]> git.ipfire.org Git - people/stevee/selinux-policy.git/blame - policy/modules/services/nessus.te
trunk: Enable open permission checks policy capability.
[people/stevee/selinux-policy.git] / policy / modules / services / nessus.te
CommitLineData
a478b5ed 1
cfcf5004 2policy_module(nessus, 1.5.0)
a478b5ed
CP
3
4########################################
5#
6# Local policy
7#
8
9type nessusd_t;
10type nessusd_exec_t;
0bfccda4 11init_daemon_domain(nessusd_t, nessusd_exec_t)
a478b5ed
CP
12
13type nessusd_db_t;
14files_type(nessusd_db_t)
15
16type nessusd_etc_t;
17files_config_file(nessusd_etc_t)
18
19type nessusd_log_t;
20logging_log_file(nessusd_log_t)
21
22type nessusd_var_run_t;
23files_pid_file(nessusd_var_run_t)
24
25########################################
26#
27# Declarations
28#
29
30allow nessusd_t self:capability net_raw;
31dontaudit nessusd_t self:capability sys_tty_config;
32allow nessusd_t self:process { setsched signal_perms };
0b36a214 33allow nessusd_t self:fifo_file rw_fifo_file_perms;
a478b5ed
CP
34allow nessusd_t self:tcp_socket create_stream_socket_perms;
35allow nessusd_t self:udp_socket create_socket_perms;
36allow nessusd_t self:rawip_socket create_socket_perms;
37allow nessusd_t self:packet_socket create_socket_perms;
38
39# Allow access to the nessusd authentication database
0bfccda4
CP
40manage_dirs_pattern(nessusd_t, nessusd_db_t, nessusd_db_t)
41manage_files_pattern(nessusd_t, nessusd_db_t, nessusd_db_t)
42manage_lnk_files_pattern(nessusd_t, nessusd_db_t, nessusd_db_t)
a478b5ed
CP
43files_list_var_lib(nessusd_t)
44
0b36a214 45allow nessusd_t nessusd_etc_t:file read_file_perms;
a478b5ed
CP
46files_search_etc(nessusd_t)
47
0bfccda4
CP
48manage_files_pattern(nessusd_t, nessusd_log_t, nessusd_log_t)
49logging_log_filetrans(nessusd_t, nessusd_log_t, { file dir })
a478b5ed 50
0bfccda4
CP
51manage_files_pattern(nessusd_t, nessusd_var_run_t, nessusd_var_run_t)
52files_pid_filetrans(nessusd_t, nessusd_var_run_t, file)
a478b5ed
CP
53
54kernel_read_system_state(nessusd_t)
55kernel_read_kernel_sysctls(nessusd_t)
a478b5ed
CP
56
57# for nmap etc
58corecmd_exec_bin(nessusd_t)
59
19006686
CP
60corenet_all_recvfrom_unlabeled(nessusd_t)
61corenet_all_recvfrom_netlabel(nessusd_t)
a478b5ed
CP
62corenet_tcp_sendrecv_generic_if(nessusd_t)
63corenet_udp_sendrecv_generic_if(nessusd_t)
64corenet_raw_sendrecv_generic_if(nessusd_t)
65corenet_tcp_sendrecv_all_nodes(nessusd_t)
66corenet_udp_sendrecv_all_nodes(nessusd_t)
67corenet_raw_sendrecv_all_nodes(nessusd_t)
68corenet_tcp_sendrecv_all_ports(nessusd_t)
69corenet_udp_sendrecv_all_ports(nessusd_t)
a478b5ed 70corenet_tcp_bind_all_nodes(nessusd_t)
a478b5ed
CP
71corenet_tcp_bind_nessus_port(nessusd_t)
72corenet_tcp_connect_all_ports(nessusd_t)
141cffdd
CP
73corenet_sendrecv_all_client_packets(nessusd_t)
74corenet_sendrecv_nessus_server_packets(nessusd_t)
a478b5ed
CP
75
76dev_read_sysfs(nessusd_t)
77dev_read_urand(nessusd_t)
78
79domain_use_interactive_fds(nessusd_t)
80
81files_read_etc_files(nessusd_t)
82files_read_etc_runtime_files(nessusd_t)
83
84fs_getattr_all_fs(nessusd_t)
85fs_search_auto_mountpoints(nessusd_t)
86
a478b5ed
CP
87libs_use_ld_so(nessusd_t)
88libs_use_shared_libs(nessusd_t)
89
90logging_send_syslog_msg(nessusd_t)
91
92miscfiles_read_localization(nessusd_t)
93
94sysnet_read_config(nessusd_t)
95
96userdom_dontaudit_use_unpriv_user_fds(nessusd_t)
e9c6cda7
CP
97
98sysadm_dontaudit_search_home_dirs(nessusd_t)
a478b5ed 99
a478b5ed
CP
100optional_policy(`
101 nis_use_ypbind(nessusd_t)
102')
103
104optional_policy(`
105 seutil_sigchld_newrole(nessusd_t)
106')
107
108optional_policy(`
109 udev_read_db(nessusd_t)
110')