bfb4e60edb
Modern systems shouldn't need direct access to raw memory devices (/dev/mem, /dev/kmem, /dev/mergemem, dev/oldmem, /dev/port) anymore, so let's remove the access in most cases and make it tunable in the rest. Add dev_read_raw_memory_cond(), dev_write_raw_memory_cond() and dev_wx_raw_memory_cond(), which are conditional to new boolean allow_raw_memory_access. Remove raw memory access for a few domains that should never have needed it (colord_t, iscsid_t, mdamd_t, txtstat_t), should not need it anymore (dmidecode_t, Debian devicekit_diskt_t, hald_t, hald_mac_t, xserver_t) or the domains that should transition to different domain for this (rpm_t, kudzu_t, dpkg_t). Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
132 lines
3.2 KiB
Plaintext
132 lines
3.2 KiB
Plaintext
#
|
|
# This file is for the declaration of global tunables.
|
|
# To change the default value at build time, the booleans.conf
|
|
# file should be used.
|
|
#
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(allow_execheap,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla")
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(allow_execmem,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t")
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(allow_execmod,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla")
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(allow_execstack,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem,
|
|
## dev/oldmem, /dev/port) access for confined executables. This is
|
|
## extremely dangerous as it can bypass the SELinux protections, and
|
|
## should only be used by trusted domains.
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(allow_raw_memory_access,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Enable polyinstantiated directory support.
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(allow_polyinstantiation,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow system to run with NIS
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(allow_ypbind,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow logging in and using the system from /dev/console.
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(console_login,true)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Enable reading of urandom for all domains.
|
|
## </p>
|
|
## <p>
|
|
## This should be enabled when all programs
|
|
## are compiled with ProPolice/SSP
|
|
## stack smashing protection. All domains will
|
|
## be allowed to read from /dev/urandom.
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(global_ssp,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow email client to various content.
|
|
## nfs, samba, removable devices, and user temp
|
|
## files
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(mail_read_content,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow any files/directories to be exported read/write via NFS.
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(nfs_export_all_rw,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow any files/directories to be exported read/only via NFS.
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(nfs_export_all_ro,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Support NFS home directories
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(use_nfs_home_dirs,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Support SAMBA home directories
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(use_samba_home_dirs,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow users to run TCP servers (bind to ports and accept connection from
|
|
## the same domain and outside users) disabling this forces FTP passive mode
|
|
## and may change other protocols.
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(user_tcp_server,false)
|
|
|
|
## <desc>
|
|
## <p>
|
|
## Allow users to run UDP servers (bind to ports and accept connection from
|
|
## the same domain and outside users)
|
|
## </p>
|
|
## </desc>
|
|
gen_tunable(user_udp_server,false)
|