-policy_module(corenetwork,1.2.6)
+policy_module(corenetwork,1.2.7)
########################################
#
network_port(router, udp,520,s0)
network_port(rsh, tcp,514,s0)
network_port(rsync, tcp,873,s0, udp,873,s0)
+network_port(rwho, udp,513,s0)
network_port(smbd, tcp,139,s0, tcp,445,s0)
network_port(smtp, tcp,25,s0, tcp,465,s0, tcp,587,s0)
network_port(snmp, udp,161,s0, udp,162,s0, tcp,199,s0)
--- /dev/null
+
+policy_module(rwho,1.0.0)
+
+########################################
+#
+# Declarations
+#
+
+type rwho_t;
+type rwho_exec_t;
+init_daemon_domain(rwho_t, rwho_exec_t)
+
+# var/spool files
+type rwho_spool_t;
+files_type(rwho_spool_t)
+
+########################################
+#
+# rwho local policy
+#
+
+allow rwho_t self:capability sys_chroot;
+allow rwho_t self:unix_dgram_socket create;
+allow rwho_t self:fifo_file rw_file_perms;
+allow rwho_t self:unix_stream_socket create_stream_socket_perms;
+allow rwho_t self:udp_socket create_socket_perms;
+
+# var/spool files for rwho
+allow rwho_t rwho_spool_t:dir manage_dir_perms;
+allow rwho_t rwho_spool_t:file manage_file_perms;
+files_spool_filetrans(rwho_t,rwho_spool_t, { file dir })
+
+kernel_read_system_state(rwho_t)
+
+corenet_non_ipsec_sendrecv(rwho_t)
+corenet_udp_sendrecv_all_if(rwho_t)
+corenet_udp_sendrecv_all_nodes(rwho_t)
+corenet_udp_sendrecv_all_ports(rwho_t)
+corenet_udp_bind_all_nodes(rwho_t)
+corenet_udp_bind_rwho_port(rwho_t)
+corenet_sendrecv_rwho_server_packets(rwho_t)
+
+domain_use_interactive_fds(rwho_t)
+
+files_read_etc_files(rwho_t)
+
+init_read_utmp(rwho_t)
+init_dontaudit_write_utmp(rwho_t)
+
+libs_use_ld_so(rwho_t)
+libs_use_shared_libs(rwho_t)
+
+miscfiles_read_localization(rwho_t)
+
+sysnet_dns_name_resolve(rwho_t)
+
+ifdef(`targeted_policy',`
+ term_dontaudit_use_unallocated_ttys(rwho_t)
+ term_dontaudit_use_generic_ptys(rwho_t)
+')