]> git.ipfire.org Git - people/stevee/selinux-policy.git/blob - policy/modules/services/jabber.te
trunk: Enable open permission checks policy capability.
[people/stevee/selinux-policy.git] / policy / modules / services / jabber.te
1
2 policy_module(jabber, 1.6.0)
3
4 ########################################
5 #
6 # Declarations
7 #
8
9 type jabberd_t;
10 type jabberd_exec_t;
11 init_daemon_domain(jabberd_t, jabberd_exec_t)
12
13 type jabberd_initrc_exec_t;
14 init_script_file(jabberd_initrc_exec_t)
15
16 type jabberd_log_t;
17 logging_log_file(jabberd_log_t)
18
19 type jabberd_var_lib_t;
20 files_type(jabberd_var_lib_t)
21
22 type jabberd_var_run_t;
23 files_pid_file(jabberd_var_run_t)
24
25 ########################################
26 #
27 # Local policy
28 #
29
30 allow jabberd_t self:capability dac_override;
31 dontaudit jabberd_t self:capability sys_tty_config;
32 allow jabberd_t self:process signal_perms;
33 allow jabberd_t self:fifo_file read_fifo_file_perms;
34 allow jabberd_t self:tcp_socket create_stream_socket_perms;
35 allow jabberd_t self:udp_socket create_socket_perms;
36
37 manage_files_pattern(jabberd_t, jabberd_var_lib_t, jabberd_var_lib_t)
38 files_var_lib_filetrans(jabberd_t, jabberd_var_lib_t, file)
39
40 manage_files_pattern(jabberd_t, jabberd_log_t, jabberd_log_t)
41 logging_log_filetrans(jabberd_t, jabberd_log_t, { file dir })
42
43 manage_files_pattern(jabberd_t, jabberd_var_run_t, jabberd_var_run_t)
44 files_pid_filetrans(jabberd_t, jabberd_var_run_t, file)
45
46 kernel_read_kernel_sysctls(jabberd_t)
47 kernel_list_proc(jabberd_t)
48 kernel_read_proc_symlinks(jabberd_t)
49
50 corenet_all_recvfrom_unlabeled(jabberd_t)
51 corenet_all_recvfrom_netlabel(jabberd_t)
52 corenet_tcp_sendrecv_generic_if(jabberd_t)
53 corenet_udp_sendrecv_generic_if(jabberd_t)
54 corenet_tcp_sendrecv_all_nodes(jabberd_t)
55 corenet_udp_sendrecv_all_nodes(jabberd_t)
56 corenet_tcp_sendrecv_all_ports(jabberd_t)
57 corenet_udp_sendrecv_all_ports(jabberd_t)
58 corenet_tcp_bind_all_nodes(jabberd_t)
59 corenet_tcp_bind_jabber_client_port(jabberd_t)
60 corenet_tcp_bind_jabber_interserver_port(jabberd_t)
61 corenet_sendrecv_jabber_client_server_packets(jabberd_t)
62 corenet_sendrecv_jabber_interserver_server_packets(jabberd_t)
63
64 dev_read_sysfs(jabberd_t)
65 # For SSL
66 dev_read_rand(jabberd_t)
67
68 domain_use_interactive_fds(jabberd_t)
69
70 files_read_etc_files(jabberd_t)
71 files_read_etc_runtime_files(jabberd_t)
72
73 fs_getattr_all_fs(jabberd_t)
74 fs_search_auto_mountpoints(jabberd_t)
75
76 libs_use_ld_so(jabberd_t)
77 libs_use_shared_libs(jabberd_t)
78
79 logging_send_syslog_msg(jabberd_t)
80
81 miscfiles_read_localization(jabberd_t)
82
83 sysnet_read_config(jabberd_t)
84
85 userdom_dontaudit_use_unpriv_user_fds(jabberd_t)
86
87 sysadm_dontaudit_search_home_dirs(jabberd_t)
88
89 optional_policy(`
90 nis_use_ypbind(jabberd_t)
91 ')
92
93 optional_policy(`
94 seutil_sigchld_newrole(jabberd_t)
95 ')
96
97 optional_policy(`
98 udev_read_db(jabberd_t)
99 ')