
115 lines
3.1 KiB
Plaintext
policy_module(certbot, 1.1.1)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Determine whether additional rules
|
|
## should be enabled to support acme.sh
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(certbot_acmesh, false)
|
|
|
|
########################################
|
|
#
|
|
# Declarations
|
|
#
|
|
|
|
type certbot_t;
|
|
type certbot_exec_t;
|
|
init_daemon_domain(certbot_t, certbot_exec_t)
|
|
|
|
type certbot_log_t;
|
|
logging_log_file(certbot_log_t)
|
|
|
|
type certbot_runtime_t;
|
|
files_runtime_file(certbot_runtime_t)
|
|
|
|
type certbot_tmp_t;
|
|
files_tmp_file(certbot_tmp_t)
|
|
|
|
type certbot_tmpfs_t;
|
|
files_tmpfs_file(certbot_tmpfs_t)
|
|
|
|
type certbot_lib_t;
|
|
files_type(certbot_lib_t)
|
|
|
|
########################################
|
|
#
|
|
# Local policy
|
|
#
|
|
|
|
allow certbot_t self:fifo_file rw_inherited_fifo_file_perms;
|
|
allow certbot_t self:capability { chown dac_override sys_resource };
|
|
allow certbot_t self:udp_socket all_udp_socket_perms;
|
|
allow certbot_t self:tcp_socket all_tcp_socket_perms;
|
|
allow certbot_t self:netlink_route_socket create_netlink_socket_perms;
|
|
|
|
files_search_var_lib(certbot_t)
|
|
manage_dirs_pattern(certbot_t, certbot_lib_t, certbot_lib_t)
|
|
manage_files_pattern(certbot_t, certbot_lib_t, certbot_lib_t)
|
|
|
|
manage_dirs_pattern(certbot_t, certbot_tmp_t, certbot_tmp_t)
|
|
manage_files_pattern(certbot_t, certbot_tmp_t, certbot_tmp_t)
|
|
files_tmp_filetrans(certbot_t, certbot_tmp_t, { dir file })
|
|
|
|
manage_files_pattern(certbot_t, certbot_tmpfs_t, certbot_tmpfs_t)
|
|
fs_tmpfs_filetrans(certbot_t, certbot_tmpfs_t, { file })
|
|
|
|
# this is for certbot to have write-exec memory, I know it is bad
|
|
# https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913544
|
|
# the Debian bug report has background about python-acme and python3-openssl
|
|
allow certbot_t self:process execmem;
|
|
allow certbot_t certbot_tmp_t:file mmap_exec_file_perms;
|
|
allow certbot_t certbot_tmpfs_t:file mmap_exec_file_perms;
|
|
allow certbot_t certbot_runtime_t:file mmap_exec_file_perms;
|
|
|
|
logging_search_logs(certbot_t)
|
|
allow certbot_t certbot_log_t:dir manage_dir_perms;
|
|
allow certbot_t certbot_log_t:file manage_file_perms;
|
|
|
|
manage_files_pattern(certbot_t, certbot_runtime_t, certbot_runtime_t)
|
|
files_runtime_filetrans(certbot_t, certbot_runtime_t, file)
|
|
|
|
kernel_search_fs_sysctls(certbot_t)
|
|
|
|
corecmd_list_bin(certbot_t)
|
|
corecmd_mmap_bin_files(certbot_t)
|
|
|
|
corenet_tcp_bind_generic_node(certbot_t)
|
|
corenet_tcp_connect_http_port(certbot_t)
|
|
corenet_tcp_connect_dns_port(certbot_t)
|
|
# bind to http port for standalone mode
|
|
corenet_tcp_bind_http_port(certbot_t)
|
|
|
|
domain_use_interactive_fds(certbot_t)
|
|
|
|
files_read_etc_files(certbot_t)
|
|
files_read_usr_files(certbot_t)
|
|
|
|
libs_exec_ldconfig(certbot_t)
|
|
# for /usr/lib/gcc/x86_64-linux-gnu/8/collect2
|
|
libs_exec_lib_files(certbot_t)
|
|
|
|
miscfiles_read_localization(certbot_t)
|
|
|
|
miscfiles_read_generic_certs(certbot_t)
|
|
miscfiles_manage_generic_tls_privkey_dirs(certbot_t)
|
|
miscfiles_manage_generic_tls_privkey_files(certbot_t)
|
|
miscfiles_manage_generic_tls_privkey_symlinks(certbot_t)
|
|
|
|
sysnet_read_config(certbot_t)
|
|
|
|
userdom_dontaudit_search_user_home_dirs(certbot_t)
|
|
userdom_use_user_ptys(certbot_t)
|
|
|
|
tunable_policy(`certbot_acmesh',`
|
|
corecmd_exec_bin(certbot_t)
|
|
corecmd_exec_shell(certbot_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
# for writing to webroot
|
|
apache_manage_sys_content(certbot_t)
|
|
|
|
apache_search_config(certbot_t)
|
|
')
|